CN112291117A - Block chain network construction system based on customized OS - Google Patents

Block chain network construction system based on customized OS Download PDF

Info

Publication number
CN112291117A
CN112291117A CN202011543949.8A CN202011543949A CN112291117A CN 112291117 A CN112291117 A CN 112291117A CN 202011543949 A CN202011543949 A CN 202011543949A CN 112291117 A CN112291117 A CN 112291117A
Authority
CN
China
Prior art keywords
node
value
access
block chain
marking
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202011543949.8A
Other languages
Chinese (zh)
Other versions
CN112291117B (en
Inventor
王君
钟晓
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiangsu Rongzer Information Technology Co Ltd
Original Assignee
Jiangsu Rongzer Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jiangsu Rongzer Information Technology Co Ltd filed Critical Jiangsu Rongzer Information Technology Co Ltd
Priority to CN202011543949.8A priority Critical patent/CN112291117B/en
Publication of CN112291117A publication Critical patent/CN112291117A/en
Application granted granted Critical
Publication of CN112291117B publication Critical patent/CN112291117B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
    • H04L43/0805Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability
    • H04L43/0817Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability by checking functioning
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
    • H04L43/0876Network utilisation, e.g. volume of load or congestion level
    • H04L43/0894Packet rate
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Environmental & Geological Engineering (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Storage Device Security (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses a block chain network construction system based on a customized OS (operating system), and relates to the field of block chain application; the system comprises a node monitoring module, a network speed monitoring module, a node screening module, a CPU monitoring module and an address encryption module; the node monitoring module is used for monitoring the access records of the access nodes of the block chain and processing the access records of the access nodes of the block chain to obtain the access attraction value of the access nodes of the block chain; the network speed monitoring module is used for monitoring the real-time network access speed of the block chain access node and performing steady state analysis on the real-time network access speed to obtain a steady state value; the CPU monitoring module is used for monitoring the CPU load rate of the block chain access nodes, and the node screening module can select matched and good block chain service nodes according to the matching value according to the preset rule, so that the working efficiency is improved; the address encryption module is used for encrypting the storage address of the file to obtain an encrypted ciphertext, and the safety of file storage is improved.

Description

Block chain network construction system based on customized OS
Technical Field
The invention belongs to the field of block chain application, relates to a network construction system, and particularly relates to a block chain network construction system based on a customized OS.
Background
With the rise of digital money, a blockchain technology, which is one of basic technologies of digital money, is receiving more and more attention. The block chain technology is a decentralized and distrusted collective right-maintaining database technology, the block chain achieves decentralized through the characteristics of collective maintenance, distributed recording and storage, and the block chain encryption mathematics and the reliable database technology are used for completing the endorsement, so that the block chain system is guaranteed to be open-source, transparent and safe, and the block chain technology has obvious advantages in the centralized and distrusted trust internet era.
The current block chain generally adopts an interconnected single-layer network architecture, and when facing a plurality of nodes, the traditional block chain removing technology optimizes the block chain speed by adopting a random DPOS algorithm and a weighted DPOS algorithm, so that the data throughput is improved; the existing block chain network construction system cannot select a well-matched block chain service node, and cannot encrypt the storage address of a file to obtain an encrypted ciphertext, so that the safety of file storage is improved; to this end, we propose a block chain network building system based on a customized OS.
Disclosure of Invention
Aiming at the defects in the prior art, the invention aims to provide a block chain network construction system based on a customized OS. The method and the system can select the well-matched block chain service node according to the matching value, improve the working efficiency, carry out identity recognition when a user logs in the system, encrypt the storage address of the file to obtain the encrypted ciphertext and improve the safety of file storage.
The purpose of the invention can be realized by the following technical scheme:
a block chain network construction system based on a customized OS comprises an identity identification module, a node monitoring module, a server, a storage module, a network speed monitoring module, a node screening module, a CPU monitoring module and an address encryption module;
the node monitoring module is used for monitoring the access records of the block chain access nodes and processing the access records of the block chain access nodes to obtain access attraction values of the block chain access nodes;
the network speed monitoring module is used for monitoring the real-time network access speed of the block chain access node and performing steady-state analysis on the real-time network access speed to obtain a steady-state value W;
the network speed monitoring module is used for transmitting the real-time network access speed Fn and the steady-state value W to the node screening module; the CPU monitoring module is used for monitoring the CPU load rate of the block chain access node and transmitting the CPU load rate to the node screening module;
the node screening module selects a block chain access node matched with the intelligent terminal according to a preset rule to obtain a matching value DS of an optimal node; marking the optimal node with the maximum matching value as a block chain service node;
a user sends file information to a storage module through an intelligent terminal for storage, and a file information index table is constructed on a block chain through an address encryption module; the address encryption module encrypts the address information after receiving the address information to obtain an encrypted ciphertext, and the address encryption module is used for returning the encrypted ciphertext to the chain to be stored in the index table; and then searching specific file information corresponding to the link by searching the index table on the link when needed.
Further, the specific working steps of the node monitoring module are as follows:
SS 1: obtaining an access record of a blockchain access node ten days before the current time of the system, wherein the access record comprises access times and access time;
SS 2: accumulating the access times of the same blockchain access node to form access frequency, and marking the access frequency as P1;
accumulating the access time of the same blockchain access node to form total access time which is marked as PT 1;
SS 3: obtaining an access attraction value Q1 of the access node of the block chain by using a formula Q1= P1 × a1+ PT1 × a 2; wherein a1 and a2 are both preset proportionality coefficients;
the node monitoring module is used for transmitting the access attraction value Q1 of the blockchain access node to the server, and the server is used for receiving the access attraction value Q1 of the blockchain access node and transmitting the access attraction value Q1 of the node to the storage module for storage.
Further, the network speed monitoring module specifically comprises the following working steps:
AA 1: from an initial moment, acquiring a real-time network access speed once every R2 time, and marking the real-time network access speed as Fi, i-1.., n; wherein R2 is a preset value;
AA 2: setting the latest acquired real-time network access speed as Fn, taking the value of Fn and the previous X1 groups of real-time network access speeds, and marking the value as interval network speed Ji, i-n-X1,.. and n; x1 is a preset value;
AA 3: calculating the average value of the interval network speed Ji, and marking the average value as P;
AA 4: and according to the mean value P and the interval network speed Ji, obtaining a steady state value W of the real-time network access speed, wherein the specific calculation method comprises the following steps:
when n is less than or equal to X1; at this time, the value of X1 is automatically reset, so that X1 is n-1;
when n is greater than X1, the specific value of X1 is a user preset value;
using formulas
Figure DEST_PATH_IMAGE001
Obtaining a mean deviation value alpha; wherein | P-Ji | represents the absolute value of the difference between P and Ji;
traversing the interval network speed Ji, marking the maximum value of the Ji as Jmax, and marking the minimum value of the Ji as Jmin;
dividing the difference value of the maximum value Jmax and the minimum value Jmin by the minimum value Jmin to obtain the difference ratio Cb of the interval network speed Ji, namely Cb = (Jmax-Jmin)/Jmin;
using formulas
Figure 751929DEST_PATH_IMAGE002
Obtaining a steady state value W; wherein A5 and A6 are preset proportionality coefficients.
Further, the preset rule specifically includes:
p1: acquiring a home ISP of an intelligent terminal, and marking a block chain access node with the home ISP consistent with the home ISP of the intelligent terminal as an initial selection node;
p2: acquiring the home region of the intelligent terminal, sending a region acquisition instruction to the primary selection node by the node screening module, acquiring the home region of the primary selection node, and marking the primary selection node of which the home region is consistent with the home region of the intelligent terminal as a secondary selection node;
p3: acquiring real-time network access speed and a steady state value of the second-choice node, and marking the second-choice node with the steady state value smaller than a set steady state threshold value as an optimal node;
p4: marking the real-time network access speed of the preferred node as FS, and marking the steady-state value of the preferred node as FW;
sending a position acquisition instruction to the preferred node, acquiring the position of the preferred node, calculating the distance difference between the position of the preferred node and the position of the intelligent terminal to obtain a transmission distance, and marking the transmission distance as CL;
acquiring the CPU load rate of the preferred node and marking the CPU load rate as CF;
p5: acquiring the throughput of the optimal node within thirty days before the current time of the system, summing and taking the average value of the throughput to obtain a throughput average value mark TR;
automatically acquiring the visit attraction value of the preferred node from the storage module according to the preferred node and marking the visit attraction value as Qs;
p6: carrying out normalization processing on the real-time network access speed, the steady-state value, the transmission distance, the CPU load rate, the throughput average value and the access attraction value and taking the numerical values;
acquiring a matching value DS of a preferred node by using a formula DS = FS × b1+1/FW × b2+1/CL × b3+1/CF × b4+ TR × b5+ Qs × b6, wherein b1, b2, b3, b4, b5 and b6 are preset coefficient factors;
p7: marking the optimal node with the maximum matching value as a block chain service node;
the node screening module is used for sending the block chain service nodes to a server, and the server is used for distributing the block chain service nodes to the intelligent terminal.
Furthermore, the identity recognition module is used for recognizing the identity of a user logging in the intelligent terminal; the identity recognition mode is one or more of fingerprint recognition, face recognition and iris recognition.
Further, the specific working steps of the address encryption module are as follows:
the method comprises the following steps: firstly, acquiring an address value of file information stored in a storage module; marking the address information as address information; randomly packaging the address information to obtain packaging information;
step two: acquiring the name of the packaging information, and marking the name as name information; meanwhile, a suffix name of the corresponding encapsulation information is obtained and marked as suffix information;
acquiring all characters of the name information, and sequentially marking the characters as name character groups Mc;
all characters of suffix information are obtained and are marked as suffix character groups Hm in sequence;
step three: a user sends a character standard book to an address encryption module through an intelligent terminal; the character standard book consists of characters and numerical values, and each character corresponds to a unique numerical value;
identifying characters in the name character group Mc, matching the identified characters with a character standard book to obtain numerical values corresponding to the characters, and converting the characters in the name character group Mc into the numerical values according to a sequence to obtain a first conversion number book;
identifying characters in a suffix character group Hm, matching the identified characters with a character standard book to obtain numerical values corresponding to the characters, and converting the characters in the suffix character group Hm into the numerical values according to a sequence to obtain a second conversion number book;
step four: converting the first conversion number book and the second conversion number book, and the specific steps are as follows:
s41: selecting a white blank picture, selecting a central point of the blank picture, setting a plurality of rays at equal angles by taking the central point as a circle center, selecting one ray as a datum line, taking the circle center as a starting point, intercepting a datum line segment on the datum line to enable the length value of the datum line segment to be equal to the first value in a first conversion number, arranging branch line segments which are equal to the first value in a second conversion number at two sides of the datum line segment at equal intervals, and coloring the datum line segment and the branch line segments, wherein the datum line segment is marked in red, and the branch line segments are marked in green;
s42: intercepting rays adjacent to the datum line according to the clockwise direction, so that the length value of the intercepted datum line is equal to the second value in the first conversion number book, and so on; and connecting the intercepted end points of the line segments with the same color together to obtain an encrypted picture, wherein all the encrypted pictures converted by the first conversion number book and the second conversion number book form an encrypted ciphertext.
Further, the random encapsulation step in the step one is as follows:
s11: intercepting the timestamp of the acquired address information, acquiring according to the format of month, day and time, and correspondingly marking the number of each digit of the month, day and time as X1-X6; obtaining a time-digital group Xi, i = 1.
S12: acquiring a time digital group Xi; processing the time digital group according to a formula to obtain a value to be selected Tx; the specific calculation formula is as follows: tx = X1+ X2+ X3+ X4+ X5+ X6;
s13: performing numerical analysis on Tx;
when Tx mod 3=0, mark the selected value as Zx = 3;
otherwise, let:
zx = Tx mod 3; where Zx = Tx mod 3 denotes "integer Tx divided by integer 3, resulting in remainder Zx";
s14: acquiring three built-in packaging modes, including a first packaging mode, a second packaging mode and a third packaging mode;
the first packaging is to package the file information into the EXCEL document;
packaging II, packaging the file information in the Word document;
packaging three bits to package the file information in the PDF document;
s15: correspondingly selecting a packaging mode according to the Zx value, and correspondingly selecting a first package, a second package and a third package when Zx is respectively 1, 2 and 3; and obtaining encapsulation information after encapsulation, wherein the encapsulation information is named as a target object corresponding to the address information.
The invention has the beneficial effects that:
1. according to the method, a node screening module selects a block chain access node matched with an intelligent terminal according to a preset rule, acquires an attribution ISP of the intelligent terminal, and marks the block chain access node with the attribution ISP consistent with the attribution ISP of the intelligent terminal as a primary selection node; acquiring the home region of the intelligent terminal, and marking the primary selection node with the home region consistent with the home region of the intelligent terminal as a secondary selection node; acquiring real-time network access speed and a steady state value of the second-choice node, and marking the second-choice node with the steady state value smaller than a set steady state threshold value as an optimal node; acquiring a matching value of the optimal node by combining the real-time network access speed, the steady-state value, the transmission distance, the CPU load rate, the throughput average value and the access attraction value of the optimal node; the optimal node with the maximum matching value is marked as a block chain service node, so that the working efficiency is improved;
2. the address encryption module encrypts the address information after receiving the address information to obtain an encrypted ciphertext, the address encryption module is used for returning the encrypted ciphertext to a chain to be stored in an index table, and then searching the index table on the chain correspondingly to the chain for specific file information when needed; firstly, randomly encapsulating address information to obtain encapsulation information; acquiring the name of the packaging information, and marking the name as name information; meanwhile, a suffix name of the corresponding encapsulation information is obtained and marked as suffix information; converting the characters in the name character group Mc into numerical values according to the sequence to obtain a first conversion number book; converting the characters in the suffix character group Hm into numerical values according to the sequence to obtain a second conversion number book; converting the first converted codebook and the second converted codebook; all the encrypted pictures converted by the first conversion number book and the second conversion number book form an encrypted ciphertext; the security of file storage is improved.
Drawings
In order to facilitate understanding for those skilled in the art, the present invention will be further described with reference to the accompanying drawings.
FIG. 1 is a block diagram of the system of the present invention.
FIG. 2 is a block diagram of a system according to embodiment 1 of the present invention.
FIG. 3 is a block diagram of a system according to embodiment 2 of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
As shown in fig. 1 to 3, a block chain network construction system based on a customized OS includes an identity identification module, a node monitoring module, a server, a storage module, a network speed monitoring module, a node screening module, a CPU monitoring module, and an address encryption module;
example 1
As shown in fig. 2, the node monitoring module is configured to monitor an access record of a blockchain access node and process the access record of the blockchain access node, where the specific processing steps are as follows:
SS 1: obtaining an access record of a blockchain access node ten days before the current time of the system, wherein the access record comprises access times and access time;
SS 2: accumulating the access times of the same blockchain access node to form access frequency, and marking the access frequency as P1;
accumulating the access time of the same blockchain access node to form total access time which is marked as PT 1;
SS 3: obtaining an access attraction value Q1 of the access node of the block chain by using a formula Q1= P1 × a1+ PT1 × a 2; wherein a1 and a2 are both preset proportionality coefficients;
the node monitoring module is used for transmitting the access attraction value Q1 of the blockchain access node to a server, and the server is used for receiving the access attraction value Q1 of the blockchain access node and transmitting the access attraction value Q1 of the node to the storage module for storage;
the network speed monitoring module is used for monitoring the real-time network access speed of the block chain access node and performing steady-state analysis on the real-time network access speed to obtain a steady-state value W; the network speed monitoring module comprises the following specific working steps:
AA 1: from an initial moment, acquiring a real-time network access speed once every R2 time, and marking the real-time network access speed as Fi, i-1.., n; wherein R2 is a preset value;
AA 2: setting the latest acquired real-time network access speed as Fn, taking the value of Fn and the previous X1 groups of real-time network access speeds, and marking the value as interval network speed Ji, i-n-X1,.. and n; x1 is a preset value;
AA 3: calculating the average value of the interval network speed Ji, and marking the average value as P;
AA 4: and according to the mean value P and the interval network speed Ji, obtaining a steady state value W of the real-time network access speed, wherein the specific calculation method comprises the following steps:
when n is less than or equal to X1; at this time, the value of X1 is automatically reset, so that X1 is n-1;
when n is greater than X1, the specific value of X1 is a user preset value;
using formulas
Figure 73189DEST_PATH_IMAGE003
Obtaining a mean deviation value alpha; wherein | P-Ji | represents the absolute value of the difference between P and Ji;
traversing the interval network speed Ji, marking the maximum value of the Ji as Jmax, and marking the minimum value of the Ji as Jmin;
dividing the difference value of the maximum value Jmax and the minimum value Jmin by the minimum value Jmin to obtain the difference ratio Cb of the interval network speed Ji, namely Cb = (Jmax-Jmin)/Jmin;
using formulas
Figure 93098DEST_PATH_IMAGE002
Obtaining a steady state value W; wherein A5 and A6 are preset proportionality coefficients;
the network speed monitoring module is used for transmitting the real-time network access speed Fn and the steady-state value W to the node screening module; the CPU monitoring module is used for monitoring the CPU load rate of the block chain access node and transmitting the CPU load rate to the node screening module;
the node screening module selects a block chain access node matched with the intelligent terminal according to a preset rule; the preset rule specifically comprises:
p1: acquiring a home ISP of an intelligent terminal, and marking a block chain access node with the home ISP consistent with the home ISP of the intelligent terminal as an initial selection node;
p2: acquiring the home region of the intelligent terminal, sending a region acquisition instruction to the primary selection node by the node screening module, acquiring the home region of the primary selection node, and marking the primary selection node of which the home region is consistent with the home region of the intelligent terminal as a secondary selection node;
p3: acquiring real-time network access speed and a steady state value of the second-choice node, and marking the second-choice node with the steady state value smaller than a set steady state threshold value as an optimal node;
p4: marking the real-time network access speed of the preferred node as FS, and marking the steady-state value of the preferred node as FW;
sending a position acquisition instruction to the preferred node, acquiring the position of the preferred node, calculating the distance difference between the position of the preferred node and the position of the intelligent terminal to obtain a transmission distance, and marking the transmission distance as CL;
acquiring the CPU load rate of the preferred node and marking the CPU load rate as CF;
p5: acquiring the throughput of the optimal node within thirty days before the current time of the system, summing and taking the average value of the throughput to obtain a throughput average value mark TR;
automatically acquiring the visit attraction value of the preferred node from the storage module according to the preferred node and marking the visit attraction value as Qs;
p6: carrying out normalization processing on the real-time network access speed, the steady-state value, the transmission distance, the CPU load rate, the throughput average value and the access attraction value and taking the numerical values;
acquiring a matching value DS of a preferred node by using a formula DS = FS × b1+1/FW × b2+1/CL × b3+1/CF × b4+ TR × b5+ Qs × b6, wherein b1, b2, b3, b4, b5 and b6 are preset coefficient factors;
p7: marking the optimal node with the maximum matching value as a block chain service node;
the node screening module is used for sending the block chain service nodes to a server, and the server is used for distributing the block chain service nodes to the intelligent terminal;
example 2
As shown in fig. 3, the identity recognition module is configured to recognize the identity of a user who logs in the intelligent terminal; the identity recognition mode is one or more of fingerprint recognition, face recognition and iris recognition;
a user sends file information to a storage module through an intelligent terminal for storage, and a file information index table is constructed on a block chain through an address encryption module; the address encryption module encrypts the address information after receiving the address information to obtain an encrypted ciphertext, and the address encryption module is used for returning the encrypted ciphertext to the chain to be stored in the index table; searching specific file information corresponding to the link by searching the index table on the link when needed;
the specific working steps of the address encryption module for encrypting the address information to obtain the encrypted ciphertext are as follows:
the method comprises the following steps: firstly, acquiring an address value of file information stored in a storage module; marking the address information as address information; randomly packaging the address information to obtain packaging information; the method specifically comprises the following steps:
s11: intercepting the timestamp of the acquired address information, acquiring according to the format of month, day and time, and correspondingly marking the number of each digit of the month, day and time as X1-X6; obtaining a time-digital group Xi, i = 1.
S12: acquiring a time digital group Xi; processing the time digital group according to a formula to obtain a value to be selected Tx; the specific calculation formula is as follows: tx = X1+ X2+ X3+ X4+ X5+ X6;
s13: performing numerical analysis on Tx;
when Tx mod 3=0, mark the selected value as Zx = 3;
otherwise, let:
zx = Tx mod 3; where Zx = Tx mod 3 denotes "integer Tx divided by integer 3, resulting in remainder Zx";
s14: acquiring three built-in packaging modes, including a first packaging mode, a second packaging mode and a third packaging mode;
the first packaging is to package the file information into the EXCEL document;
packaging II, packaging the file information in the Word document;
packaging three bits to package the file information in the PDF document;
s15: correspondingly selecting a packaging mode according to the Zx value, and correspondingly selecting a first package, a second package and a third package when Zx is respectively 1, 2 and 3; obtaining encapsulation information after encapsulation, wherein the encapsulation information is named as a target object corresponding to the address information;
step two: acquiring the name of the packaging information, and marking the name as name information; meanwhile, a suffix name of the corresponding encapsulation information is obtained and marked as suffix information;
acquiring all characters of the name information, and sequentially marking the characters as name character groups Mc;
all characters of suffix information are obtained and are marked as suffix character groups Hm in sequence;
step three: a user sends a character standard book to an address encryption module through an intelligent terminal; the character standard book consists of characters and numerical values, and each character corresponds to a unique numerical value;
identifying characters in the name character group Mc, matching the identified characters with a character standard book to obtain numerical values corresponding to the characters, and converting the characters in the name character group Mc into the numerical values according to a sequence to obtain a first conversion number book;
identifying characters in a suffix character group Hm, matching the identified characters with a character standard book to obtain numerical values corresponding to the characters, and converting the characters in the suffix character group Hm into the numerical values according to a sequence to obtain a second conversion number book;
step four: converting the first conversion number book and the second conversion number book, and the specific steps are as follows:
s41: selecting a white blank picture, selecting a central point of the blank picture, setting a plurality of rays at equal angles by taking the central point as a circle center, selecting one ray as a datum line, taking the circle center as a starting point, intercepting a datum line segment on the datum line to enable the length value of the datum line segment to be equal to the first value in a first conversion number, arranging branch line segments which are equal to the first value in a second conversion number at two sides of the datum line segment at equal intervals, and coloring the datum line segment and the branch line segments, wherein the datum line segment is marked in red, and the branch line segments are marked in green;
s42: intercepting rays adjacent to the datum line according to the clockwise direction, so that the length value of the intercepted datum line is equal to the second value in the first conversion number book, and so on; and connecting the intercepted end points of the line segments with the same color together to obtain an encrypted picture, wherein all the encrypted pictures converted by the first conversion number book and the second conversion number book form an encrypted ciphertext.
A block chain network construction system based on a customized OS (operating system) is disclosed, wherein during operation, a node monitoring module is used for monitoring access records of block chain access nodes and processing the access records of the block chain access nodes to obtain access attraction values of the block chain access nodes, a network speed monitoring module is used for monitoring the real-time network access speed of the block chain access nodes and performing steady-state analysis on the real-time network access speed to obtain a steady-state value W, a CPU monitoring module is used for monitoring the CPU load rate of the block chain access nodes, a node screening module selects the block chain access nodes matched with an intelligent terminal according to a preset rule to obtain the home ISP of the intelligent terminal, and marks the block chain access nodes of which the home ISP is consistent with the home ISP of the intelligent terminal as primary selection nodes; acquiring the home region of the intelligent terminal, and marking the primary selection node with the home region consistent with the home region of the intelligent terminal as a secondary selection node; acquiring real-time network access speed and a steady state value of the second-choice node, and marking the second-choice node with the steady state value smaller than a set steady state threshold value as an optimal node; acquiring a matching value of the optimal node by combining the real-time network access speed, the steady-state value, the transmission distance, the CPU load rate, the throughput average value and the access attraction value of the optimal node; the optimal node with the maximum matching value is marked as a block chain service node, so that the working efficiency is improved;
the identity recognition module is used for recognizing the identity of a user logging in the intelligent terminal; a user sends file information to a block chain network through an intelligent terminal for storage, and a file information index table is constructed on the block chain through an address encryption module; the address encryption module encrypts the address information after receiving the address information to obtain an encrypted ciphertext, and the address encryption module is used for returning the encrypted ciphertext to the chain to be stored in the index table; searching specific file information corresponding to the link by searching the index table on the link when needed; firstly, acquiring an address value of file information stored in a block chain network; marking the address information as address information; randomly packaging the address information to obtain packaging information; acquiring the name of the packaging information, and marking the name as name information; meanwhile, a suffix name of the corresponding encapsulation information is obtained and marked as suffix information; converting the characters in the name character group Mc into numerical values according to the sequence to obtain a first conversion number book; converting the characters in the suffix character group Hm into numerical values according to the sequence to obtain a second conversion number book; converting the first converted codebook and the second converted codebook; selecting a white blank picture, selecting a central point of the blank picture, setting a plurality of rays at equal angles by taking the central point as a circle center, selecting one ray as a datum line, taking the circle center as a starting point, intercepting a datum line segment on the datum line to enable the length value of the datum line segment to be equal to the first value in a first conversion number, arranging branch line segments which are equal to the first value in a second conversion number at two sides of the datum line segment at equal intervals, and coloring the datum line segment and the branch line segments, wherein the datum line segment is marked in red, and the branch line segments are marked in green;
intercepting rays adjacent to the datum line according to the clockwise direction, so that the length value of the intercepted datum line is equal to the second value in the first conversion number book, and so on; connecting the intercepted end points of the line segments with the same color together to obtain an encrypted picture, wherein all the encrypted pictures converted by the first conversion number book and the second conversion number book form an encrypted ciphertext; the security of file storage is improved.
The above formulas are all obtained by collecting a large amount of data to perform software simulation and performing parameter setting processing by corresponding experts, and the formulas are in accordance with real results.
The preferred embodiments of the invention disclosed above are intended to be illustrative only. The preferred embodiments are not intended to be exhaustive or to limit the invention to the precise forms disclosed. Obviously, many modifications and variations are possible in light of the above teaching. The embodiments were chosen and described in order to best explain the principles of the invention and the practical application, to thereby enable others skilled in the art to best utilize the invention. The invention is limited only by the claims and their full scope and equivalents.

Claims (7)

1. A block chain network construction system based on a customized OS is characterized by comprising an identity identification module, a node monitoring module, a server, a storage module, a network speed monitoring module, a node screening module, a CPU monitoring module and an address encryption module;
the node monitoring module is used for monitoring the access records of the block chain access nodes and processing the access records of the block chain access nodes to obtain access attraction values of the block chain access nodes;
the network speed monitoring module is used for monitoring the real-time network access speed of the block chain access node and performing steady-state analysis on the real-time network access speed to obtain a steady-state value W;
the network speed monitoring module is used for transmitting the real-time network access speed Fn and the steady-state value W to the node screening module; the CPU monitoring module is used for monitoring the CPU load rate of the block chain access node and transmitting the CPU load rate to the node screening module;
the node screening module selects a block chain access node matched with the intelligent terminal according to a preset rule to obtain a matching value DS of an optimal node; marking the optimal node with the maximum matching value as a block chain service node;
a user sends file information to a storage module through an intelligent terminal for storage, and a file information index table is constructed on a block chain through an address encryption module; the address encryption module encrypts the address information after receiving the address information to obtain an encrypted ciphertext, and the address encryption module is used for returning the encrypted ciphertext to the chain to be stored in the index table; and then searching specific file information corresponding to the link by searching the index table on the link when needed.
2. The system according to claim 1, wherein the node monitoring module comprises the following steps:
SS 1: obtaining an access record of a blockchain access node ten days before the current time of the system, wherein the access record comprises access times and access time;
SS 2: accumulating the access times of the same blockchain access node to form access frequency, and marking the access frequency as P1;
accumulating the access time of the same blockchain access node to form total access time which is marked as PT 1;
SS 3: obtaining an access attraction value Q1 of the access node of the block chain by using a formula Q1= P1 × a1+ PT1 × a 2; wherein a1 and a2 are both preset proportionality coefficients;
the node monitoring module is used for transmitting the access attraction value Q1 of the blockchain access node to the server, and the server is used for receiving the access attraction value Q1 of the blockchain access node and transmitting the access attraction value Q1 of the node to the storage module for storage.
3. The system according to claim 1, wherein the network speed monitor module comprises the following steps:
AA 1: from an initial moment, acquiring a real-time network access speed once every R2 time, and marking the real-time network access speed as Fi, i-1.., n; wherein R2 is a preset value;
AA 2: setting the latest acquired real-time network access speed as Fn, taking the value of Fn and the previous X1 groups of real-time network access speeds, and marking the value as interval network speed Ji, i-n-X1,.. and n; x1 is a preset value;
AA 3: calculating the average value of the interval network speed Ji, and marking the average value as P;
AA 4: and according to the mean value P and the interval network speed Ji, obtaining a steady state value W of the real-time network access speed, wherein the specific calculation method comprises the following steps:
when n is less than or equal to X1; at this time, the value of X1 is automatically reset, so that X1 is n-1;
when n is greater than X1, the specific value of X1 is a user preset value;
using formulas
Figure 238490DEST_PATH_IMAGE001
Obtaining a mean deviation value alpha; wherein | P-Ji | represents the absolute value of the difference between P and Ji;
traversing the interval network speed Ji, marking the maximum value of the Ji as Jmax, and marking the minimum value of the Ji as Jmin;
dividing the difference value of the maximum value Jmax and the minimum value Jmin by the minimum value Jmin to obtain the difference ratio Cb of the interval network speed Ji, namely Cb = (Jmax-Jmin)/Jmin;
using formulas
Figure 968548DEST_PATH_IMAGE002
Obtaining a steady state value W; wherein A5 and A6 are preset proportionality coefficients.
4. The system according to claim 1, wherein the preset rules specifically include:
p1: acquiring a home ISP of an intelligent terminal, and marking a block chain access node with the home ISP consistent with the home ISP of the intelligent terminal as an initial selection node;
p2: acquiring the home region of the intelligent terminal, sending a region acquisition instruction to the primary selection node by the node screening module, acquiring the home region of the primary selection node, and marking the primary selection node of which the home region is consistent with the home region of the intelligent terminal as a secondary selection node;
p3: acquiring real-time network access speed and a steady state value of the second-choice node, and marking the second-choice node with the steady state value smaller than a set steady state threshold value as an optimal node;
p4: marking the real-time network access speed of the preferred node as FS, and marking the steady-state value of the preferred node as FW;
sending a position acquisition instruction to the preferred node, acquiring the position of the preferred node, calculating the distance difference between the position of the preferred node and the position of the intelligent terminal to obtain a transmission distance, and marking the transmission distance as CL;
acquiring the CPU load rate of the preferred node and marking the CPU load rate as CF;
p5: acquiring the throughput of the optimal node within thirty days before the current time of the system, summing and taking the average value of the throughput to obtain a throughput average value mark TR;
automatically acquiring the visit attraction value of the preferred node from the storage module according to the preferred node and marking the visit attraction value as Qs;
p6: carrying out normalization processing on the real-time network access speed, the steady-state value, the transmission distance, the CPU load rate, the throughput average value and the access attraction value and taking the numerical values;
acquiring a matching value DS of a preferred node by using a formula DS = FS × b1+1/FW × b2+1/CL × b3+1/CF × b4+ TR × b5+ Qs × b6, wherein b1, b2, b3, b4, b5 and b6 are preset coefficient factors;
p7: marking the optimal node with the maximum matching value as a block chain service node;
the node screening module is used for sending the block chain service nodes to a server, and the server is used for distributing the block chain service nodes to the intelligent terminal.
5. The system according to claim 1, wherein the identity recognition module is configured to recognize an identity of a user logged in the smart terminal; the identity recognition mode is one or more of fingerprint recognition, face recognition and iris recognition.
6. The system according to claim 1, wherein the address encryption module performs the following specific steps:
the method comprises the following steps: firstly, acquiring an address value of file information stored in a storage module; marking the address information as address information; randomly packaging the address information to obtain packaging information;
step two: acquiring the name of the packaging information, and marking the name as name information; meanwhile, a suffix name of the corresponding encapsulation information is obtained and marked as suffix information;
acquiring all characters of the name information, and sequentially marking the characters as name character groups Mc;
all characters of suffix information are obtained and are marked as suffix character groups Hm in sequence;
step three: a user sends a character standard book to an address encryption module through an intelligent terminal; the character standard book consists of characters and numerical values, and each character corresponds to a unique numerical value;
identifying characters in the name character group Mc, matching the identified characters with a character standard book to obtain numerical values corresponding to the characters, and converting the characters in the name character group Mc into the numerical values according to a sequence to obtain a first conversion number book;
identifying characters in a suffix character group Hm, matching the identified characters with a character standard book to obtain numerical values corresponding to the characters, and converting the characters in the suffix character group Hm into the numerical values according to a sequence to obtain a second conversion number book;
step four: converting the first conversion number book and the second conversion number book, and the specific steps are as follows:
s41: selecting a white blank picture, selecting a central point of the blank picture, setting a plurality of rays at equal angles by taking the central point as a circle center, selecting one ray as a datum line, taking the circle center as a starting point, intercepting a datum line segment on the datum line to enable the length value of the datum line segment to be equal to the first value in a first conversion number, arranging branch line segments which are equal to the first value in a second conversion number at two sides of the datum line segment at equal intervals, and coloring the datum line segment and the branch line segments, wherein the datum line segment is marked in red, and the branch line segments are marked in green;
s42: intercepting rays adjacent to the datum line according to the clockwise direction, so that the length value of the intercepted datum line is equal to the second value in the first conversion number book, and so on; and connecting the intercepted end points of the line segments with the same color together to obtain an encrypted picture, wherein all the encrypted pictures converted by the first conversion number book and the second conversion number book form an encrypted ciphertext.
7. The system of claim 6, wherein the random packing in step one comprises:
s11: intercepting the timestamp of the acquired address information, acquiring according to the format of month, day and time, and correspondingly marking the number of each digit of the month, day and time as X1-X6; obtaining a time-digital group Xi, i = 1.
S12: acquiring a time digital group Xi; processing the time digital group according to a formula to obtain a value to be selected Tx; the specific calculation formula is as follows: tx = X1+ X2+ X3+ X4+ X5+ X6;
s13: performing numerical analysis on Tx;
when Tx mod 3=0, mark the selected value as Zx = 3;
otherwise, let:
zx = Tx mod 3; where Zx = Tx mod 3 denotes "integer Tx divided by integer 3, resulting in remainder Zx";
s14: acquiring three built-in packaging modes, including a first packaging mode, a second packaging mode and a third packaging mode;
the first packaging is to package the file information into the EXCEL document;
packaging II, packaging the file information in the Word document;
packaging three bits to package the file information in the PDF document;
s15: correspondingly selecting a packaging mode according to the Zx value, and correspondingly selecting a first package, a second package and a third package when Zx is respectively 1, 2 and 3; and obtaining encapsulation information after encapsulation, wherein the encapsulation information is named as a target object corresponding to the address information.
CN202011543949.8A 2020-12-24 2020-12-24 Block chain network construction system based on customized OS Active CN112291117B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011543949.8A CN112291117B (en) 2020-12-24 2020-12-24 Block chain network construction system based on customized OS

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011543949.8A CN112291117B (en) 2020-12-24 2020-12-24 Block chain network construction system based on customized OS

Publications (2)

Publication Number Publication Date
CN112291117A true CN112291117A (en) 2021-01-29
CN112291117B CN112291117B (en) 2021-04-20

Family

ID=74426144

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011543949.8A Active CN112291117B (en) 2020-12-24 2020-12-24 Block chain network construction system based on customized OS

Country Status (1)

Country Link
CN (1) CN112291117B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113127535A (en) * 2021-04-07 2021-07-16 支付宝(杭州)信息技术有限公司 Data processing method and device based on block chain and electronic equipment
CN113220793A (en) * 2021-06-04 2021-08-06 杭州复杂美科技有限公司 Block chain rapid customization method, equipment and storage medium
CN113282663A (en) * 2021-06-04 2021-08-20 杭州复杂美科技有限公司 Block chain rapid customization method, equipment and storage medium
CN113362024A (en) * 2021-06-03 2021-09-07 广州康辰科技有限公司 Application program development multi-module collaboration system based on block chain

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103825975A (en) * 2014-02-26 2014-05-28 北京太阳庄科技有限公司 Cdn node distribution server and system
US20180018709A1 (en) * 2016-05-31 2018-01-18 Ramot At Tel-Aviv University Ltd. Information spread in social networks through scheduling seeding methods
CN107666497A (en) * 2016-07-27 2018-02-06 北京京东尚科信息技术有限公司 Data access method and device
CN107819829A (en) * 2017-10-17 2018-03-20 上海点融信息科技有限责任公司 Access method, system, block chain node device and the user terminal of block chain
CN108833515A (en) * 2018-06-05 2018-11-16 上海和数软件有限公司 Block chain node optimization method, device and computer readable storage medium
CN110417595A (en) * 2019-07-29 2019-11-05 北京奇艺世纪科技有限公司 Business service disaster recovery method, device, system, management server and electronic equipment
CN110716476A (en) * 2019-11-08 2020-01-21 珠海市鸿瑞信息技术股份有限公司 Industrial control system network security situation perception system based on artificial intelligence
CN111563128A (en) * 2020-07-15 2020-08-21 江苏荣泽信息科技股份有限公司 Medical information safe storage cooperation system based on block chain
CN112003883A (en) * 2020-10-29 2020-11-27 浙江微能科技有限公司 System for realizing integral accounting by using block chain technology
CN112118323A (en) * 2020-11-18 2020-12-22 北京滕华软件有限公司 Data encryption modularization cloud storage system based on artificial intelligence

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103825975A (en) * 2014-02-26 2014-05-28 北京太阳庄科技有限公司 Cdn node distribution server and system
US20180018709A1 (en) * 2016-05-31 2018-01-18 Ramot At Tel-Aviv University Ltd. Information spread in social networks through scheduling seeding methods
CN107666497A (en) * 2016-07-27 2018-02-06 北京京东尚科信息技术有限公司 Data access method and device
CN107819829A (en) * 2017-10-17 2018-03-20 上海点融信息科技有限责任公司 Access method, system, block chain node device and the user terminal of block chain
CN108833515A (en) * 2018-06-05 2018-11-16 上海和数软件有限公司 Block chain node optimization method, device and computer readable storage medium
CN110417595A (en) * 2019-07-29 2019-11-05 北京奇艺世纪科技有限公司 Business service disaster recovery method, device, system, management server and electronic equipment
CN110716476A (en) * 2019-11-08 2020-01-21 珠海市鸿瑞信息技术股份有限公司 Industrial control system network security situation perception system based on artificial intelligence
CN111563128A (en) * 2020-07-15 2020-08-21 江苏荣泽信息科技股份有限公司 Medical information safe storage cooperation system based on block chain
CN112003883A (en) * 2020-10-29 2020-11-27 浙江微能科技有限公司 System for realizing integral accounting by using block chain technology
CN112118323A (en) * 2020-11-18 2020-12-22 北京滕华软件有限公司 Data encryption modularization cloud storage system based on artificial intelligence

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113127535A (en) * 2021-04-07 2021-07-16 支付宝(杭州)信息技术有限公司 Data processing method and device based on block chain and electronic equipment
CN113127535B (en) * 2021-04-07 2022-06-07 支付宝(杭州)信息技术有限公司 Data processing method and device based on block chain and electronic equipment
CN113362024A (en) * 2021-06-03 2021-09-07 广州康辰科技有限公司 Application program development multi-module collaboration system based on block chain
CN113220793A (en) * 2021-06-04 2021-08-06 杭州复杂美科技有限公司 Block chain rapid customization method, equipment and storage medium
CN113282663A (en) * 2021-06-04 2021-08-20 杭州复杂美科技有限公司 Block chain rapid customization method, equipment and storage medium

Also Published As

Publication number Publication date
CN112291117B (en) 2021-04-20

Similar Documents

Publication Publication Date Title
CN112291117B (en) Block chain network construction system based on customized OS
CN109872152B (en) Block chain consensus method based on share authorization certification mechanism and related equipment
CN107508812B (en) Industrial control network data storage method, calling method and system
CN112749969B (en) Data processing method and device, computer equipment and storage medium
CN111770190A (en) Block chain distributed real-time fire fighting monitoring alarm system based on 5G and Internet of things mode
CN110310176B (en) Data encryption method and device based on block chain network
CN110933040B (en) Block chain based data uplink method, device, equipment and medium
CN112364059B (en) Correlation matching method, device, equipment and storage medium under multi-rule scene
CN105072636A (en) Wireless testing and data transmission system
TW202016743A (en) Data processing apparatus and data processing method for internet of things system
CN106203164B (en) Information security big data resource management system based on trust computing and cloud computing
CN110505084B (en) Block chain packing node consensus electing method
CN110704511B (en) Data processing method, device, apparatus and medium
CN116366673A (en) Data analysis and sharing method oriented to management of power grid information machine room
CN111553689A (en) Matching correlation method and system based on quadratic hash
Hsiao et al. Utilizing blockchain technology to improve WSN security for sensor data transmission
CN105847009A (en) RFID bidirectional authentication method meeting requirement on backward security
CN113205345A (en) Agricultural product certificate tracing system based on Ether house block chain technology and tracing method thereof
CN111553704A (en) Block chain method and system with access level limitation
CN115426363B (en) Data acquisition method and terminal of intelligent plate processing factory
CN109587121A (en) The management-control method and device of security strategy
CN113468574B (en) Block chain data uplink method and device
CN116433250A (en) Carbon asset data management system based on Internet of things and blockchain technology
CN114564676B (en) Method for improving data transmission efficiency of block chain network
TWM637418U (en) Blockchain system applied to insurance operations

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant