CN111950005A - Highway engineering data uploading method and system - Google Patents

Highway engineering data uploading method and system Download PDF

Info

Publication number
CN111950005A
CN111950005A CN202010788148.1A CN202010788148A CN111950005A CN 111950005 A CN111950005 A CN 111950005A CN 202010788148 A CN202010788148 A CN 202010788148A CN 111950005 A CN111950005 A CN 111950005A
Authority
CN
China
Prior art keywords
file
data
database
file data
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010788148.1A
Other languages
Chinese (zh)
Inventor
胡斌喜
王�锋
董金德
鲁涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Gs Unis Intelligent Transportation System & Control Technology Co ltd
Original Assignee
Gs Unis Intelligent Transportation System & Control Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Gs Unis Intelligent Transportation System & Control Technology Co ltd filed Critical Gs Unis Intelligent Transportation System & Control Technology Co ltd
Priority to CN202010788148.1A priority Critical patent/CN111950005A/en
Publication of CN111950005A publication Critical patent/CN111950005A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Databases & Information Systems (AREA)
  • Power Engineering (AREA)
  • Storage Device Security (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The embodiment of the invention provides a highway engineering data uploading method and a system, comprising the following steps: sending the local file data to a server through a data transmission protocol; after receiving the file data, the server end places the file on the ground and performs file encryption processing; encrypting the file data through an encryption algorithm to generate a file fingerprint, and storing the file data in a database; generating two-dimensional codes corresponding to the file data one by one; and when the two-dimensional code is scanned and identified, reading file data stored in the database, thereby verifying whether the uploaded file is modified.

Description

Highway engineering data uploading method and system
Technical Field
The invention relates to the technical field of block chains, in particular to a highway engineering data uploading method and a highway engineering data uploading system.
Background
After the traditional traffic road engineering process data files are uploaded and stored, the online files are easily modified artificially, the offline files cannot be traced after being modified, and the safety of the files in the transmission and storage processes cannot be guaranteed.
Disclosure of Invention
In view of the above technical problems, embodiments of the present invention provide a method and a system for uploading highway engineering data, which prevent online files from being manually modified.
A highway engineering data uploading method comprises the following steps:
sending the local file data to a server through a data transmission protocol;
after receiving the file data, the server end places the file on the ground and performs file encryption processing;
encrypting the file data through an encryption algorithm to generate a file fingerprint, and storing the file data in a database;
generating two-dimensional codes corresponding to the file data one by one;
and when the two-dimensional code is scanned and identified, reading file data stored in the database, thereby verifying whether the uploaded file is modified.
The data transmission protocol is an HTTP protocol.
The encryption algorithm is the MD5 algorithm.
The database is an SQL database.
The local document data includes laboratory data and process data.
A highway engineering data uploading system comprises a user end and a server end, wherein
The client sends the local file data to the server through a data transmission protocol;
after receiving the file data, the server end places the file on the ground and performs file encryption processing;
encrypting the file data through an encryption algorithm to generate a file fingerprint, and storing the file data in a database;
generating two-dimensional codes corresponding to the file data one by one;
and when the two-dimensional code is scanned and identified, reading file data stored in the database, thereby verifying whether the uploaded file is modified.
The data transmission protocol is an HTTP protocol.
The encryption algorithm is the MD5 algorithm.
The database is an SQL database.
The local document data includes laboratory data and process data.
The invention introduces the uploading of highway engineering data into a block chain technology. Firstly, generating a specific hash value for each file through an MD5 encryption algorithm when the file is uploaded, extracting the hash value generated when the file is uploaded, and backing up the uploaded file into MYSQL data; secondly, extracting the hash value in the file uploading process, generating a file fingerprint, uploading the file fingerprint information to a block chain, and storing and managing the specific information of the file by the block chain. And finally, acquiring the uploaded file, generating a corresponding two-dimensional code on the file, printing a paper file, scanning and verifying through external equipment (such as a WeChat applet), tracing the content of the file, and verifying whether the file is modified after being uploaded, so that the file uploaded through the file interface is ensured not to be modified.
Drawings
The invention may be better understood from the following description of specific embodiments thereof taken in conjunction with the accompanying drawings, in which:
other features, objects and advantages of the invention will become apparent from the following detailed description of non-limiting embodiments with reference to the accompanying drawings in which like or similar reference characters refer to the same or similar parts.
Fig. 1 is a file upload flow diagram.
FIG. 2 is a file tracing flow diagram.
Detailed Description
Features and exemplary embodiments of various aspects of the present invention will be described in detail below. In the following detailed description, numerous specific details are set forth in order to provide a thorough understanding of the present invention. It will be apparent, however, to one skilled in the art that the present invention may be practiced without some of these specific details. The following description of the embodiments is merely intended to provide a better understanding of the present invention by illustrating examples of the present invention. The present invention is in no way limited to any specific configuration and algorithm set forth below, but rather covers any modification, replacement or improvement of elements, components or algorithms without departing from the spirit of the invention. In the following description, well-known structures and techniques are not shown in order to avoid unnecessarily obscuring the present invention.
Example embodiments will now be described with reference to the accompanying drawings, which may be embodied in various forms and should not be construed as limited to the embodiments set forth herein; rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the concept of example embodiments to those skilled in the art.
Furthermore, the described features, structures, or characteristics may be combined in any suitable manner in one or more embodiments. In the following description, numerous specific details are provided to provide a thorough understanding of embodiments of the invention. One skilled in the relevant art will recognize, however, that the invention may be practiced without one or more of the specific details, or with other methods, components, materials, and so forth. In other instances, well-known structures, materials, or operations are not shown or described in detail to avoid obscuring aspects of the invention.
Referring to fig. 1 and 2, the present invention provides a method for uploading road engineering data, including:
sending local file data (such as laboratory data and process data) to a server through a data transmission protocol (such as an HTTP protocol);
after receiving file data, the server side lands the files and encrypts the files, each file generates a specific hash value, and the hash values generated during file uploading are extracted;
encrypting the file data through an encryption algorithm to generate a file fingerprint, and storing the file data in a database for a user to access;
generating two-dimensional codes corresponding to the file data one by one, and identifying the two-dimensional codes through scanning to read the related file data, but the file data cannot be modified at the moment, and usually only the file data can be read and cannot be written;
and when the two-dimensional code is scanned and identified, reading file data stored in the database, thereby verifying whether the uploaded file is modified.
The data transmission protocol is an HTTP protocol or other data transmission protocols.
The encryption algorithm is the MD5 algorithm or other encryption algorithms.
The database is an SQL database or other databases.
The local document data includes laboratory data and process data, and the document format is usually readable and editable or readable but not editable.
The embodiment of the invention also provides a highway engineering data uploading system, which comprises a user side and a server side, wherein the user side and the server side are connected with the road engineering data uploading system
Sending local file data (such as laboratory data and process data) to a server through a data transmission protocol (such as an HTTP protocol);
after receiving file data, the server side lands the files and encrypts the files, each file generates a specific hash value, and the hash values generated during file uploading are extracted;
encrypting the file data through an encryption algorithm to generate a file fingerprint, and storing the file data in a database for a user to access;
generating two-dimensional codes corresponding to the file data one by one, and identifying the two-dimensional codes through scanning to read the related file data, but the file data cannot be modified at the moment, and usually only the file data can be read and cannot be written;
and when the two-dimensional code is scanned and identified, reading file data stored in the database, thereby verifying whether the uploaded file is modified.
The data transmission protocol is an HTTP protocol or other data transmission protocols.
The encryption algorithm is the MD5 algorithm or other encryption algorithms.
The database is an SQL database or other databases.
The local document data includes laboratory data and process data, and the document format is usually readable and editable or readable but not editable.
The invention introduces the uploading of highway engineering data into a block chain technology. Firstly, generating a specific hash value for each file through an MD5 encryption algorithm when the file is uploaded, extracting the hash value generated when the file is uploaded, and backing up the uploaded file into MYSQL data; secondly, extracting the hash value in the file uploading process, generating a file fingerprint, uploading the file fingerprint information to a block chain, and storing and managing the specific information of the file by the block chain. And finally, acquiring the uploaded file, generating a corresponding two-dimensional code on the file, printing a paper file, scanning and verifying through external equipment (such as a WeChat applet), tracing the content of the file, and verifying whether the file is modified after being uploaded, so that the file uploaded through the file interface is ensured not to be modified.
The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present invention. Various modifications to this embodiment will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the invention. Thus, the present invention is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.
It will be appreciated by persons skilled in the art that the above embodiments are illustrative and not restrictive. Different features which are present in different embodiments may be combined to advantage. Other variations to the disclosed embodiments can be understood and effected by those skilled in the art upon studying the specification and the claims. In the claims, the term "comprising" does not exclude other means or steps; the indefinite article "a" does not exclude a plurality; the terms "first" and "second" are used to denote a name and not to denote any particular order.

Claims (10)

1. A highway engineering data uploading method comprises the following steps:
sending the local file data to a server through a data transmission protocol;
after receiving the file data, the server end places the file on the ground and performs file encryption processing;
encrypting the file data through an encryption algorithm to generate a file fingerprint, and storing the file data in a database;
generating two-dimensional codes corresponding to the file data one by one;
and when the two-dimensional code is scanned and identified, reading file data stored in the database, thereby verifying whether the uploaded file is modified.
2. The method of claim 1,
the data transmission protocol is an HTTP protocol.
3. The method of claim 1,
the encryption algorithm is the MD5 algorithm.
4. The method of claim 1,
the database is an SQL database.
5. The method of claim 1,
the local document data includes laboratory data and process data.
6. A highway engineering data uploading system comprises a user end and a server end, wherein
The client sends the local file data to the server through a data transmission protocol;
after receiving the file data, the server end places the file on the ground and performs file encryption processing;
encrypting the file data through an encryption algorithm to generate a file fingerprint, and storing the file data in a database;
generating two-dimensional codes corresponding to the file data one by one;
and when the two-dimensional code is scanned and identified, reading file data stored in the database, thereby verifying whether the uploaded file is modified.
7. The system of claim 6,
the data transmission protocol is an HTTP protocol.
8. The system of claim 6,
the encryption algorithm is the MD5 algorithm.
9. The system of claim 6,
the database is an SQL database.
10. The system of claim 6,
the local document data includes laboratory data and process data.
CN202010788148.1A 2020-08-07 2020-08-07 Highway engineering data uploading method and system Pending CN111950005A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010788148.1A CN111950005A (en) 2020-08-07 2020-08-07 Highway engineering data uploading method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010788148.1A CN111950005A (en) 2020-08-07 2020-08-07 Highway engineering data uploading method and system

Publications (1)

Publication Number Publication Date
CN111950005A true CN111950005A (en) 2020-11-17

Family

ID=73332616

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010788148.1A Pending CN111950005A (en) 2020-08-07 2020-08-07 Highway engineering data uploading method and system

Country Status (1)

Country Link
CN (1) CN111950005A (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150121556A1 (en) * 2013-10-29 2015-04-30 Kabushiki Kaisha Yaskawa Denki Industrial equipment management system, industrial equipment management server, industrial equipment management method, and information storage medium
CN105701367A (en) * 2016-03-21 2016-06-22 冯颖 Security system for Internet original commercial works
CN106682457A (en) * 2016-12-16 2017-05-17 北京握奇智能科技有限公司 Picture copyright protection method and picture copyright protection system based on blockchain technology
CN107729576A (en) * 2017-11-28 2018-02-23 北京筑业志远软件开发有限公司 The management method and system of archives
CN107819777A (en) * 2017-11-17 2018-03-20 北京亿生生网络科技有限公司 A kind of data based on block chain technology deposit card method and system
AU2018100311A4 (en) * 2017-07-05 2018-04-26 Chengdu University Of Information Technology A File Access Control System Based on Cloud Storage
CN110391914A (en) * 2019-09-18 2019-10-29 尤尼泰克(嘉兴)信息技术有限公司 A kind of file acquisition method and equipment, two-dimensional code generation method based on two dimensional code
CN110795753A (en) * 2019-11-08 2020-02-14 深圳市理约云信息管理有限公司 File security protection system, file security sharing method and security reading method
CN111177763A (en) * 2020-01-03 2020-05-19 玉溪市电子政务内网信息技术中心 Two-dimensional code electronic encryption and decryption management system and method for file multiple encryption

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150121556A1 (en) * 2013-10-29 2015-04-30 Kabushiki Kaisha Yaskawa Denki Industrial equipment management system, industrial equipment management server, industrial equipment management method, and information storage medium
CN105701367A (en) * 2016-03-21 2016-06-22 冯颖 Security system for Internet original commercial works
CN106682457A (en) * 2016-12-16 2017-05-17 北京握奇智能科技有限公司 Picture copyright protection method and picture copyright protection system based on blockchain technology
AU2018100311A4 (en) * 2017-07-05 2018-04-26 Chengdu University Of Information Technology A File Access Control System Based on Cloud Storage
CN107819777A (en) * 2017-11-17 2018-03-20 北京亿生生网络科技有限公司 A kind of data based on block chain technology deposit card method and system
CN107729576A (en) * 2017-11-28 2018-02-23 北京筑业志远软件开发有限公司 The management method and system of archives
CN110391914A (en) * 2019-09-18 2019-10-29 尤尼泰克(嘉兴)信息技术有限公司 A kind of file acquisition method and equipment, two-dimensional code generation method based on two dimensional code
CN110795753A (en) * 2019-11-08 2020-02-14 深圳市理约云信息管理有限公司 File security protection system, file security sharing method and security reading method
CN111177763A (en) * 2020-01-03 2020-05-19 玉溪市电子政务内网信息技术中心 Two-dimensional code electronic encryption and decryption management system and method for file multiple encryption

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
乔良树: "动态二维码生成验证方法", 《电子技术与软件工程》 *

Similar Documents

Publication Publication Date Title
AU2017218452B2 (en) A system and method for document information authenticity verification
US20170177852A1 (en) Document authentication based on expected wear
JP2011154680A (en) Document authentication using document digest verification by remote server
Jain et al. Adversarial Detection Avoidance Attacks: Evaluating the robustness of perceptual hashing-based client-side scanning
WO2016118215A1 (en) Classification and storage of documents
US20200169411A1 (en) Cryptograpic font script with integrated signature for verification
LU93381B1 (en) Systems, methods and devices for tamper proofing documents and embedding data in a biometric identifier
CN115114598A (en) Watermark generation method, and method and device for file tracing by using watermark
JP2006025129A (en) System and method for image processing
Quach Extracting hidden messages in steganographic images
CN108986008A (en) Image processing method, device and equipment
CN102105857A (en) Security printing analysis system and method for enhancing security printing
CN111950005A (en) Highway engineering data uploading method and system
CN115861020A (en) Image processing method and device
Goyal et al. A robust method for integrity protection of digital data in text document watermarking
CN111008387A (en) Anti-counterfeiting tracing system and method for printed document based on digital signature and document DNA
JP5998090B2 (en) Image collation device, image collation method, and image collation program
CN106778289A (en) Information Security Management System and the transaction machine using the system
CN113923178B (en) Method and system for storing and extracting instant messaging and group data files
US20070215704A1 (en) Image processing device
EP3545453A1 (en) Method for generating an access for an entity to identification data of a person, associated generation device and authentication method
WO2020225292A1 (en) Method for generating an archive code in order to create a fingerprint of a multimedia content
CN110609987A (en) Document making and processing system
Ghani et al. Watermarking Techniques for Mobile Application: A Review
CN116931848B (en) Printer management method based on label identification and server

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20201117

RJ01 Rejection of invention patent application after publication