CN114024958A - Trust architecture aiming at autonomous propagation - Google Patents

Trust architecture aiming at autonomous propagation Download PDF

Info

Publication number
CN114024958A
CN114024958A CN202011196328.7A CN202011196328A CN114024958A CN 114024958 A CN114024958 A CN 114024958A CN 202011196328 A CN202011196328 A CN 202011196328A CN 114024958 A CN114024958 A CN 114024958A
Authority
CN
China
Prior art keywords
data
block chain
architecture
trust
chain technology
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011196328.7A
Other languages
Chinese (zh)
Inventor
阮安邦
果霖
魏明
陈旭明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Octa Innovations Information Technology Co Ltd
Original Assignee
Beijing Octa Innovations Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Octa Innovations Information Technology Co Ltd filed Critical Beijing Octa Innovations Information Technology Co Ltd
Priority to CN202011196328.7A priority Critical patent/CN114024958A/en
Publication of CN114024958A publication Critical patent/CN114024958A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/34Network arrangements or protocols for supporting network services or applications involving the movement of software or configuration parameters 
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The invention relates to the technical field of network trust architectures, and discloses a trust architecture aiming at autonomous propagation, which comprises the following steps: the method comprises the following steps: the problem is found, which is divided into four parts including: 1. data tampering problem: the data is difficult to be associated with the data, and the phenomena of data tampering and the like are easy to cause; 2. data distortion problem: historical data on the nodes is easy to be tampered, and data distortion is caused. The trust architecture aiming at the autonomous propagation can ensure the security and reliability of core data and key services of an enterprise and the integrity of data center infrastructure through an enterprise-level distributed platform taking a block chain technology as a core through a trusted block chain, so that the block chain technology is more like a recording system compared with a database, the shared, transparent and real recording system of the block chain technology enables future business cooperation to become healthy, efficient and convenient, and meanwhile, the block chain technology can be widely and deeply applied in various fields.

Description

Trust architecture aiming at autonomous propagation
Technical Field
The invention relates to the technical field of network trust architectures, in particular to a trust architecture aiming at autonomous propagation.
Background
The block chain is a term in the technical field of information, and essentially, the block chain is a shared database, and data or information stored in the shared database has the characteristics of 'unforgeability', 'whole-course trace', 'traceability', 'open transparency', 'collective maintenance' and the like.
When the existing internet architecture works, data are difficult to associate with each other, and data tampering is easy to happen, so that data in the internet have errors and bring unnecessary troubles, in addition, historical data on nodes are easy to tamper, data distortion is caused, the influence of human factors on a database structure is large, the system expansion capability is poor, the data circulation process is lack of clear records, and problem positioning is not facilitated.
Disclosure of Invention
The invention provides a trust framework aiming at autonomous propagation, which is provided with an enterprise-level distributed platform taking a block chain technology as a core, can ensure that enterprise core data and key services are safe and reliable, and a supported ledger provides high throughput capacity for storing any unstructured data, so that the software has the advantages of more reliable and traceable composition and construction, and the problems provided by the background technology are solved.
The invention provides the following technical scheme: 1. a trust architecture for autonomy, comprising the steps of:
the method comprises the following steps: the problem is found, which is divided into four parts including:
1. data tampering problem: the data is difficult to be associated with the data, and data tampering and the like are easy to occur.
2. Data distortion problem: historical data on the nodes is easy to be tampered, and data distortion is caused.
3. Problem difficult to locate: the data circulation process lacks clear records, and is not beneficial to problem positioning.
4. Problem of poor data expansion capability: the database structure is greatly influenced by human factors, and the system expansion capability is poor.
Step two: and building a trust architecture based on the trusted block chain.
Step three: the main technical embodiment is divided into three parts, including:
1. enterprise-level distributed platform: the trusted block chain is an enterprise-level distributed platform taking a block chain technology as a core, so that the security and reliability of enterprise core data and key services can be ensured, and the integrity of data center infrastructure is ensured.
2. And (4) sorting accounts: the supported ledger provides a high throughput capability of storing any unstructured data, making the composition and construction of software more reliable and traceable.
3. Diversified interfaces: the diversified interface can support the application requirement of higher level and improve the applicability of the trust framework.
Step four: the trust architecture works normally.
Preferably, the trusted blockchain is an enterprise-level distributed platform with a blockchain technology as a core, which can ensure that enterprise core data and key services are safe and reliable, and ensure the integrity of data center infrastructure, so that the blockchain technology is more like a recording system than a database. The shared, transparent and real recording system of the block chain technology also enables future business cooperation to become healthy, efficient and convenient, and meanwhile, the block chain technology can be more widely and deeply applied in various fields.
Preferably, the supported ledger provides high throughput capacity for storing any unstructured data, so that the composition and construction of software are more reliable and trackable, the method plays an important role in dealing with the aspects that the database structure is greatly influenced by human factors and the system expansion capacity is poor, and the framework is guaranteed to have better vitality during construction.
Preferably, the compatible interface and the modular plug-in component can form a trusted architecture, so that the diversified interface can support higher-level application requirements, the trusted architecture can adapt to the matching requirements of more applications when the applications are matched, the application compatibility degree is improved, the huge system of the trusted architecture is further ensured, and the architecture can meet different requirements.
Preferably, the enterprise-level distributed platform corresponds to data tampering and data distortion one to one, the ledger corresponds to problems which are difficult to locate one to one, and the diversified interfaces correspond to poor data expansion capability one to one.
Preferably, a data transaction mode framework is constructed by using a block chain technology, chaining and evidence storage are carried out on the dimensionalities such as the flow direction, the channel and the quantity of data, traceability of each transaction is achieved, accurate settlement among transaction main bodies is achieved, and objective evidence storage and traceability of the data from production to use of full life cycle information are achieved.
The invention has the following beneficial effects:
1. the trust architecture aiming at the autonomous propagation can ensure the security and reliability of core data and key services of an enterprise and the integrity of infrastructure of a data center through an enterprise-level distributed platform taking a block chain technology as a core through a trusted block chain, so that the block chain technology is more like a recording system compared with a database. The shared, transparent and real recording system of the block chain technology also enables future business cooperation to become healthy, efficient and convenient, and meanwhile, the block chain technology can be more widely and deeply applied in various fields.
2. The trust framework aiming at the autonomous propagation provides high throughput capacity for storing any unstructured data through the supported ledger, so that the composition and the construction of software are more reliable and traceable, the trust framework plays an important role in the aspects of large influence of human factors on the database structure and poor system expansion capacity, and the framework is ensured to have better vitality during construction.
3. The trust framework aiming at the autonomous propagation can form a trusted framework through the compatible interface and the module plug-in component, so that the diversified interface can support the application requirement of higher level, the trust framework can adapt to the matching requirement of more applications when the applications are matched, the compatibility degree of the applications is improved, the huge system of the trust framework is further ensured, and the framework can meet different requirements.
4. According to the trust framework aiming at the autonomous transmissibility, a data transaction mode framework is constructed by applying a block chain technology, chaining and evidence storage is carried out on the dimensionalities such as the flow direction, the channel and the quantity of data, traceability of each transaction is realized, accurate settlement among transaction main bodies is realized, and objective evidence storage and traceability of the data from production to use of full life cycle information are realized.
Drawings
FIG. 1 is a schematic view of the structure of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1, a trust architecture for autonomy includes the following steps:
the method comprises the following steps: the problem is found, which is divided into four parts including:
1. data tampering problem: the data is difficult to be associated with the data, and data tampering and the like are easy to occur.
2. Data distortion problem: historical data on the nodes is easy to be tampered, and data distortion is caused.
3. Problem difficult to locate: the data circulation process lacks clear records, and is not beneficial to problem positioning.
4. Problem of poor data expansion capability: the database structure is greatly influenced by human factors, and the system expansion capability is poor.
Step two: and building a trust architecture based on the trusted block chain.
The trust architecture aiming at the autonomous propagation can ensure the security and reliability of core data and key services of an enterprise and the integrity of infrastructure of a data center through an enterprise-level distributed platform taking a block chain technology as a core through a trusted block chain, so that the block chain technology is more like a recording system compared with a database. The shared, transparent and real recording system of the block chain technology also enables future business cooperation to become healthy, efficient and convenient, and meanwhile, the block chain technology can be more widely and deeply applied in various fields.
Step three: the main technical embodiment is divided into three parts, including:
1. enterprise-level distributed platform: the trusted block chain is an enterprise-level distributed platform taking a block chain technology as a core, so that the security and reliability of enterprise core data and key services can be ensured, and the integrity of data center infrastructure is ensured.
2. And (4) sorting accounts: the supported ledger provides a high throughput capability of storing any unstructured data, making the composition and construction of software more reliable and traceable.
The trust framework aiming at the autonomous propagation provides high throughput capacity for storing any unstructured data through the supported ledger, so that the composition and the construction of software are more reliable and traceable, the trust framework plays an important role in the aspects of large influence of human factors on the database structure and poor system expansion capacity, and the framework is ensured to have better vitality during construction.
3. Diversified interfaces: the diversified interface can support the application requirement of higher level and improve the applicability of the trust framework.
The trust framework aiming at the autonomous propagation can form a trusted framework through the compatible interface and the module plug-in component, so that the diversified interface can support the application requirement of higher level, the trust framework can adapt to the matching requirement of more applications when the applications are matched, the compatibility degree of the applications is improved, the huge system of the trust framework is further ensured, and the framework can meet different requirements.
Step four: the trust architecture works normally.
The trusted block chain is an enterprise-level distributed platform taking a block chain technology as a core, can ensure the security and reliability of enterprise core data and key services and ensure the integrity of data center infrastructure, so that the block chain technology is more like a recording system compared with a database. The shared, transparent and real recording system of the block chain technology also enables future business cooperation to become healthy, efficient and convenient, and meanwhile, the block chain technology can be more widely and deeply applied in various fields.
The supported ledger provides high throughput capacity for storing any unstructured data, so that the software is more reliable and trackable in composition and construction, plays an important role in dealing with the aspects that the database structure is greatly influenced by human factors and the system expansion capacity is poor, and ensures that the architecture has better vitality during construction.
The compatibility interface and the module plug-in component can form a trusted architecture, so that the diversified interface can support higher-level application requirements, the trusted architecture can meet the matching requirements of more applications when the applications are matched, the compatibility degree is improved, the huge system of the trusted architecture is further ensured, and the architecture can meet different requirements.
The enterprise-level distributed platform corresponds to data tampering and data distortion one to one, the ledger is difficult to locate and corresponds to a problem one to one, and the diversified interfaces correspond to poor data expansion capability one to one.
The storage layer takes a block chain technology as a core, and uses a unique optimized scheduling mode and a distributed storage space to achieve efficient encryption storage of data and prevent any potential mode from malicious reading.
The method for automatically repairing the data damage of all malicious behaviors ensures that all audit information and key data are not tampered, keeps the record of the damage behaviors, and prevents the information tampering, and comprises the following steps: 1. firstly encrypting parameters to be submitted; 2. then, making an md5 digest, namely a signature, on the encrypted information; 3. then, the abstract and the parameters are transmitted back to the server; 4. after the server receives the parameters, the parameters are encrypted in the same way to form an md5 abstract; 5. and comparing the two abstracts, if the parameters are not equal, the parameters are tampered, otherwise, the parameters are judged to be credible.
And the risk brought by internal personnel is avoided, such as data destruction caused by manual misoperation.
According to the trust framework aiming at the autonomous transmissibility, a data transaction mode framework is constructed by applying a block chain technology, chaining and evidence storage is carried out on the dimensionalities such as the flow direction, the channel and the quantity of data, traceability of each transaction is realized, accurate settlement among transaction main bodies is realized, and objective evidence storage and traceability of the data from production to use of full life cycle information are realized.
It is noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus.
Although embodiments of the present invention have been shown and described, it will be appreciated by those skilled in the art that changes, modifications, substitutions and alterations can be made in these embodiments without departing from the principles and spirit of the invention, the scope of which is defined in the appended claims and their equivalents.

Claims (6)

1. A trust architecture for autonomy, comprising the steps of:
the method comprises the following steps: the problem is found, which is divided into four parts including:
1. data tampering problem: the data is difficult to be associated with the data, and data tampering and the like are easy to occur.
2. Data distortion problem: historical data on the nodes is easy to be tampered, and data distortion is caused.
3. Problem difficult to locate: the data circulation process lacks clear records, and is not beneficial to problem positioning.
4. Problem of poor data expansion capability: the database structure is greatly influenced by human factors, and the system expansion capability is poor.
Step two: and building a trust architecture based on the trusted block chain.
Step three: the main technical embodiment is divided into three parts, including:
1. enterprise-level distributed platform: the trusted block chain is an enterprise-level distributed platform taking a block chain technology as a core, so that the security and reliability of enterprise core data and key services can be ensured, and the integrity of data center infrastructure is ensured.
2. And (4) sorting accounts: the supported ledger provides a high throughput capability of storing any unstructured data, making the composition and construction of software more reliable and traceable.
3. Diversified interfaces: the diversified interface can support the application requirement of higher level and improve the applicability of the trust framework.
Step four: the trust architecture works normally.
2. A trust architecture for autonomy according to claim 1, wherein: the trusted block chain is an enterprise-level distributed platform taking a block chain technology as a core, can ensure the security and reliability of enterprise core data and key services and ensure the integrity of data center infrastructure, so that the block chain technology is more like a recording system compared with a database. The shared, transparent and real recording system of the block chain technology also enables future business cooperation to become healthy, efficient and convenient, and meanwhile, the block chain technology can be more widely and deeply applied in various fields.
3. A trust architecture for autonomy according to claim 1, wherein: the supported ledger provides high throughput capacity for storing any unstructured data, so that the software is more reliable and trackable in composition and construction, plays an important role in dealing with the aspects that the database structure is greatly influenced by human factors and the system expansion capacity is poor, and ensures that the architecture has better vitality during construction.
4. A trust architecture for autonomy according to claim 1, wherein: the compatibility interface and the module plug-in component can form a trusted architecture, so that the diversified interface can support higher-level application requirements, the trusted architecture can meet the matching requirements of more applications when the applications are matched, the compatibility degree is improved, the huge system of the trusted architecture is further ensured, and the architecture can meet different requirements.
5. A trust architecture for autonomy according to claim 1, wherein: the enterprise-level distributed platform corresponds to data tampering and data distortion one to one, the ledger is difficult to locate and corresponds to a problem one to one, and the diversified interfaces correspond to poor data expansion capability one to one.
6. A trust architecture for autonomy according to claim 1, wherein: a data transaction mode framework is constructed by using a block chain technology, chaining and evidence storage are carried out on the dimensionalities such as the flow direction, the channel and the quantity of data, traceability of each transaction is achieved, accurate settlement among transaction main bodies is achieved, and objective evidence storage and traceability of the data from production to use of full life cycle information are achieved.
CN202011196328.7A 2020-10-30 2020-10-30 Trust architecture aiming at autonomous propagation Pending CN114024958A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011196328.7A CN114024958A (en) 2020-10-30 2020-10-30 Trust architecture aiming at autonomous propagation

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011196328.7A CN114024958A (en) 2020-10-30 2020-10-30 Trust architecture aiming at autonomous propagation

Publications (1)

Publication Number Publication Date
CN114024958A true CN114024958A (en) 2022-02-08

Family

ID=80054153

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011196328.7A Pending CN114024958A (en) 2020-10-30 2020-10-30 Trust architecture aiming at autonomous propagation

Country Status (1)

Country Link
CN (1) CN114024958A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180040007A1 (en) * 2016-08-08 2018-02-08 The Dun & Bradstreet Corporation Trusted platform and integrated bop applications for networking bop components
CN109034833A (en) * 2018-06-16 2018-12-18 复旦大学 A kind of product back-tracing information management system and method based on block chain
CN111149332A (en) * 2017-04-28 2020-05-12 数据翼股份有限公司 System and method for implementing centralized privacy control in decentralized systems
CN111163141A (en) * 2019-12-20 2020-05-15 江苏荣泽信息科技股份有限公司 Enterprise-level block chain foundation platform
CN111813751A (en) * 2020-06-29 2020-10-23 平安科技(深圳)有限公司 Application system log data processing method, application system, device and medium

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180040007A1 (en) * 2016-08-08 2018-02-08 The Dun & Bradstreet Corporation Trusted platform and integrated bop applications for networking bop components
CN111149332A (en) * 2017-04-28 2020-05-12 数据翼股份有限公司 System and method for implementing centralized privacy control in decentralized systems
CN109034833A (en) * 2018-06-16 2018-12-18 复旦大学 A kind of product back-tracing information management system and method based on block chain
CN111163141A (en) * 2019-12-20 2020-05-15 江苏荣泽信息科技股份有限公司 Enterprise-level block chain foundation platform
CN111813751A (en) * 2020-06-29 2020-10-23 平安科技(深圳)有限公司 Application system log data processing method, application system, device and medium

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
周霞: "《油气勘探数据可视化应用》", 31 March 2014, 成都:电子科技大学出版社, pages: 124 - 126 *
王焕然,常晓磊,魏凯著: "《区块链社会》", 30 September 2020, 北京:机械工业出版社, pages: 300 *

Similar Documents

Publication Publication Date Title
AU2022206741B2 (en) Electronic document platform
US10135609B2 (en) Managing a database management system using a blockchain database
CN110121727B (en) Method and system for providing authenticated, auditable and immutable input for intelligent contracts
AU2018202830A1 (en) Digital Asset Platform
CN102355461B (en) XBRL (Extensible Business Reporting Language) credible data storage method and credible data storage system
CN112200690A (en) Ship quality traceability system based on block chain
EA007089B1 (en) System and method for the transmission, storage and retrieval of authenticated documents
CN112435128B (en) Supply chain tracing system based on multi-level block chain technology
CN111221914A (en) Data exchange sharing tracing method based on block chain
CN111339550A (en) Comment information credibility method based on block chain technology
CN112052033A (en) Power distribution automation master station version management method and system based on process and block chain
Cui et al. Improving vaccine safety using blockchain
CN113612766A (en) Data management device, method, computer equipment and storage medium
CN113159936A (en) Block chain-based personal credit investigation method and device
CN110555682B (en) Multi-channel implementation method based on alliance chain
CN114024958A (en) Trust architecture aiming at autonomous propagation
CN116934357A (en) Industrial product tracing method based on block chain and distributed technology
CN112084162A (en) Traceability authority management system based on block chain and IPFS
CN109344658B (en) Design method and device for audit block chain in energy Internet
CN113642975A (en) Hydrogen energy supervision method and system based on block chain
CN114463019A (en) Product tracing method and system based on block chain
Wang Block Chain+ Accounting: Applications, Challenges and Countermeasures Research
CN116668451B (en) Data storage method, equipment and medium for securities business
CN117094720A (en) Shared billing system
Cagigas Castro et al. Blockchain in government: toward an evaluation framework

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination