Blockchain circle

One stop hot information platform

About us:

Blockchain circle provides the latest information about blockchain, digital currency, digital wallet, exchange, metauniverse, bitcoin, Ethereum, contract, financial management and so on, and always pays attention to the latest market...

A point-to-point transmission method and process for user data through blockchain Technology

Time : 15/06/2021 Author : 0ka3tx Click : + -
        The traditional information transmission system cannot guarantee the confidentiality of information in the process of information transmission, especially in the process of information transaction. Secret sharing technology can be used between different users in time to ensure the confidentiality of information, but it can not prevent various users from jointly improving false information. Therefore, the traditional distributed information transmission system has high cost and cannot guarantee the confidentiality of information. In addition, the existing communication tools adopt centralized services, which are highly dependent on the central server. Once the central server is attacked, it will lead to the disclosure of user privacy; And when using communication tools to communicate, all of them are transmitted through plaintext data, with poor security.
 
        The purpose of this application is to provide a point-to-point transmission method for user data through blockchain technology, which has the technical effect of relieving the dependence on centralized servers and ensuring data security. In order to achieve the above purpose, this application provides a point-to-point transmission method for user data through blockchain technology, including the following steps: receiving authorization requests and determining authorization methods, wherein, authorization methods include: single authorization method, multi authorization method and group authorization method; Complete the authorization according to the authorization method through blockchain; After authorization, receive blockchain data requests and complete data transmission. As mentioned above, the sub steps of completing authorization through blockchain according to the authorization method are as follows: fault detection is performed on authorized nodes and authorized nodes to generate detection results; When the detection result is that there is a faulty node, the faulty node is repaired. After the repair is completed, the authorization is completed according to the authorization method; If the detection result is a fault free node, the authorization is completed directly according to the authorization method.
 
        As mentioned above, the sub steps of fault detection for authorized nodes and authorized nodes and generating detection results are as follows: obtain node log data and node status information of all detection nodes, wherein, the detection node includes authorized nodes and all authorized nodes; Analyze the node log data and node state information to obtain the analysis data of the detection node. The analysis data includes: node log sequence and abnormal state results; According to the analysis data, the fault analysis of the detection node is carried out, and the detection results are obtained. The detection results include: the node with fault and the node without fault. As described above, the sub steps of analyzing the node log data and node state information to obtain the analysis data of the detection node are as follows: processing the node log data of the detection node to obtain the node log sequence; Analyze the node state information of the detection node and obtain the abnormal state results. The abnormal state results include: abnormal and normal; Take the node log sequence and abnormal state results as analysis data.
 
        As mentioned above, among them, the fault analysis is carried out on the detection node according to the analysis data, and the sub steps of obtaining the detection results are as follows: read the abnormal state result in the analysis data, and if the abnormal state result is abnormal, obtain the abnormal node sequence; If the status is abnormal and the result is normal, complete the authorization according to the authorization method; Obtain the abnormal reliability through the abnormal node sequence; Using the preset abnormal threshold to analyze the abnormal reliability and generate the fault results; Test results are generated according to the fault results. As above, the calculation formula of abnormal reliability is as follows:; Where, indicates abnormal reliability; Is the abnormal source; It is the first abnormal source; To observe an abnormal sequence in the time window before detecting node abnormalities; Represents the total number of occurrences of the sequence in the abnormal node sequence in all time windows; Is the total number of times the sequence appears in all time windows before the abnormal source occurs.
 
        As mentioned above, when the fault result is no fault, the generated detection result is: no fault node; When the fault result is fault, the generated detection result is: there is a fault node; When the detection result is that there is a faulty node, the detection result also includes the faulty node and the cause of the fault. As mentioned above, when the authorization mode is single authorization mode, the authorization code of the authorized node and the public key of the authorized node are sent to the authorized node through blockchain to authorize the authorized node. As mentioned above, when the authorization mode is group authorization mode, the authorized node, as the group owner, generates a group address in advance, generates the private key s, regenerates the address o corresponding to the private key s, and transmits the private key s and address o to the authorized node to be chatted through the blockchain; The authorized node joins the group through private key s and address o; After joining the group, the group owner sends the authorization code of the authorized node and the public key of the authorized node to one or more authorized nodes in the group through the blockchain to authorize the authorized nodes.
 
        As mentioned above, the sub steps of receiving the authorization request and determining the authorization method are as follows: analyze the received authorization request and determine the authorization request type; Select the authorization method according to the authorization request type. In order to more clearly explain the embodiments of the application or the technical solutions in the prior art, the following will briefly introduce the drawings that need to be used in the description of the embodiments or the prior art. It is obvious that the drawings in the following description are only some of the embodiments recorded in the application. For those skilled in the art, other drawings can be obtained from these drawings. The following is a clear and complete description of the technical scheme in the embodiments of the invention in combination with the accompanying drawings. Obviously, the described embodiments are part of the embodiments of the invention, not all of them.
 
        Based on the embodiments in the invention, all other embodiments obtained by those skilled in the art without making creative work belong to the scope of the invention. As shown in Figure 1, this application provides a point-to-point transmission system for user data through blockchain technology, including: an authorized node, at least one authorized node, and a blockchain information transmission device; Both the authorized node and at least one authorized node communicate with the blockchain information transmission device. A blockchain based information transmission program is preset on the memory; Processor: it is used to run the blockchain based information transmission program. When the blockchain based information transmission program is executed by the processor, it realizes the following point-to-point transmission method of user data through blockchain technology.
 
        Specifically, receive the authorization request and judge the type of authorization request. Among them, the types of authorization requests include: single authorization request, multi authorization request and group authorization request. Group authorization request: indicates that a group is composed of multiple nodes, one of which is an authorized node, the other is an authorized node, and one or more authorized nodes request authorization from the authorized node. When the authorization request type is single authorization request, the selected authorization method is single authorization method; When the authorization request type is multi authorization request, the selected authorization method is multi authorization method; When the authorization request type is group authorization request, the selected authorization method is group authorization method.
 
        S12011: obtain node log data and node status information of all detection nodes, where the detection node includes authorized nodes and all authorized nodes. S12012: analyze the node log data and node state information to obtain the analysis data of the detection node. The analysis data includes: node log sequence and abnormal state results. Specifically, the node log data is preliminarily classified according to the format of the node log data, and multiple initial class logs are obtained; Format each initial class log into a format node log to unify the format of node log data. Among them, the formatted node log includes at least six elements: serial number, timestamp, node name, log type, log content and preliminary classification.
 
        After obtaining the formatted node logs, arrange the log types of the formatted node logs according to the timestamp, and obtain the node log sequence after finishing the arrangement. S120122: analyze the node state information of the detection node to obtain the abnormal state results, among which the abnormal state results include: abnormal and normal. Specifically, analyze the node state information. If there is abnormal data in the node state information, the generated abnormal state result is abnormal. If there is no abnormal data in the node status information, the generated abnormal status result is normal. S12013: analyze the fault of the detection node according to the analysis data and obtain the detection results. The detection results include: the node with fault and the node without fault.
 
        S120131: read the abnormal state result in the analysis data. If the abnormal state result is abnormal, obtain the abnormal node sequence; If the abnormal state result is normal, s1203 is executed. Specifically, when the abnormal state result is abnormal, use the abnormal state result to locate the fault source of the detection node whose abnormal state result is abnormal, and extract the node log sequence within the observation time before the occurrence time of the detection node fault as the abnormal node sequence according to the delimitation of the time window;. Where, indicates abnormal reliability; Is the abnormal source; It is the first abnormal source; To observe an abnormal sequence in the time window before detecting node abnormalities; Represents the total number of occurrences of the sequence in the abnormal node sequence in all time windows; Is the total number of times the sequence appears in all time windows before the abnormal source occurs.
 
        Further, when the abnormal reliability is greater than the abnormal threshold, fault matching is performed on the abnormal node sequence to generate detection results. The sub steps are as follows:. Where, is the matching value; Represents the superposition value of abnormal reliability of the fault matching sequence currently matched by the first abnormal source; It is the superposition value of the abnormal reliability of the fault matching sequence matched by the first abnormal source within the observation time window; Is the number of fault matching sequences corresponding to a fault source in an observation time window; Is the total number of fault types; Serial number indicating the fault type. S1201332: when the matching value is greater than the preset similar threshold, the fault result is: there is a fault; When the matching value is less than or equal to the preset similar threshold, the generated fault result is: no fault.
 
        Specifically, when the matching value is greater than the preset similar threshold, the fault result is: there is a fault, and the corresponding fault detection node is taken as the fault node. Specifically, when the fault result is no fault, the generated detection result is: no fault node; When the fault result is fault, the generated detection result is: there is a fault node. S1202: when the detection result is that there is a faulty node, repair the faulty node. After the repair is completed, execute s1203; If the detection result is a fault free node, s1203 is directly executed. Where, is the comprehensive weight value of the diversion path; Represents the reliability of the th community node on the th diversion path; Represents the load weight of the node in the same community on the diversion path; Represents the bearable load value of the node in the same community on the diversion path; Indicates that the same community node with serial number is associated with the node of the failed node.
 
        Specifically, when the authorization mode is single authorization mode, the authorization code of the authorized node and the public key of the authorized node are sent to the authorized node through blockchain to authorize the authorized node. When the authorization mode is multi authorization mode, there are one authorized node and M authorized nodes. For example, the authorization code of authorized node A and the public key of authorized node a are sent to authorized node a through blockchain to authorize node a; The authorization code of the authorized node B and the public key of the authorized node are sent to the authorized node B through the blockchain to authorize the authorized node B. When the authorization mode is group authorization mode, the authorized node, as the group owner, generates a group address in advance, generates a private key s, regenerates it into the address o corresponding to the private key s, and transmits the private key s and address o to the authorized node to group chat through the blockchain; The authorized node joins the group through private key s and address o; After joining the group, the group owner sends the authorization code of the authorized node and the public key of the authorized node to one or more authorized nodes in the group through the blockchain to authorize the authorized nodes.
 
        Specifically, after the authorization is completed, receive the blockchain data request, feed back the corresponding data to the corresponding authorized node according to the blockchain data request, and complete the data transmission. Although the preferred embodiments of the present application have been described, those skilled in the art may make additional changes and modifications to these embodiments once they have learned the basic inventive concept. Therefore, the scope of protection of this application is intended to be interpreted as including preferred embodiments and all changes and modifications that fall within the scope of this application. Obviously, those skilled in the art can make various changes and modifications to the application without departing from the spirit and scope of the application. Thus, if these modifications and variants of the application fall within the scope of the protection of the application and its equivalent technology, the application is also intended to include these modifications and variants.
 
        
Previous:Blockchain Distributed Accounting,Digital authentication: the company did not participate in the 2022 related information collected by the Technical Committee for standardization of blockchain and distributed accounting technology
Next:No more

Related articles:



© 2005-2032 | Blockchain Circle & & All Rights Reserved    Sitemap1 Sitemap2 If there is infringement, please contact us at: