CN113821776B - Storage information verification method and system based on alliance chain consensus mechanism - Google Patents

Storage information verification method and system based on alliance chain consensus mechanism Download PDF

Info

Publication number
CN113821776B
CN113821776B CN202111398991.XA CN202111398991A CN113821776B CN 113821776 B CN113821776 B CN 113821776B CN 202111398991 A CN202111398991 A CN 202111398991A CN 113821776 B CN113821776 B CN 113821776B
Authority
CN
China
Prior art keywords
verification
information
participant
participants
storage information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202111398991.XA
Other languages
Chinese (zh)
Other versions
CN113821776A (en
Inventor
付泽远
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuhan University WHU
Original Assignee
Wuhan University WHU
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuhan University WHU filed Critical Wuhan University WHU
Priority to CN202111398991.XA priority Critical patent/CN113821776B/en
Publication of CN113821776A publication Critical patent/CN113821776A/en
Application granted granted Critical
Publication of CN113821776B publication Critical patent/CN113821776B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The application discloses a stored information verification method and a system based on a alliance chain consensus mechanism, wherein the method comprises the following steps: obtaining a plurality of participant information of a first message event; constructing a alliance chain of a consensus mechanism based on the information of the plurality of participants; based on the alliance chain, performing identity authentication on the multiple participants one by one to generate an identity authentication result set; judging whether the identity verification result set meets a preset identity verification passing rate or not; if the identity verification result set meets the preset identity verification passing rate, obtaining an identity verification passing participant set; establishing a alliance chain storage information verification system based on the own storage information of the party set passing the identity verification, and performing traversal verification on the own storage information; and triggering the first message event based on the verification result set of the traversal verification. The technical problems of low efficiency and low accuracy of stored information verification in the prior art are solved.

Description

Storage information verification method and system based on alliance chain consensus mechanism
Technical Field
The present application relates to the field of computer technologies, and in particular, to a storage information verification method and system based on a federation chain consensus mechanism.
Background
With the explosive growth of information in network life, identity and information are often confirmed, so that the accuracy, uniqueness and integrity of the information are ensured, and further work interconnection and standardized management are realized. Aiming at information verification, all industries have related verification requirements. For example, information verification in financial industries such as banks can provide safety and convenience for uniformly deploying work among branches and departments, thereby promoting the smooth progress of various combined works. Nowadays, people's work also often inevitably produces various connections, especially for the work management of an industry, a company and the like, and generally, people always depend on a powerful third party platform for trust guarantee when performing data transaction on the internet, however, the third parties for solving people's trust problem are gradually invalid. The research on how to utilize the computer technology to intelligently complete the related work of information verification improves the overall work efficiency and simultaneously ensures the accuracy of the information has important practical significance.
In the process of implementing the technical solution in the embodiment of the present application, the inventor of the present application finds that the above-mentioned technology has at least the following technical problems:
the technical problems of low efficiency and low accuracy of stored information verification exist in the prior art.
Disclosure of Invention
The application aims to provide a stored information verification method and system based on a alliance chain consensus mechanism, and the method and system are used for solving the technical problems of low stored information verification efficiency and low accuracy rate in the prior art.
In view of the foregoing problems, embodiments of the present application provide a storage information verification method and system based on a federation chain consensus mechanism.
In a first aspect, the present application provides a storage information verification method based on a federation chain consensus mechanism, where the method is implemented by a storage information verification system based on a federation chain consensus mechanism, where the method includes: obtaining a plurality of participant information of a first message event; constructing a alliance chain of a consensus mechanism based on the information of the plurality of participants; based on the alliance chain, performing identity authentication on the multiple participants one by one to generate an identity authentication result set; judging whether the identity verification result set meets a preset identity verification passing rate or not; if the identity verification result set meets the preset identity verification passing rate, obtaining an identity verification passing participant set; establishing a alliance chain storage information verification system based on the own storage information of the party set passing the identity verification, and performing traversal verification on the own storage information; and triggering the first message event based on the verification result set of the traversal verification.
In another aspect, the present application further provides a system for verifying stored information based on a federation chain consensus mechanism, configured to perform the method for verifying stored information based on a federation chain consensus mechanism according to the first aspect, where the system includes: a first obtaining unit: the first obtaining unit is used for obtaining a plurality of participant information of a first message event; a first building unit: the first construction unit is used for constructing a alliance chain of a consensus mechanism based on the information of the plurality of participants; a first generation unit: the first generating unit is used for performing identity verification on the multiple participants one by one based on the alliance chain to generate an identity verification result set; a first judgment unit: the first judging unit is used for judging whether the identity verification result set meets a preset identity verification passing rate; a second obtaining unit: the second obtaining unit is used for obtaining an identity verification passing participant set if the identity verification result set meets the preset identity verification passing rate; a second building element: the second construction unit is used for constructing a alliance chain storage information verification system based on the own storage information of the participant set which passes the identity verification, and performing traversal verification on the own storage information; a first execution unit: the first execution unit is configured to trigger the first message event based on the verification result set of the traversal verification.
In a third aspect, an embodiment of the present application further provides a system for verifying stored information based on a federation chain consensus mechanism, including a memory, a processor, and a computer program stored in the memory and executable on the processor, where the processor implements the steps of the method according to the first aspect when executing the program.
One or more technical solutions provided in the embodiments of the present application have at least the following technical effects or advantages:
1. obtaining a plurality of participant information of a first message event; constructing a alliance chain of a consensus mechanism based on the information of the plurality of participants; based on the alliance chain, performing identity authentication on the multiple participants one by one to generate an identity authentication result set; judging whether the identity verification result set meets a preset identity verification passing rate or not; if the identity verification result set meets the preset identity verification passing rate, obtaining an identity verification passing participant set; establishing a alliance chain storage information verification system based on the own storage information of the party set passing the identity verification, and performing traversal verification on the own storage information; and triggering the first message event based on the verification result set of the traversal verification. The alliance chain based on the consensus mechanism is achieved, the safety of information verification is improved, the technical goal that verification information can be traced is achieved, and then the verification system based on the alliance chain storage information improves the verification efficiency and accuracy of the storage information, so that the verification cost of the storage information is reduced, and the technical effect of improving the working efficiency is achieved.
2. And all the parties passing the authentication finish the encryption labels of all the single self-stored information through the JMS-based message closed-loop chain. The JMS is used for ensuring that the generation of each individual self-storage information and the information are asynchronous, when each participant receives each individual self-storage information, the information can be automatically sent to other available participants without actively sending a request, and in addition, the JMS message closed-loop chain ensures that each individual self-storage information file can be delivered only once, so that the technical effects of improving the storage information verification efficiency and the verification accuracy and further improving the working efficiency are achieved.
3. The JMS message closed-loop chain realizes real-time monitoring of the message sending state, and timely resends the message once the message is failed to be sent, thereby achieving the technical effects of improving the message verification efficiency and reducing the message verification cost.
The foregoing description is only an overview of the technical solutions of the present application, and the present application can be implemented according to the content of the description in order to make the technical means of the present application more clearly understood, and the following detailed description of the present application is given in order to make the above and other objects, features, and advantages of the present application more clearly understandable.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only exemplary, and for those skilled in the art, other drawings can be obtained according to the provided drawings without creative efforts.
Fig. 1 is a schematic flowchart of a storage information verification method based on a federation chain consensus mechanism according to an embodiment of the present application;
fig. 2 is a schematic flowchart illustrating a process in which each of the other participants feeds back the fused stored information verification data to the remaining participants in the stored information verification method based on the federation chain consensus mechanism according to the embodiment of the present application;
fig. 3 is a schematic flowchart illustrating a first information verification logic constructed in a storage information verification method based on a federation chain consensus mechanism according to an embodiment of the present application;
fig. 4 is a schematic flowchart illustrating triggering of the first message event in a storage information verification method based on a federation chain consensus mechanism according to an embodiment of the present application;
fig. 5 is a schematic structural diagram of a storage information verification system based on a federation chain consensus mechanism according to an embodiment of the present application;
fig. 6 is a schematic structural diagram of an exemplary electronic device according to an embodiment of the present application.
Description of reference numerals:
a first obtaining unit 11, a first constructing unit 12, a first generating unit 13, a first judging unit 14, a second obtaining unit 15, a second constructing unit 16, a first executing unit 17, a bus 300, a receiver 301, a processor 302, a transmitter 303, a memory 304, and a bus interface 305.
Detailed Description
The embodiment of the application provides a stored information verification method and system based on a alliance chain consensus mechanism, and solves the technical problems of low stored information verification efficiency and low accuracy rate in the prior art. The alliance chain based on the consensus mechanism is achieved, the safety of information verification is improved, the technical goal that verification information can be traced is achieved, and then the verification system based on the alliance chain storage information improves the verification efficiency and accuracy of the storage information, so that the verification cost of the storage information is reduced, and the technical effect of improving the working efficiency is achieved.
In the following, the technical solutions in the embodiments of the present application will be clearly and completely described with reference to the accompanying drawings, and it is to be understood that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments of the present application, and it should be understood that the present application is not limited by the example embodiments described herein. All other embodiments, which can be derived by a person skilled in the art from the embodiments of the present application without making any creative effort, shall fall within the protection scope of the present application. It should be further noted that, for the convenience of description, only some but not all of the elements relevant to the present application are shown in the drawings.
Example one
Referring to fig. 1, an embodiment of the present application provides a storage information verification method based on a federation chain consensus mechanism, where the method is applied to a storage information verification system based on a federation chain consensus mechanism, and the method specifically includes the following steps:
step S100: obtaining a plurality of participant information for a first message event;
specifically, the stored information verification method based on the alliance chain consensus mechanism is applied to the stored information verification system based on the alliance chain consensus mechanism, identity verification can be performed on all participants of an event through an alliance chain based on the consensus mechanism, further, based on the alliance chain stored information verification system, the stored information verification of the participants passing the identity verification is performed intelligently, and finally, whether the event meets the execution requirement is judged based on the stored information verification result. Through the use of the alliance chain of the consensus mechanism, the safety of information verification is improved, the technical goal of traceability of verification information is achieved, the use of the alliance chain storage information verification system improves the efficiency and accuracy of storage information verification, further reduces the cost of storage information verification, and achieves the technical effect of improving the working efficiency.
The alliance chain only aims at members of a specific group and limited third parties, a plurality of preselected nodes are designated as billers inside the alliance chain, and generation of each block is determined by all the preselected nodes. For example, a federation chain may be used in a domain corresponding to a group such as a bank, insurance security, business association, and the like. The alliance chain in the embodiment of the application is used for managing and deciding between the internal subsidiaries and all departments of the company. The consensus mechanism is that the transaction is verified and confirmed within a short time through voting of special nodes, and for one transaction, if a plurality of nodes with irrelevant benefits can achieve consensus, the whole network can also achieve consensus. For example, a public character, a microblog big V, a virtual coin player, an African student and a European traveler are not mutually acquainted, but all of them agree that Zhang III is a good person, and then basically, the fact that Zhang III is not bad can be judged. The consensus mechanism in the embodiment of the application is used for collecting opinions of a head office on sub-companies, subordinate departments and the like, so that consensus is achieved to execute a certain work task together.
The first message event refers to the relevant information of any event to be executed. The multiple participants refer to all nodes related to the first message event. For example, a company prepares to perform system update on the security protection products in the official website of the company at 8 months and 27 days, namely a message event, and subsidiaries, subordinate specific departments of the subsidiaries and the like related to the system update of the security protection products of the company are participants of the message event. In the stored information verification system, the participants of all the message events can be uniformly set in advance. That is, the corporate security product system update is jointly determined by the plurality of parties. The information of the subsidiary company where each participant is located, the main business range, and the like are the information of the participants.
By obtaining the information of the plurality of participants of the first message event, the data base is provided for subsequently determining the identities of the participants related to the event, and meanwhile, the participants are preselected, so that the technical effect of effectively managing and tracing the subsequent decision making process is achieved.
Step S200: constructing a alliance chain of a consensus mechanism based on the information of the plurality of participants;
specifically, the consensus mechanism is a mechanism for achieving consensus, which is a relationship and operation manner of a subject, an object, an intermediary, and the like, and is a main promotion for promoting an internal object to achieve uniform consensus. And generating a block corresponding to the first message event based on the plurality of participants preselected by the first message event, namely, the bookkeeper of the preselected node, and finally constructing a alliance chain corresponding to the block consensus mechanism. The alliance chain has expandability, and is convenient for changing operations such as node addition and deletion in the actual use process. By constructing the alliance chain, reference is provided for subsequently verifying the identity of each participant, and the technical effect of improving the identity verification efficiency of each participant is achieved.
Step S300: based on the alliance chain, performing identity authentication on the multiple participants one by one to generate an identity authentication result set;
specifically, based on the federation chain of the consensus mechanism, the multiple parties corresponding to the first message event are authenticated one by one, and the authentication results of all the parties form the authentication result set. Due to the requirement of the alliance chain, all new nodes in the authorization consensus mechanism must be subjected to identity registration before participating in consensus, and must also be subjected to identity verification before verifying the stored information, so that the security of the stored information verification system is improved. For example, a alliance chain applied to a security department can ensure that information is not leaked and operation safety is ensured when the related storage information of the security department is verified. Based on the alliance chain, the technical effects of reducing verification cost and improving information safety and accuracy are achieved.
Step S400: judging whether the identity verification result set meets a preset identity verification passing rate or not;
step S500: if the identity verification result set meets the preset identity verification passing rate, obtaining an identity verification passing participant set;
specifically, the identity verification results of all the participants of the first message event in the identity verification result set are determined in a traversing manner, so that the number of the participants passing the identity verification and the number of the participants failing to pass the identity verification in all the participants are determined, the identity verification passing rate is calculated and obtained further based on the total participant number information of the corresponding block, and finally whether the identity verification passing rate meets the preset identity verification passing rate is judged. The preset authentication passing rate is preset after the stored information authentication system is comprehensively analyzed based on the consensus mechanism fault tolerance, the actual condition of the message event and the like. Further, when the identity verification result set meets the preset identity verification passing rate, the stored information verification system automatically obtains information of all parties who pass identity verification, and then the identity verification passing party set is formed. The technical effects of determining the identity of the participant and verifying the identity of the participant so as to ensure the effective supervision of the transaction and verification process are achieved.
Step S600: establishing a alliance chain storage information verification system based on the own storage information of the party set passing the identity verification, and performing traversal verification on the own storage information;
specifically, based on each participant passing the identity authentication, own stored information corresponding to each participant is obtained. Wherein, each participant is in one-to-one correspondence with the own stored information. Furthermore, the own stored information of each participant is sequentially verified through the alliance chain stored information verification system. Through the alliance chain storage information verification system, decentralization of a plurality of participants is achieved, and the aim that different consensus nodes correspond to different participants is achieved, so that the overall safety of the system is improved, and the technical effect of the intelligent degree of the own storage information verification system is finally improved.
Step S700: and triggering the first message event based on the verification result set of the traversal verification.
Specifically, after the verification of the own stored information is intelligently performed on the participants passing the identity verification based on the alliance chain stored information verification system, the obtained verification results form the verification result set of the traversal verification. The storage information verification system intelligently analyzes the verification result set, and then judges whether the verification result reaches the corresponding condition for triggering the first message event, and when the condition for triggering the first message event is reached, the first message event is automatically executed, so that a set of alliance chain consensus mechanism for intelligently verifying the storage information is formed. The method achieves the purpose that the identity of each participant of the event is verified based on the alliance chain of the consensus mechanism, further, the stored information of each participant passing the identity verification is intelligently verified in sequence based on the alliance chain stored information verification system, and finally, whether the event meets the execution requirement is judged based on the stored information verification result. The use of the alliance chain of the consensus mechanism improves the safety of information verification, realizes the technical goal of traceability of verification information, and the use of the alliance chain storage information verification system improves the efficiency and accuracy of storage information verification, further reduces the cost of storage information verification, and achieves the technical effect of improving the working efficiency.
Further, step S300 in the embodiment of the present application further includes:
step S310: generating authentication request information based on the alliance chain;
step S320: respectively sending the identity authentication request information to a plurality of participants for identity authentication through a third virtual party, wherein the third virtual party is embedded in the alliance chain;
step S330: obtaining an authentication feedback result set of the plurality of participants for the authentication request information;
step S340: and sending the identity verification feedback result set to the third virtual party, and performing identity verification on the multiple participants one by one.
Specifically, the federation chain is a semi-open distributed system with a high degree of decentralization. Generating the authentication request information based on the federation chain. Wherein the authentication request information is used to sequentially authenticate the preselected participants of the first message event. And the storage information verification system transmits the identity verification request information generated by the alliance chain to a plurality of participants of the first message event through a third virtual party respectively, and performs identity verification on the participants respectively. The third virtual party is embedded in the alliance chain, and identity verification results of all the participants can be fed back to the alliance chain in real time. And obtaining an authentication feedback result set of the multiple parties for the authentication request information through authentication, and further sending the authentication feedback result set to the third virtual party to perform one-by-one authentication on the multiple parties.
Through the characteristic that the alliance chain is semi-open, the number of the verification of the identity of the participator based on the block chain technology is effectively reduced, and the technical effect of improving the verification speed of the identity of the participator is achieved.
Further, as shown in fig. 2, step S600 in this embodiment of the present application further includes:
step S610: according to the identity authentication passing participant set, obtaining the own storage information set of each participant;
step S620: constructing a JMS message closed-loop chain based on the self-owned storage information set;
step S630: based on the JMS message closed-loop chain and first information verification logic, the identity verification sends a single self-stored information to other participants through each participant in a participant set;
step S640: the other participants receive the single self-storage information and perform information fusion on the self-encryption label and the single self-storage information to generate storage information verification data;
step S650: and each of the other participants feeds the fused stored information verification data back to the rest participants.
Specifically, the own stored information set of each participant is obtained through the participant set according to the identity authentication. The identity authentication has a one-to-one mapping relationship with the own storage information of each participant through the participant. And constructing a JMS message closed-loop chain based on the self-owned storage information set corresponding to each identity verification passing participant. The JMS, i.e. Java message service application program interface, is an API for message oriented middleware in a Java platform, and is used for sending messages between two applications or in a distributed system to perform asynchronous communication. In the JMS message closed-loop chain, the own storage information of each participant is independent and establishes certain relation. For example, the company has a security product which needs to be upgraded regularly, and the system is developed and obtained by all the subsidiaries together, so that the JMS message closed-loop chain is constructed based on the upgraded system (namely, the self-stored information) of all the subsidiaries.
Based on the JMS message closed-loop chain and the first information verification logic, each party that passes the authentication sends its own storage information to each other party that passes the authentication, that is, other parties in the JMS message closed-loop chain except its own party. The first information verification logic is a single own storage information circulation scheme which sequentially receives the single own storage information of other participants through each participant in the JMS message closed-loop chain and sends the single own storage information again after verification processing. And the other participants receive the single own storage information, perform information fusion on the own encryption label and the single own storage information and generate own storage information verification data, and each of the other participants feeds back the fused own storage information verification data to other participants except the other participants. For example, the company has a security product which needs to be regularly upgraded, and the system is jointly developed and obtained by each subsidiary company, so that the upgrading systems (namely own storage information) based on each subsidiary company respectively send respective single upgrading systems (namely single own storage information) to other participants except the company based on a JMS message closed-loop chain, and after receiving the single upgrading systems (namely the single own storage information), the other participants add own unique encryption tags and then send the encryption tags to the other participants except the company.
And all the parties passing the authentication finish the encryption labels of all the single self-stored information through the JMS-based message closed-loop chain. The JMS is used for ensuring that the generation of each individual self-storage information and the information are asynchronous, when each participant receives each individual self-storage information, the information can be automatically sent to other available participants without actively sending a request, and in addition, the JMS message closed-loop chain ensures that each individual self-storage information file can be delivered only once, so that the technical effects of improving the storage information verification efficiency and the verification accuracy and further improving the working efficiency are achieved.
Further, as shown in fig. 3, step S630 in this embodiment of the present application further includes:
step S631: acquiring first own storage information of a first participant according to the own storage information set of each participant;
step S632: sending the first owned storage information to the participants based on the JMS message closed-loop chain, wherein the participants do not include the first participant;
step S633: obtaining the own encryption label set of each participant;
step S634: based on the own encryption label set, the participants individually encrypt the received first own storage information and send encrypted first storage information verification data to the participants, wherein the participants comprise the first participant and do not comprise the participants per se;
step S635: and the participants carry out information verification on the received first stored information verification data and construct the first information verification logic.
Specifically, the first own storage information of the first participant is obtained according to the own storage information set of each participant. The first party refers to any party with the authenticated identity, and is generally an initiator of a message event or a transaction.
And further, based on the JMS message closed-loop chain, the first self-stored information is sent to other parties passing identity authentication except the first self-stored information. After each participant receives the first own storage information, a unique encryption tag is added into the received first own storage information. And aggregating all other participants to add the encrypted tags of the first own storage information to form an own encrypted tag set of each participant. Based on the own encryption label set, each participant individually encrypts the received first own storage information, and sends the encrypted first storage information verification data to all other participants except the participant, wherein the first participant is the initiator of the first message event. And finally, the participants verify the received information of the first self-contained storage information added with the encrypted tags of the participants through the received first storage information verification data, so that the first information verification logic is constructed.
For example, a general company is used for upgrading the security system, the A subsidiary company is used for upgrading and initiating, and B, C, D subsidiary company is used as a receiver. The A subsidiary company is used as an initiator, the received B, C, D verification public key of the B subsidiary company is used for encrypting the A upgrading system of the A subsidiary company, and the A private key of the A subsidiary company is used for carrying out encryption marking, so that the A1 upgrading system is obtained; further, the A subsidiary company sends the A verification public key and the A1 upgrading system of the A subsidiary company to the B, C, D subsidiary company; B. c, D subsidiary as the receiver, first decrypts the A1 upgrade system received with its own corresponding B, C, D private key, and then verifies the A subsidiary's encryption mark with the A verification public key received.
Through the JMS message closed-loop chain, the synchronization of distributed single storage information and the overall consistency of a storage information verification system are realized, and the technical effects of improving the storage information verification efficiency and ensuring the storage information safety are achieved.
Further, as shown in fig. 4, step S700 in the embodiment of the present application further includes:
step S710: based on the first information verification logic, performing traversal cyclic information verification on each participant in a participant set passing the identity verification to obtain a stored information verification result set of each participant;
step S720: obtaining total participant number information of the participant set with the identity verification passing;
step S730: judging whether the verification quantity of the storage information verification result set and the total party quantity information keep a first data relationship;
step S740: and if the verification quantity of the storage information verification result set and the total party quantity information keep the first data relationship, triggering the first message event.
Specifically, based on the first information verification logic, traversal cyclic information verification is performed on each participant in the set of participants passing the identity verification, and a set of stored information verification results of each participant is obtained. And counting to obtain the verification quantity of the storage information verification result set, and further judging whether the verification quantity of the storage information verification result set and the total party quantity information keep a first data relationship. The first data relation refers to that the number of the storage information verification passes is more than half of the total number of the participating parties. And when the verification quantity of the stored information verification result set and the total party quantity information keep the first data relationship, triggering the first message event. For example, if the total number of participants is 10, the total number of participants verified by the stored information should be greater than or equal to 6, and then the message event proposed by the initiator can be executed. The technical effect of improving the effective execution rate of the message event is achieved.
Further, step S730 in the embodiment of the present application further includes:
step S731: if the verification quantity of the storage information verification result set and the total participant quantity information do not keep the first data relationship, generating a first rechecking instruction;
step S732: and rechecking the identity information of each participant according to the first rechecking instruction.
Specifically, when the verification number of the stored information verification result set and the total participant number information do not maintain the first data relationship, that is, when the participant verification information cannot represent all the participant verification results, the system automatically generates the first review instruction. For example, when the total number of the participants is 10 and the total number of the participants verified by the stored information is 5, the identities of the participants need to be re-verified at this time. And based on the first rechecking instruction, the system automatically rechecks the identity information of each participant. Finally, the technical effect of improving the safety and the accuracy of information verification is achieved.
Further, step S632 in this embodiment of the present application further includes:
step S6321: monitoring and receiving the information sending results of all the participants based on the asynchronous message receiving mode of the JMS message closed-loop chain;
step S6322: according to the monitoring receiving result, if the first own storage information of the first participant fails to be sent, a first retransmission instruction is generated;
step S6323: and according to the first retransmission instruction and the JMS message closed-loop chain, the first participant retransmits the first self-storage information.
Specifically, the information sending results of the participants are monitored and received based on the asynchronous message receiving mode of the JMS message closed-loop chain. Further, according to the result of the monitoring reception, whether the information needs to be retransmitted is judged. And if the first self-storage information of the first participant fails to be sent, the system automatically generates a first retransmission instruction. And then the first retransmission instruction and the JMS message are in a closed-loop chain, and the first participant retransmits the first self-storage information to other participants except for the first participant. Based on the JMS closed-loop chain, if the message is received asynchronously, the message subscriber needs to register a message listener, similar to an event listener, and as long as the message arrives, the JMS service provider will deliver the message by calling the onMessage of the listener. If a message listener is registered, the onMessage method of the listener will be automatically invoked as soon as the message arrives, i.e. the transmission is successful. For example, the MDB (Message-Driven Bean) in EJB is a Message listener Lister. The JMS message closed-loop chain realizes real-time monitoring of the message sending state, and timely resends the message once the message is failed to be sent, thereby achieving the technical effects of improving the message verification efficiency and reducing the message verification cost.
To sum up, the storage information verification method based on the alliance chain consensus mechanism provided by the embodiment of the application has the following technical effects:
1. obtaining a plurality of participant information of a first message event; constructing a alliance chain of a consensus mechanism based on the information of the plurality of participants; based on the alliance chain, performing identity authentication on the multiple participants one by one to generate an identity authentication result set; judging whether the identity verification result set meets a preset identity verification passing rate or not; if the identity verification result set meets the preset identity verification passing rate, obtaining an identity verification passing participant set; establishing a alliance chain storage information verification system based on the own storage information of the party set passing the identity verification, and performing traversal verification on the own storage information; and triggering the first message event based on the verification result set of the traversal verification. The alliance chain based on the consensus mechanism is achieved, the safety of information verification is improved, the technical goal that verification information can be traced is achieved, and then the verification system based on the alliance chain storage information improves the verification efficiency and accuracy of the storage information, so that the verification cost of the storage information is reduced, and the technical effect of improving the working efficiency is achieved.
2. And all the parties passing the authentication finish the encryption labels of all the single self-stored information through the JMS-based message closed-loop chain. The JMS is used for ensuring that the generation of each individual self-storage information and the information are asynchronous, when each participant receives each individual self-storage information, the information can be automatically sent to other available participants without actively sending a request, and in addition, the JMS message closed-loop chain ensures that each individual self-storage information file can be delivered only once, so that the technical effects of improving the storage information verification efficiency and the verification accuracy and further improving the working efficiency are achieved.
3. The JMS message closed-loop chain realizes real-time monitoring of the message sending state, and timely resends the message once the message is failed to be sent, thereby achieving the technical effects of improving the message verification efficiency and reducing the message verification cost.
Example two
Based on the same inventive concept as the stored information verification method based on the federation chain consensus mechanism in the foregoing embodiment, the present invention further provides a stored information verification system based on the federation chain consensus mechanism, please refer to fig. 5, where the system includes:
a first obtaining unit 11, where the first obtaining unit 11 is configured to obtain information of a plurality of participants of a first message event;
a first constructing unit 12, where the first constructing unit 12 is configured to construct a federation chain of consensus mechanisms based on the plurality of participant information;
a first generating unit 13, where the first generating unit 13 is configured to perform identity verification on the multiple participants one by one based on the federation chain, and generate an identity verification result set;
a first determining unit 14, where the first determining unit 14 is configured to determine whether the authentication result set meets a preset authentication passing rate;
a second obtaining unit 15, where the second obtaining unit 15 is configured to obtain a set of parties with identity verification passing if the set of identity verification results meets the preset identity verification passing rate;
the second constructing unit 16 is configured to construct a federation chain storage information verification system based on the own storage information of the party set that passes the identity verification, and perform traversal verification on the own storage information;
a first executing unit 17, where the first executing unit 17 is configured to trigger the first message event based on the verification result set of the traversal verification.
Further, the system further comprises:
a second generation unit, configured to generate authentication request information based on the federation chain;
a first sending unit, configured to send the authentication request information to multiple parties for authentication through a third virtual party, where the third virtual party is embedded in the federation chain;
a third obtaining unit, configured to obtain an authentication feedback result set of the multiple parties for the authentication request information;
and the second execution unit is used for sending the identity verification feedback result set to the third virtual party and performing identity verification on the multiple participants one by one.
Further, the system further comprises:
a fourth obtaining unit, configured to obtain a self-owned storage information set of each participant according to that the identity authentication passes through the participant set;
a third constructing unit, configured to construct a JMS message closed-loop chain based on the own storage information set;
a second sending unit, configured to send, based on the JMS message closed-loop chain and a first information verification logic, a single self-stored information to other participants through each participant in a set of participants for the identity verification;
a third generating unit, configured to receive the single owned storage information by the other participating party, perform information fusion on an owned encryption tag and the single owned storage information, and generate storage information verification data;
a first feedback unit, configured to feed back, by each of the other participants, the fused stored information verification data to the remaining participants.
Further, the system further comprises:
a fifth obtaining unit, configured to obtain first own storage information of a first participant according to the own storage information set of each participant;
a third sending unit, configured to send the first owned storage information to the participants based on the JMS message closed-loop chain, where the participants do not include the first participant;
a sixth obtaining unit, configured to obtain an owned encryption tag set of each participant;
a fourth sending unit, configured to, based on the owned encryption tag set, individually encrypt the received first owned storage information by each participant, and send encrypted first storage information verification data to each participant, where each participant includes the first participant and does not include its own participant;
a fourth construction unit, configured to perform information verification on the received first stored information verification data by the participants, and construct the first information verification logic.
Further, the system further comprises:
a seventh obtaining unit, configured to perform traversal cyclic information verification on each participant in a set of participants whose identity is verified based on the first information verification logic, and obtain a set of stored information verification results of each participant;
an eighth obtaining unit, configured to obtain total participant number information of the set of participants for which the identity authentication passes;
a second judging unit, configured to judge whether the verification quantity of the stored information verification result set and the total party quantity information maintain a first data relationship;
a third executing unit, configured to trigger the first message event if the verification quantity of the stored information verification result set and the total party quantity information maintain the first data relationship.
Further, the system further comprises:
a fourth generating unit, configured to generate a first rechecking instruction if the first data relationship is not maintained between the verification quantity of the storage information verification result set and the total party quantity information;
and the fourth execution unit is used for rechecking the identity information of each participant according to the first rechecking instruction.
Further, the system further comprises:
a fifth execution unit, configured to monitor and receive information sending results of the participants based on an asynchronous message receiving manner of the JMS message closed-loop chain;
a fifth generating unit, configured to generate a first retransmission instruction according to the result of the monitoring reception if the first self-storage information of the first participant fails to be sent;
a fifth sending unit, configured to resend the first owned memory information by the first participant according to the first resend instruction and the closed-loop chain of JMS messages.
In the present specification, each embodiment is described in a progressive manner, and the main point of each embodiment is that the embodiment is different from other embodiments, and the foregoing stored information verification method based on the federation chain consensus mechanism in the first embodiment of fig. 1 and the specific example are also applicable to a stored information verification system based on the federation chain consensus mechanism in this embodiment. The device disclosed by the embodiment corresponds to the method disclosed by the embodiment, so that the description is simple, and the relevant points can be referred to the method part for description.
The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present application. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the application. Thus, the present application is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.
Exemplary electronic device
The electronic apparatus of the embodiment of the present application is described below with reference to fig. 6.
Fig. 6 illustrates a schematic structural diagram of an electronic device according to an embodiment of the present application.
Based on the inventive concept of the storage information verification method based on the alliance chain consensus mechanism in the foregoing embodiments, the present invention further provides a storage information verification system based on the alliance chain consensus mechanism, wherein a computer program is stored on the storage information verification system, and when the computer program is executed by a processor, the computer program implements the steps of any one of the foregoing storage information verification methods based on the alliance chain consensus mechanism.
Where in fig. 6 a bus architecture (represented by bus 300), bus 300 may include any number of interconnected buses and bridges, bus 300 linking together various circuits including one or more processors, represented by processor 302, and memory, represented by memory 304. The bus 300 may also link together various other circuits such as peripherals, voltage regulators, power management circuits, and the like, which are well known in the art, and therefore, will not be described any further herein. A bus interface 305 provides an interface between the bus 300 and the receiver 301 and transmitter 303. The receiver 301 and the transmitter 303 may be the same element, i.e., a transceiver, providing a means for communicating with various other apparatus over a transmission medium.
The processor 302 is responsible for managing the bus 300 and general processing, and the memory 304 may be used for storing data used by the processor 302 in performing operations.
The application provides a storage information verification method based on a alliance chain consensus mechanism, which is applied to a storage information verification system based on the alliance chain consensus mechanism, wherein the method comprises the following steps: obtaining a plurality of participant information of a first message event; constructing a alliance chain of a consensus mechanism based on the information of the plurality of participants; based on the alliance chain, performing identity authentication on the multiple participants one by one to generate an identity authentication result set; judging whether the identity verification result set meets a preset identity verification passing rate or not; if the identity verification result set meets the preset identity verification passing rate, obtaining an identity verification passing participant set; establishing a alliance chain storage information verification system based on the own storage information of the party set passing the identity verification, and performing traversal verification on the own storage information; and triggering the first message event based on the verification result set of the traversal verification. The technical problems of low efficiency and low accuracy of stored information verification in the prior art are solved. The alliance chain based on the consensus mechanism is achieved, the safety of information verification is improved, the technical goal that verification information can be traced is achieved, and then the verification system based on the alliance chain storage information improves the verification efficiency and accuracy of the storage information, so that the verification cost of the storage information is reduced, and the technical effect of improving the working efficiency is achieved.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, apparatus, or computer program product. Accordingly, the present application may take the form of an entirely software embodiment, an entirely hardware embodiment, or an embodiment combining software and hardware aspects. Furthermore, the present application is in the form of a computer program product that may be embodied on one or more computer-usable storage media having computer-usable program code embodied therewith. And such computer-usable storage media include, but are not limited to: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk Memory, a Compact Disc Read-Only Memory (CD-ROM), and an optical Memory.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create a system for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including an instruction system which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks. While preferred embodiments of the present invention have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including preferred embodiments and all such alterations and modifications as fall within the scope of the invention.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present invention without departing from the spirit and scope of the invention. Thus, if such modifications and variations of the present invention fall within the scope of the claims of the present invention and their equivalents, the present invention is also intended to include such modifications and variations.

Claims (7)

1. A storage information verification method based on a alliance chain consensus mechanism is applied to a storage information verification system, and comprises the following steps:
obtaining a plurality of participant information for a first message event;
constructing a alliance chain of a consensus mechanism based on the information of the plurality of participants;
based on the alliance chain, performing identity authentication on the multiple participants one by one to generate an identity authentication result set;
judging whether the identity verification result set meets a preset identity verification passing rate or not;
if the identity verification result set meets the preset identity verification passing rate, obtaining an identity verification passing participant set;
establishing a alliance chain storage information verification system based on the own storage information of the party set passing the identity verification, and performing traversal verification on the own storage information;
triggering the first message event based on the verification result set of the traversal verification;
wherein the performing identity verification one by one for the plurality of parties comprises:
generating authentication request information based on the alliance chain;
respectively sending the identity authentication request information to a plurality of participants for identity authentication through a third virtual party, wherein the third virtual party is embedded in the alliance chain;
obtaining an authentication feedback result set of the plurality of participants for the authentication request information;
sending the identity verification feedback result set to the third virtual party, and performing identity verification on the multiple participants one by one;
the establishing of the alliance chain storage information verification system, and the traversing verification of the self storage information comprises the following steps:
according to the identity authentication passing participant set, obtaining the own storage information set of each participant;
constructing a JMS message closed-loop chain based on the self-owned storage information set;
based on the JMS message closed-loop chain and first information verification logic, the identity verification sends a single self-stored information to other participants through each participant in a participant set;
the other participants receive the single self-storage information and perform information fusion on the self-encryption label and the single self-storage information to generate storage information verification data;
and each of the other participants feeds the fused stored information verification data back to the rest participants.
2. The method of claim 1, wherein the first information validation logic comprises:
acquiring first own storage information of a first participant according to the own storage information set of each participant;
sending the first owned storage information to the participants based on the JMS message closed-loop chain, wherein the participants do not include the first participant;
obtaining the own encryption label set of each participant;
based on the own encryption label set, the participants individually encrypt the received first own storage information and send encrypted first storage information verification data to the participants, wherein the participants comprise the first participant and do not comprise the participants per se;
and the participants carry out information verification on the received first stored information verification data and construct the first information verification logic.
3. The method of claim 2, wherein the method comprises:
based on the first information verification logic, performing traversal cyclic information verification on each participant in a participant set passing the identity verification to obtain a stored information verification result set of each participant;
obtaining total participant number information of the participant set with the identity verification passing;
judging whether the verification quantity of the storage information verification result set and the total party quantity information keep a first data relationship;
and if the verification quantity of the storage information verification result set and the total party quantity information keep the first data relationship, triggering the first message event.
4. The method of claim 3, wherein said determining whether the validation number of the stored information validation result set and the total party number information maintain a first data relationship comprises:
if the verification quantity of the storage information verification result set and the total participant quantity information do not keep the first data relationship, generating a first rechecking instruction;
and rechecking the identity information of each participant according to the first rechecking instruction.
5. The method of claim 2, wherein said sending said first owned storage information to said participants based on said closed-loop chain of JMS messages, said participants not including said first participant, comprises:
monitoring and receiving the information sending results of all the participants based on the asynchronous message receiving mode of the JMS message closed-loop chain;
according to the monitoring receiving result, if the first own storage information of the first participant fails to be sent, a first retransmission instruction is generated;
and according to the first retransmission instruction and the JMS message closed-loop chain, the first participant retransmits the first self-storage information.
6. A system for verifying stored information based on a federation chain consensus mechanism, wherein the system comprises:
a first obtaining unit: the first obtaining unit is used for obtaining a plurality of participant information of a first message event;
a first building unit: the first construction unit is used for constructing a alliance chain of a consensus mechanism based on the information of the plurality of participants;
a first generation unit: the first generating unit is used for performing identity verification on the multiple participants one by one based on the alliance chain to generate an identity verification result set;
a first judgment unit: the first judging unit is used for judging whether the identity verification result set meets a preset identity verification passing rate;
a second obtaining unit: the second obtaining unit is used for obtaining an identity verification passing participant set if the identity verification result set meets the preset identity verification passing rate;
a second building element: the second construction unit is used for constructing a alliance chain storage information verification system based on the own storage information of the participant set which passes the identity verification, and performing traversal verification on the own storage information;
a first execution unit: the first execution unit is used for triggering the first message event based on the verification result set of the traversal verification;
wherein the first generation unit further includes:
a second generation unit, configured to generate authentication request information based on the federation chain;
a first sending unit, configured to send the authentication request information to multiple parties for authentication through a third virtual party, where the third virtual party is embedded in the federation chain;
a third obtaining unit, configured to obtain an authentication feedback result set of the multiple parties for the authentication request information;
a second execution unit, configured to send the authentication feedback result set to the third virtual party, and perform identity authentication on the multiple participants one by one;
wherein the second building element further comprises:
a fourth obtaining unit, configured to obtain a self-owned storage information set of each participant according to that the identity authentication passes through the participant set;
a third constructing unit, configured to construct a JMS message closed-loop chain based on the own storage information set;
a second sending unit, configured to send, based on the JMS message closed-loop chain and a first information verification logic, a single self-stored information to other participants through each participant in a set of participants for the identity verification;
a third generating unit, configured to receive the single owned storage information by the other participating party, perform information fusion on an owned encryption tag and the single owned storage information, and generate storage information verification data;
a first feedback unit, configured to feed back, by each of the other participants, the fused stored information verification data to the remaining participants.
7. A stored information verification system based on a federation chain consensus mechanism, comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor implements the steps of the method of any one of claims 1 to 5 when executing the program.
CN202111398991.XA 2021-11-24 2021-11-24 Storage information verification method and system based on alliance chain consensus mechanism Active CN113821776B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111398991.XA CN113821776B (en) 2021-11-24 2021-11-24 Storage information verification method and system based on alliance chain consensus mechanism

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111398991.XA CN113821776B (en) 2021-11-24 2021-11-24 Storage information verification method and system based on alliance chain consensus mechanism

Publications (2)

Publication Number Publication Date
CN113821776A CN113821776A (en) 2021-12-21
CN113821776B true CN113821776B (en) 2022-02-08

Family

ID=78918112

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111398991.XA Active CN113821776B (en) 2021-11-24 2021-11-24 Storage information verification method and system based on alliance chain consensus mechanism

Country Status (1)

Country Link
CN (1) CN113821776B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108648056A (en) * 2018-05-10 2018-10-12 中链科技有限公司 A kind of house lease contract processing method and system based on block chain
CN109067541A (en) * 2018-06-29 2018-12-21 阿里巴巴集团控股有限公司 Data verification method and device, electronic equipment based on block chain
KR20200027784A (en) * 2018-09-05 2020-03-13 엔에이치엔 주식회사 Method for storaging driving record data based block chain
CN113010331A (en) * 2021-03-12 2021-06-22 腾讯科技(深圳)有限公司 Abnormal data processing method and device and computer readable storage medium
CN113259453A (en) * 2021-06-02 2021-08-13 支付宝(杭州)信息技术有限公司 Cross-chain interaction method and device

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109088866B (en) * 2018-08-02 2021-02-19 北京百悟科技有限公司 Multi-cloud platform unified identity authentication method and device based on alliance chain

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108648056A (en) * 2018-05-10 2018-10-12 中链科技有限公司 A kind of house lease contract processing method and system based on block chain
CN109067541A (en) * 2018-06-29 2018-12-21 阿里巴巴集团控股有限公司 Data verification method and device, electronic equipment based on block chain
KR20200027784A (en) * 2018-09-05 2020-03-13 엔에이치엔 주식회사 Method for storaging driving record data based block chain
CN113010331A (en) * 2021-03-12 2021-06-22 腾讯科技(深圳)有限公司 Abnormal data processing method and device and computer readable storage medium
CN113259453A (en) * 2021-06-02 2021-08-13 支付宝(杭州)信息技术有限公司 Cross-chain interaction method and device

Also Published As

Publication number Publication date
CN113821776A (en) 2021-12-21

Similar Documents

Publication Publication Date Title
CN110490305B (en) Machine learning model processing method based on block chain network and node
CN109741039B (en) Accounting method, mine pool server, terminal equipment, mine excavation node and mine pool
CN108256859B (en) Financial product transaction consensus method, node and system based on block chain
CN110599173B (en) Block chain consensus node determination method, device, equipment and storage medium
CN110442652B (en) Cross-chain data processing method and device based on block chain
CN101981889B (en) Secure communications in computer cluster systems
CN112311735B (en) Credible authentication method, network equipment, system and storage medium
CN111464518B (en) Method and device for sending and verifying cross-link communication data
CN111314067B (en) Block storage method and device, computer equipment and storage medium
JP2019517175A (en) Implementation of logic gate function using block chain
CN110569251A (en) Data processing method, related equipment and computer readable storage medium
KR20160050876A (en) Bitcoin dealing method using public key and private key stored in smart card
CN112527912B (en) Data processing method and device based on block chain network and computer equipment
CN110599095A (en) Dangerous waste treatment method based on block chain network and node of block chain network
CN110992178A (en) Verification method and device for block chain node, computer equipment and storage medium
CN111314172A (en) Data processing method, device and equipment based on block chain and storage medium
CN112069550A (en) Electronic contract deposit certificate system based on intelligent contract mode
CN110321730A (en) A kind of method, block chain node and the storage medium of operation data processing
CN111274597A (en) Data processing method and equipment
CN111865595A (en) Block chain consensus method and device
CN110910110A (en) Data processing method and device and computer storage medium
CN109960512B (en) Software deployment method and system
CN113821776B (en) Storage information verification method and system based on alliance chain consensus mechanism
Chinthamu et al. Self-Secure firmware model for Blockchain-Enabled IOT environment to Embedded system
CN113497827B (en) Information sharing method and equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant