CN111581276B - Enterprise IT supervision and management method, device and medium based on block chain - Google Patents

Enterprise IT supervision and management method, device and medium based on block chain Download PDF

Info

Publication number
CN111581276B
CN111581276B CN202010243744.1A CN202010243744A CN111581276B CN 111581276 B CN111581276 B CN 111581276B CN 202010243744 A CN202010243744 A CN 202010243744A CN 111581276 B CN111581276 B CN 111581276B
Authority
CN
China
Prior art keywords
ciphertext
branch
private
key pair
enterprise
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010243744.1A
Other languages
Chinese (zh)
Other versions
CN111581276A (en
Inventor
柯桓
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Inspur General Software Co Ltd
Original Assignee
Inspur General Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Inspur General Software Co Ltd filed Critical Inspur General Software Co Ltd
Priority to CN202010243744.1A priority Critical patent/CN111581276B/en
Publication of CN111581276A publication Critical patent/CN111581276A/en
Application granted granted Critical
Publication of CN111581276B publication Critical patent/CN111581276B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Databases & Information Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Computing Systems (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The application discloses an enterprise IT supervision and management method, equipment and a medium based on a block chain. The method comprises the steps that an initial node issues a manufacturing method of a first key pair and a second key pair; at least one branch node generates a first key pair and a second key pair according to a manufacturing method and establishes a secret library; the branch nodes encrypt the generated public information by adopting the first key pair to form a public ciphertext, and the public ciphertext is uploaded to the block chain, so that other branch nodes can decrypt to obtain the public information; the branch nodes adopt the second key to encrypt the generated private information on the branch nodes to form private ciphertexts, so that other branch nodes cannot decrypt to obtain the private information; and at least one other branch node stores the private ciphertext into the ciphertext library of the branch node. The method solves the problems that information barriers exist among branch companies and sub-companies in a group company, and public information is difficult to share; and the private information can be backed up in other branch companies and subsidiary companies, and can be found back in time when a disaster occurs.

Description

Enterprise IT supervision and management method, device and medium based on block chain
Technical Field
The present application relates to the field of blockchain application technologies, and in particular, to a method, a device, and a medium for enterprise IT supervision and management based on blockchains.
Background
At present, a large group company or a regional company composed of a plurality of companies often lacks an integrated enterprise IT supervision and management system, and management information generated by each branch company or sub-company in the large group company or the regional company is usually stored in the branch company or sub-company generating the management information respectively. The information sharing among companies in the whole group or area is difficult, and the authenticity and the validity of the information of the branch company or the subsidiary company acquired by the main company can not be ensured. Meanwhile, in each branch company or each subsidiary company, in order to prevent information from being damaged or lost due to disaster, one or more information backup systems or disaster backup systems are required to be equipped for the branch companies or the subsidiary companies, so that the information can be timely retrieved when the information is damaged or lost. However, if each branch company or sub-company needs to separately establish the information disaster recovery system, the operation cost of the whole group is increased undoubtedly.
Meanwhile, the blockchain technology has been gradually developed and matured at present and is beginning to be popularized and used in the fields of internet, financial transactions, digital currency and the like. The most important advantage is that the security of the information is ensured on the basic mechanism, and the validity of each piece of information is ensured through the modes of decentralization, data block encryption and the like. However, since each block needs to record a large amount of transaction information, it puts high demands on the computation amount and storage amount of the block nodes, and therefore, the technique cannot be widely popularized and applied. However, the design concept in the block chain technology is still referred and adapted by a large number of industries, and the basic effect is ensured, so that the block chain technology can be better adapted to the actual scene.
Therefore, there is a need to develop a new enterprise IT supervision and management method based on block chain technology to solve the above problems, and to help group companies or regional companies to better develop the method. The above description is included in the technical knowledge of the inventors, and does not necessarily constitute a prior art.
Disclosure of Invention
The embodiment of the specification provides an enterprise IT supervision and management method, equipment and a medium based on a block chain, which are used for solving the following technical problems in the prior art: the large group company or the regional union company lacks an integral enterprise IT supervision and management system, so that information among branch companies or sub-companies is rampant and difficult to share, and when a disaster occurs in one of the branch companies or the sub-companies, other companies are difficult to help the other companies to find back the information in time.
The embodiment of the specification adopts the following technical scheme:
an enterprise IT supervision and management method based on a block chain, wherein the block chain consists of an initial node and a plurality of branch nodes, the initial node and the branch nodes respectively represent different organizations, and the branch nodes are subordinate organizations or administration organizations of the initial node, and the method comprises the following steps:
the initial node issues a manufacturing method of a first key pair and a second key pair;
at least one branch node generates a first key pair and a second key pair according to the manufacturing method and establishes a secret library;
the branch nodes encrypt the generated public indication information by adopting a first key pair to form a public indication ciphertext, and upload the public indication ciphertext to an enterprise IT supervision and management block chain, so that other branch nodes can decrypt the public indication ciphertext to obtain the public indication information;
the branch nodes adopt a second key pair to encrypt the generated private information on the branch nodes to form private ciphertexts, so that other branch nodes cannot decrypt the private ciphertexts to obtain the private information;
and at least one other branch node stores the private ciphertext into a ciphertext library thereof.
Optionally, the method for enterprise IT supervision and management based on a blockchain further includes:
the branch node publicizes the private ciphertext on the enterprise IT supervision and management block chain;
at least some of the other branch nodes record the secret ciphertext,
if the number of other branch nodes recording the private ciphertext is larger than a preset threshold value, the private ciphertext is effective information;
and the at least one part of other branch nodes respectively store the private ciphertexts into the cipher text libraries thereof.
Optionally, the method for enterprise IT supervision and management based on a blockchain further includes:
the initial node sends out an encryption instruction, at least one branch node makes the second key pair based on the encryption instruction, and feeds the second key pair back to the initial node;
the initial node stores the second key pair and verifies the availability of the second key pair.
Optionally, the method for enterprise IT supervision and management based on a blockchain further includes:
at least one branch node splits the private ciphertext generated by the branch node, and respectively publicizes each split part on the enterprise IT supervision and management block chain;
recording one part and/or a plurality of parts of the secret ciphertext by other branch nodes;
if the number of other branch nodes recording one part and/or a plurality of parts of the private ciphertext is larger than a preset threshold value, one part and/or a plurality of parts of the private ciphertext are/is effective information;
and the other branch nodes respectively store one part and/or a plurality of parts of the secret ciphertext to the ciphertext libraries thereof.
Optionally, the block chain-based enterprise IT supervision management method further includes:
the initial node collects one part and/or a plurality of parts of the private ciphertext stored in the other branch node secret libraries, and recovers the private ciphertext by adopting the second key pair of the branch node.
Optionally, the method for enterprise IT supervision and management based on a blockchain further includes:
the initial node periodically gathers the publicity ciphertext uploaded to the enterprise IT surveillance management block chain and verifies the publicity ciphertext by using the first key pair,
and if the publicity ciphertext passes the verification, the publicity ciphertext is effective information.
Optionally, the method for enterprise IT supervision and management based on a blockchain further includes:
and the initial node periodically checks the time stamp of the private ciphertext by adopting the first key pair and the second key pair.
Optionally, the initial node comprises at least one of: the branch node comprises a group main company, a main control company, a monitoring mechanism and a reporting mechanism, wherein the branch node at least comprises one of the following items: division, subsidiary, other institutions.
Optionally, the block chain-based enterprise IT supervision management method further includes:
constructing an enterprise IT architecture, wherein the enterprise IT architecture at least comprises a plurality of nodes;
setting an initial node;
other nodes are each registered as a branch node on the enterprise IT architecture.
An enterprise IT supervision management device based on a blockchain, comprising:
at least one processor; and (c) a second step of,
a memory communicatively coupled to the at least one processor; wherein, the first and the second end of the pipe are connected with each other,
the memory stores instructions executable by the at least one processor to cause the at least one processor to:
the initial node issues a manufacturing method of a first key pair and a second key pair;
at least one branch node generates a first key pair and a second key pair according to the manufacturing method and establishes a secret library;
the branch nodes encrypt the generated public information by adopting a first key pair to form a public ciphertext and upload the public ciphertext to an enterprise IT supervision block chain, so that other branch nodes can decrypt the public ciphertext to obtain the public information;
the branch nodes adopt a second key pair to encrypt the generated private information on the branch nodes to form private ciphertexts, so that other branch nodes cannot decrypt the private ciphertexts to obtain the private information;
and at least one other branch node stores the private ciphertext into a ciphertext library thereof.
A non-transitory computer storage medium for blockchain based IT supervision management of an enterprise, storing computer-executable instructions configured to:
the initial node issues a manufacturing method of a first key pair and a second key pair;
at least one branch node generates a first key pair and a second key pair according to the manufacturing method and establishes a secret library;
the branch nodes encrypt the generated public indication information by adopting a first key pair to form a public indication ciphertext, and upload the public indication ciphertext to an enterprise IT supervision and management block chain, so that other branch nodes can decrypt the public indication ciphertext to obtain the public indication information;
the branch nodes adopt a second secret key to encrypt the generated private information on the branch nodes to form private ciphertexts, so that other branch nodes cannot decrypt the private ciphertexts to obtain the private information;
and at least one other branch node stores the private ciphertext into a ciphertext library thereof.
The embodiment of the specification adopts at least one technical scheme which can achieve the following beneficial effects:
(1) The block chain-based enterprise IT supervision and management method disclosed by the embodiment of the specification can effectively ensure the authenticity of information on the block chain of enterprise IT supervision and management. The publicity information generated by each branch node is uploaded to the block chain in an encrypted message mode, so that the authenticity and authority of the publicity information can be guaranteed, and the publicity information can be checked, checked and traceable. The private information generated by each branch node is encrypted by adopting the proprietary second secret key, is stored to other branch nodes in a link range in the form of proprietary ciphertexts, is backed up in other branch nodes on the premise of ensuring that the private information is not decrypted and obtained by other branch nodes, and can be timely retrieved from other branch nodes when the branch node has a disaster.
(2) In the method for enterprise IT supervision and management based on the block chain in the embodiment of the description, the threshold value is preset, and when enough other branch nodes record the private ciphertext, the private ciphertext is confirmed to be valid, so that the validity and tampering of the private ciphertext can be identified.
(3) In the enterprise IT supervision and management method based on the block chain in the embodiment of the present description, each branch node stores ITs private ciphertext to other branch nodes, which is also a way to increase the backup of the key data. Because the original information backup modes of all branch nodes are possibly different, the cross-node ciphertext backup is realized by the method to cross the backup modes of all branch nodes, so that the effectiveness of information backup can be ensured, the fault-tolerant complexity can be increased, and the operation cost of the whole group can be reduced.
(4) In the enterprise IT supervision and management method based on the block chain in the embodiment of the present specification, by splitting the private ciphertext and storing each split part to different branch nodes on the block chain, on one hand, private information generated by a single branch node can be protected from being leaked. On the other hand, the method can be used for timely retrieving the generated private information of the branch node when the information is lost or damaged.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the application and together with the description serve to explain the application and not to limit the application. In the drawings:
fig. 1 is a schematic flowchart of an enterprise IT supervision management method based on a block chain according to an embodiment of the present disclosure;
fig. 2 is a schematic structural diagram of an enterprise IT supervision management block chain provided in an embodiment of the present specification.
Detailed Description
To make the objects, technical solutions and advantages of the present disclosure more apparent, the technical solutions of the present disclosure will be clearly and completely described below with reference to specific embodiments of the present disclosure and the accompanying drawings. It should be apparent that the described embodiments are only some of the embodiments of the present application, and not all of the embodiments. All other embodiments obtained by a person skilled in the art without making any inventive step based on the embodiments in the description belong to the protection scope of the present application.
First, the technical concept of the technical solution disclosed in the present invention will be explained. At present, large group companies or regional union companies formed by combining a plurality of companies often lack an integral enterprise IT supervision and management system, and the treatment information generated by each branch company or sub-company is usually stored in the branch company or sub-company generating the treatment information. This results in difficulty in information sharing among companies within the whole group or area, and the main company cannot guarantee the authenticity and validity of the information of the branch company or the subsidiary company acquired by the main company. Meanwhile, in each branch company or each subsidiary company, in order to prevent information from being damaged or lost due to disaster, one or more information backup systems or disaster backup systems are required to be equipped for the branch companies or the subsidiary companies, so that the information can be timely retrieved when the information is damaged or lost. However, if each branch company or sub-company needs to separately establish the information disaster recovery system, the operation cost of the whole group is increased undoubtedly. In addition, the information backup modes of companies may be different, and the validity of information backup cannot be completely guaranteed. Therefore, there is a need to develop a new enterprise IT supervision and management method based on block chain technology to solve the above problems, and to help group companies or regional companies to better develop the method.
The technical solutions provided by the embodiments of the present application are described in detail below with reference to the accompanying drawings. Fig. 1 is a schematic flowchart of an enterprise IT supervision management method based on a block chain according to an embodiment of the present disclosure. Fig. 2 is a schematic structural diagram of an enterprise IT supervision management block chain provided in an embodiment of the present specification.
As shown in fig. 1 and fig. 2, an enterprise IT supervision and management method based on a block chain, wherein the block chain for enterprise IT supervision and management is composed of an initial node and a plurality of branch nodes, the initial node and the branch nodes represent different organizations respectively, the branch nodes are subordinate organizations or administration organizations of the initial node, and the method includes a manufacturing method that the initial node issues a first key pair and a second key pair; at least one branch node generates a first key pair and a second key pair according to a manufacturing method and establishes a secret library; the branch nodes encrypt the generated public information by adopting the first key pair to form a public information ciphertext, and the public information ciphertext is uploaded to an enterprise IT supervision and management block chain, so that other branch nodes can decrypt the public information to obtain the public information; the branch nodes adopt the second secret key to encrypt the generated private information on the branch nodes to form private ciphertexts, so that other branch nodes cannot decrypt the private ciphertexts to obtain the private information; and at least one other branch node stores the private ciphertext into the ciphertext library of the branch node.
The method of the embodiment can effectively ensure the authenticity of the information on the enterprise IT supervision and management block chain. The publicity information generated by each branch node is uploaded to the block chain in an encrypted message mode, so that the authenticity and authority of the publicity information can be guaranteed, and the publicity information can be checked and traced. The private information generated by each branch node is encrypted by adopting the special second key pair, is stored to other branch nodes in a link range in a special ciphertext mode, is backed up in other branch nodes on the premise of ensuring that the private information is not decrypted and obtained by other branch nodes, and can be timely retrieved from other branch nodes when a disaster happens to the branch node.
In this embodiment, the block chain-based enterprise IT supervision and management method further includes that the branch node publicizes the private ciphertext on the enterprise IT supervision and management block chain; recording the private ciphertext by at least part of other branch nodes, and if the number of the other branch nodes recording the private ciphertext is greater than a preset threshold value, taking the private ciphertext as effective information; at least part of other branch nodes respectively store the private ciphertexts into the cipher text libraries.
And recording the private ciphertext by adopting a plurality of other branch nodes, and confirming that the private ciphertext is effective only when enough other branch nodes record the private ciphertext so as to ensure the validity and tampering of the private ciphertext to be identifiable.
Meanwhile, each branch node stores the private ciphertext to other branch nodes respectively, which is also a way to increase the backup of the key data. Because the original information backup modes of all the branch nodes are possibly different, the cross-node ciphertext backup is realized by the method to cross the backup modes of all the branch nodes, so that the effectiveness of information backup can be ensured, the fault-tolerant complexity can be increased, and the operation cost of the whole group can be reduced.
In this embodiment, the block chain-based enterprise IT supervision and management method further includes that the initial node sends out an encryption instruction, and at least one branch node makes a second key pair based on the encryption instruction and feeds the second key pair back to the initial node; the initial node stores the second key pair and verifies the availability of the second key pair. The second key pair special for each branch node is only stored on the local node and the initial node, so that the initial node can conveniently and regularly patrol the private ciphertext reported by each branch node and check the running condition of the link environment.
In this embodiment, the block chain-based enterprise IT supervision and management method further includes that at least one branch node splits a private ciphertext generated by the branch node, and respectively exposes each split part on an enterprise IT supervision and management block chain; the other branch nodes record one part and/or a plurality of parts of the private ciphertext with the time stamp; if the number of other branch nodes recording one part and/or a plurality of parts of the private ciphertext is larger than a preset threshold value, one part and/or a plurality of parts of the private ciphertext are/is effective information; and the other branch nodes respectively store one part and/or a plurality of parts of the private ciphertext to the ciphertext libraries thereof.
When a disaster occurs, private information on a certain branch node is damaged or lost, the initial node or the branch node generating the private information can gather one part and/or a plurality of parts of a private ciphertext encrypted by the private information stored in a private library of other branch nodes, and the private ciphertext is decrypted and recovered by adopting the private second key of the branch node.
According to the method, the private ciphertext is split, and each split part is stored to different branch nodes on the block chain, so that on one hand, other branch nodes cannot obtain the complete private ciphertext, and the private information generated by a single branch node is protected from being leaked. On the other hand, the method can be used for timely retrieving the generated private information of the branch node when the information is lost or damaged.
In this embodiment, the block chain-based enterprise IT supervision and management method further includes the step that the initial node periodically collects the public indication ciphertext uploaded to the enterprise IT supervision and management block chain, the public indication ciphertext is verified by using the first key, and if the public indication ciphertext passes the verification, the public indication ciphertext is valid information.
In this embodiment, the method for enterprise IT supervision and management based on the blockchain further includes that the initial node periodically checks the timestamp of the private ciphertext by using the first key pair and the second key pair to confirm that the private ciphertext is not tampered.
In this embodiment, the initial node may include at least one of the following items: group head office, main control company, monitoring mechanism and reporting mechanism. The branching node may for instance comprise at least one of: division, subsidiary, other institutions.
In this embodiment, the block chain-based enterprise IT supervision and management method further includes constructing an enterprise IT architecture, where the enterprise IT architecture is at least composed of a plurality of nodes; setting an initial node; other nodes are each registered as a branch node on the enterprise IT architecture.
The enterprise IT management model of the embodiment has no specific requirements on management software used by each node, and only needs to introduce related keys and meet link operation requirements, so that the investment cost is reduced to the maximum extent.
For convenience of understanding, the specific contents of the above block chain-based enterprise IT supervision and management method are further described below:
first, an enterprise IT architecture needs to be built. The enterprise IT architecture of the embodiment of the application is mainly used for IT governance operation of large-scale regional joint companies in large-scale group companies or in specific regions, such as certain geographic regions and certain administrative regions. In a large group company, a main company is provided with a plurality of sub-companies, each sub-company or each sub-company uses different management software, and databases of the companies are independent.
The enterprise IT architecture is composed of an initial node and a plurality of branch nodes, wherein the initial node and the branch nodes respectively represent different organizations, and the branch nodes represent subordinate organizations or administration organizations of the initial node. The initial node may be, for example, a head office or a main control company, and the branch nodes may be, for example, other branch offices or subordinate companies. Alternatively, the initial node may be a corporate head office, or may be a dedicated monitoring organization, reporting-up organization, etc. in a corporate group.
After the initial node is determined, a brand-new link environment is created by the initial node, and the enterprise IT management model is initialized, wherein the method comprises a first key pair issuing method, a second key pair manufacturing method and a link butt joint format document.
The first key pair is fully disclosed within the link and is available to both the originating node and all of the branch nodes. The first key pair comprises a public key and a public private key, and is mainly used for reading public information in the link, such as daily information and the like.
The second key pair is a private key pair produced by each branch node according to the manufacturing method, and comprises a private public key and a private key. The second key pair is used to encrypt secret information, such as production information, etc., at the branch node. After each branch node generates its own second key pair, the second key pair is reported to the initial node. That is, the second key pair is only stored in the initial node and the branch node to which the second key pair belongs, and cannot be obtained by other branch nodes. After the initial node stores the second key pairs of the branch nodes, the initial node checks the second key pairs respectively and verifies the availability of the second key pairs.
When the branch node makes the second key pair, a secret library of the branch node is also established, an IT manufacturer is contacted to carry out extension butt joint development, and a related production environment is butt-jointed to a link environment of the initial node.
The branch node periodically sends a public ciphertext message to the initial node and implements a cross-node (company) secret ciphertext backup strategy. The branch nodes encrypt the generated public information such as reports, announcements and the like by adopting a first key pair to form public cryptographs, the public cryptographs are uploaded to an enterprise IT supervision and management block chain through a company software butt-joint link interface according to a specified format, the public cryptographs are verified and disclosed on the link by the initial node, and other branch nodes can decrypt the public cryptographs to obtain all public information.
Meanwhile, the branch node accesses the business environment management software and the database of the company into a link interface, secret information such as warehousing change of production information and the like generated on the branch node needs to be encrypted by adopting a second key to form private ciphertexts, the private ciphertexts can be stored in a cipher text library by other branch nodes, but the other branch nodes cannot decrypt the private ciphertexts and cannot obtain the private information of a certain branch node.
In one embodiment, the private ciphertext is recorded by a plurality of other branch nodes with a timestamp, if the number of the other branch nodes recording the private ciphertext is greater than a preset threshold, the private ciphertext is valid information, and the other branch nodes recording the private ciphertext store the private ciphertext into respective ciphertext libraries.
In another embodiment, the branch node may split the private ciphertext generated thereon into a plurality of parts, respectively disclose the split parts on the enterprise IT supervision and management block chain, and select one and/or a plurality of the split parts to be recorded with a timestamp by other branch nodes.
If the part A after the secret ciphertext splitting is recorded by a plurality of other branch nodes, and the number of the other branch nodes recording the part A is larger than the preset threshold value, the part A is effective information and can be recorded into a ciphertext library of the part A by the other branch nodes.
The secret cipher text generated at one branch node by the above method may be divided into N portions, and each of the N portions may be stored at a different plurality of other branch nodes. The other branch nodes can not obtain the complete secret ciphertext respectively, so that the secret information generated by a single branch node can be protected from being leaked. Meanwhile, when a single branch node has a disaster and the stored private information is damaged or lost, the branch node can collect all parts of the private ciphertext stored in the secret library by other branch nodes on the enterprise IT supervision and management block chain, and then decrypt the collected parts by adopting the special second key of the branch node, so that the private information can be recovered.
In addition, the initial node also regularly patrols the public ciphertext and the private ciphertext reported by each branch node, and checks the operation condition of the link environment. The method comprises the steps that an initial node collects the public display ciphertexts uploaded to an enterprise IT supervision and management block chain regularly, the public display ciphertexts are verified by adopting a first secret key pair, and if the public display ciphertexts pass the verification, the public display ciphertexts are effective information. The initial node can also use the first key pair and the second key pair of each branch node to periodically check the secret information of each branch node to check whether the modification condition such as timestamp change exists.
At present, the requirements of each group enterprise on the safety and authenticity of information are increasing in the market. By adopting the method, the authenticity of the enterprise data can be effectively ensured. The production data of the enterprise is stored to each company of the specified link range in a proprietary ciphertext mode so as to ensure that the validity and the tampering of the data are recognizable. Meanwhile, the official authority of the notice information of the company outside the link environment can be ensured by adopting the mode of encrypting the message by the first key, and the notice information can be ensured to be visible and traceable.
Meanwhile, the method realizes the mode that the company production business data is stored in other companies by adopting the private ciphertext, so that the problem of data tampering can be prevented, and a key data backup way is added. In the existing method, the business data backup modes of all companies are different, and the effectiveness of data backup cannot be completely guaranteed. However, by adopting the method of the embodiment example, the corporate ciphertext backup modes are crossed, so that the validity of data backup can be ensured, and the fault tolerance complexity can be increased.
The embodiment also provides a device for enterprise IT supervision and management based on the block chain, wherein the device comprises:
at least one processor; and (c) a second step of,
a memory communicatively coupled to the at least one processor; wherein the content of the first and second substances,
the memory stores instructions executable by the at least one processor to cause the at least one processor to:
the initial node issues a manufacturing method of a first key pair and a second key pair;
at least one branch node generates a first key pair and a second key pair according to the manufacturing method and establishes a secret library;
the branch nodes encrypt the generated public information by adopting a first key pair to form a public ciphertext and upload the public ciphertext to an enterprise IT supervision block chain, so that other branch nodes can decrypt the public ciphertext to obtain the public information;
the branch nodes adopt a second key pair to encrypt the generated private information on the branch nodes to form private ciphertexts, so that other branch nodes cannot decrypt the private ciphertexts to obtain the private information;
and at least one other branch node stores the private ciphertext into a ciphertext library thereof.
The present embodiments also provide a non-volatile computer storage medium for block chain based enterprise IT supervision management, storing computer-executable instructions, wherein the computer-executable instructions are configured to:
the initial node issues a manufacturing method of a first key pair and a second key pair;
at least one branch node generates a first key pair and a second key pair according to the manufacturing method and establishes a secret library;
the branch nodes encrypt the generated public indication information by adopting a first key pair to form a public indication ciphertext, and upload the public indication ciphertext to an enterprise IT supervision and management block chain, so that other branch nodes can decrypt the public indication ciphertext to obtain the public indication information;
the branch nodes adopt a second key pair to encrypt the generated private information on the branch nodes to form private ciphertexts, so that other branch nodes cannot decrypt the private ciphertexts to obtain the private information;
at least one other branch node stores the secret ciphertext to its ciphertext store.
The embodiments in the present application are described in a progressive manner, and the same and similar parts among the embodiments can be referred to each other, and each embodiment focuses on differences from other embodiments. In particular, for the device and media embodiments, the description is relatively simple, as it is substantially similar to the method embodiments, and reference may be made to some description of the method embodiments for relevant points.
The device and the medium provided by the embodiment of the application correspond to the method one to one, so the device and the medium also have the similar beneficial technical effects as the corresponding method, and the beneficial technical effects of the method are explained in detail above, so the beneficial technical effects of the device and the medium are not repeated herein.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is directed to methods, apparatus (systems), and computer program products according to embodiments of the present invention
A flowchart and/or block diagram of an article. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In a typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include forms of volatile memory in a computer readable medium, random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), static Random Access Memory (SRAM), dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), read Only Memory (ROM), electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrases "comprising one of 8230; \8230;" 8230; "does not exclude the presence of additional like elements in a process, method, article, or apparatus that comprises that element.
The above description is only an example of the present application and is not intended to limit the present application. Various modifications and changes may occur to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the scope of the claims of the present application.

Claims (10)

1. An enterprise IT supervision and management method based on a block chain is characterized in that the enterprise IT supervision and management block chain is composed of an initial node and a plurality of branch nodes, the initial node and the branch nodes respectively represent different organizations, and the branch nodes are subordinate organizations or jurisdiction organizations of the initial node, the method comprises the following steps:
the initial node issues a manufacturing method of a first key pair and a second key pair;
at least one branch node generates a first key pair and a second key pair according to the manufacturing method and establishes a secret library;
the branch nodes encrypt the generated public indication information by adopting a first key pair to form a public indication ciphertext, and upload the public indication ciphertext to an enterprise IT supervision and management block chain, so that other branch nodes can decrypt the public indication ciphertext to obtain the public indication information;
the branch nodes adopt a second secret key to encrypt the generated private information on the branch nodes to form private ciphertexts, so that other branch nodes cannot decrypt the private ciphertexts to obtain the private information;
at least one other branch node stores the secret ciphertext to its ciphertext store.
2. The blockchain-based enterprise IT oversight management method of claim 1, further comprising:
the branch node publicizes the private ciphertext on the enterprise IT supervision and management block chain;
at least a portion of the other branch nodes record the secret ciphertext,
if the number of other branch nodes recording the private cipher text is larger than a preset threshold value, the private cipher text is effective information;
and the at least one part of other branch nodes respectively store the private ciphertexts into the cipher text libraries thereof.
3. The blockchain-based enterprise IT oversight management method of claim 1, further comprising:
the initial node sends out an encryption instruction, at least one branch node makes the second key pair based on the encryption instruction, and feeds the second key pair back to the initial node;
the initial node stores the second key pair and verifies the availability of the second key pair.
4. The blockchain-based enterprise IT supervision management method according to claim 1, wherein the method further comprises:
at least one branch node splits the private ciphertext generated by the branch node, and respectively publicizes each split part on the enterprise IT supervision and management block chain;
recording one part and/or a plurality of parts of the secret ciphertext by other branch nodes;
if the number of other branch nodes recording one part and/or a plurality of parts of the private ciphertext is larger than a preset threshold value, the one part and/or the plurality of parts of the private ciphertext are/is valid information;
and the other branch nodes respectively store one part and/or a plurality of parts of the private ciphertext to the ciphertext library thereof.
5. The blockchain-based enterprise IT supervision management method according to claim 3, the method further comprising:
and the initial node summarizes one part and/or a plurality of parts of the private ciphertext stored in the other branch node secret libraries, and recovers the private ciphertext by adopting the second secret key pair of the branch node.
6. The blockchain-based enterprise IT oversight management method of claim 1, further comprising:
the initial node periodically gathers the publicity ciphertext uploaded to the enterprise IT surveillance management block chain and verifies the publicity ciphertext by using the first key pair,
and if the publicity ciphertext passes the verification, the publicity ciphertext is valid information.
7. The blockchain-based enterprise IT oversight management method of claim 1, further comprising:
and the initial node periodically checks the time stamp of the private ciphertext by adopting the first key pair and the second key pair.
8. The blockchain-based enterprise IT supervision management method according to claim 1, wherein the initial node includes at least one of: the branch node comprises a group main company, a main control company, a monitoring mechanism and a reporting mechanism, wherein the branch node at least comprises one of the following items: division, subsidiaries, other organizations.
9. An apparatus for block chain based IT supervision management of an enterprise, comprising:
at least one processor; and the number of the first and second groups,
a memory communicatively coupled to the at least one processor; wherein the content of the first and second substances,
the memory stores instructions executable by the at least one processor to enable the at least one processor to:
the initial node issues a manufacturing method of a first key pair and a second key pair;
at least one branch node generates a first key pair and a second key pair according to the manufacturing method and establishes a secret library;
the branch nodes encrypt the generated public indication information by adopting a first key pair to form a public indication ciphertext, and upload the public indication ciphertext to an enterprise IT supervision and management block chain, so that other branch nodes can decrypt the public indication ciphertext to obtain the public indication information;
the branch nodes adopt a second secret key to encrypt the generated private information on the branch nodes to form private ciphertexts, so that other branch nodes cannot decrypt the private ciphertexts to obtain the private information;
and at least one other branch node stores the private ciphertext into a ciphertext library thereof.
10. A non-transitory computer storage medium for blockchain based IT supervision management of an enterprise, storing computer-executable instructions configured to:
the initial node issues a manufacturing method of a first key pair and a second key pair;
at least one branch node generates a first key pair and a second key pair according to the manufacturing method and establishes a secret library;
the branch nodes encrypt the generated public indication information by adopting a first key pair to form a public indication ciphertext, and upload the public indication ciphertext to an enterprise IT supervision and management block chain, so that other branch nodes can decrypt the public indication ciphertext to obtain the public indication information;
the branch nodes adopt a second key pair to encrypt the generated private information on the branch nodes to form private ciphertexts, so that other branch nodes cannot decrypt the private ciphertexts to obtain the private information;
and at least one other branch node stores the private ciphertext into a ciphertext library thereof.
CN202010243744.1A 2020-03-31 2020-03-31 Enterprise IT supervision and management method, device and medium based on block chain Active CN111581276B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010243744.1A CN111581276B (en) 2020-03-31 2020-03-31 Enterprise IT supervision and management method, device and medium based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010243744.1A CN111581276B (en) 2020-03-31 2020-03-31 Enterprise IT supervision and management method, device and medium based on block chain

Publications (2)

Publication Number Publication Date
CN111581276A CN111581276A (en) 2020-08-25
CN111581276B true CN111581276B (en) 2023-04-07

Family

ID=72126145

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010243744.1A Active CN111581276B (en) 2020-03-31 2020-03-31 Enterprise IT supervision and management method, device and medium based on block chain

Country Status (1)

Country Link
CN (1) CN111581276B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116910826B (en) * 2023-09-13 2023-12-15 电能易购(北京)科技有限公司 Purchasing data storage and sharing system for electric power equipment bidding

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107294709A (en) * 2017-06-27 2017-10-24 阿里巴巴集团控股有限公司 A kind of block chain data processing method, apparatus and system
WO2020049357A1 (en) * 2018-09-06 2020-03-12 Bank Of Montreal Systems and methods for encryption of data on a blockchain
CN110944301A (en) * 2019-12-02 2020-03-31 重庆瑞坤科技发展股份有限公司 Intelligent cell equipment monitoring system based on block chain and key management method

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107294709A (en) * 2017-06-27 2017-10-24 阿里巴巴集团控股有限公司 A kind of block chain data processing method, apparatus and system
WO2020049357A1 (en) * 2018-09-06 2020-03-12 Bank Of Montreal Systems and methods for encryption of data on a blockchain
CN110944301A (en) * 2019-12-02 2020-03-31 重庆瑞坤科技发展股份有限公司 Intelligent cell equipment monitoring system based on block chain and key management method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
刘格昌 ; *** ; .基于可搜索加密的区块链数据隐私保护机制.计算机应用.2019,(S2),全文. *

Also Published As

Publication number Publication date
CN111581276A (en) 2020-08-25

Similar Documents

Publication Publication Date Title
TWI694350B (en) Information supervision method and device based on blockchain
CN107425982B (en) Method and block chain for realizing intelligent contract data encryption
WO2018095275A1 (en) Data access method, system and apparatus
CN110032545A (en) File memory method, system and electronic equipment based on block chain
CN108111299B (en) Real-time audit system of traceing back based on block chain technique
TW201826772A (en) Blockchain technology-based robust atm network system and information processing method therefor
US11128463B1 (en) Cost-efficient IOT forensics framework with blockchain
CN101630431B (en) Method for processing multi-client centralized invoicing data
CN109951490A (en) Webpage integrity assurance, system and electronic equipment based on block chain
CN111125776A (en) Operation data tamper-proofing method based on block chain
CN111046346A (en) Book copyright protection platform based on block chain, equipment and medium
CN110018924A (en) A kind of file damage preventing method based on block chain and correcting and eleting codes
CN111931195A (en) User private key management method, device and medium based on block chain
CN113704353B (en) Block chain credit investigation method integrating information chain and privacy chain
CN110866261A (en) Data processing method and device based on block chain and storage medium
CN112491804A (en) ICS (Internet connection sharing) security policy method based on block chain
CN110826084A (en) Block chain-based internet public service system
CN111581276B (en) Enterprise IT supervision and management method, device and medium based on block chain
CN102122416A (en) Multi-client centralized invoice printing processing method
CN112036914A (en) Block chain-based edible agricultural product quality certificate management method, equipment and medium
CN113259084A (en) Method and device for pre-warning of mortgage risk of movable property, computer equipment and storage medium
CN111046267A (en) Method, device and medium for processing network rumors based on block chains
CN111008386A (en) Method, device and medium for managing household registration based on block chain
CN107516214B (en) Credit card anti-theft method based on block chain
CN100452026C (en) Data once writing method and database safety management method based on the same method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20230315

Address after: 250101 Inspur science and Technology Park, 1036 Inspur Road, hi tech Zone, Jinan City, Shandong Province

Applicant after: Inspur Genersoft Co.,Ltd.

Address before: 250101 Inspur science and Technology Park, 1036 Inspur Road, hi tech Zone, Jinan City, Shandong Province

Applicant before: SHANDONG INSPUR GENESOFT INFORMATION TECHNOLOGY Co.,Ltd.

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant