CN114520733A - Method and device for data transmission and trusted authentication processing, and electronic equipment - Google Patents

Method and device for data transmission and trusted authentication processing, and electronic equipment Download PDF

Info

Publication number
CN114520733A
CN114520733A CN202111643646.8A CN202111643646A CN114520733A CN 114520733 A CN114520733 A CN 114520733A CN 202111643646 A CN202111643646 A CN 202111643646A CN 114520733 A CN114520733 A CN 114520733A
Authority
CN
China
Prior art keywords
edge node
nth
data
adding mechanism
data transmission
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202111643646.8A
Other languages
Chinese (zh)
Other versions
CN114520733B (en
Inventor
于楠
赵智慧
朱红松
王进法
孙利民
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Institute of Information Engineering of CAS
Original Assignee
Institute of Information Engineering of CAS
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Institute of Information Engineering of CAS filed Critical Institute of Information Engineering of CAS
Priority to CN202111643646.8A priority Critical patent/CN114520733B/en
Publication of CN114520733A publication Critical patent/CN114520733A/en
Application granted granted Critical
Publication of CN114520733B publication Critical patent/CN114520733B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/46Secure multiparty computation, e.g. millionaire problem
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y04INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
    • Y04SSYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
    • Y04S40/00Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
    • Y04S40/20Information technology specific aspects, e.g. CAD, simulation, modelling, system security

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer And Data Communications (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses a method, a device and electronic equipment for data transmission and trusted authentication processing, wherein the method comprises the following steps: acquiring an Nth characteristic element adding mechanism; adding feature elements to the data processed by the (N-1) th edge node according to an Nth feature element adding mechanism to obtain feature element data; sending the feature element data to the Nth edge node so that the (N + 1) th edge node judges whether the data processed by the Nth edge node conforms to an Nth feature element adding mechanism or not; if the verification result is consistent with the verification result, the Nth edge node passes the trusted verification, otherwise, the trusted verification is finished. The invention puts the credible authentication task down to each edge node and makes mutual trust between different edge nodes, thereby preventing each edge node from destroying the credible authentication task through collusion, ensuring the credible authentication from the terminal to the edge node and then to the cloud server, and supporting the credible authentication in data processing and data transmission.

Description

Method and device for data transmission and trusted authentication processing, and electronic equipment
Technical Field
The invention relates to the technical field of communication, in particular to a method and a device for data transmission and trusted authentication processing and electronic equipment.
Background
At present, the application scenes of edge computing such as Internet of things, industrial Internet, vehicle-road cooperation, video monitoring and the like are continuously rich. With the rise of edge computing, applications have entered the edge cloud collaborative era. In the data transmission and processing process under the cooperation of the end edge clouds, the edge is responsible for bearing a part of cloud tasks, and after the computation is completed, the result is uploaded to the cloud so that the cloud can sense the state of the terminal and generate an optimal control strategy. For example, in a security monitoring scene, terminal devices such as an intelligent camera and an intelligent sensor acquire environmental data, the data is uploaded to edge nodes such as an edge gateway and an edge base station to process sensing environmental states and exception early warning, the cloud realizes global sensing of the whole application system environment based on the analysis and reporting results of edges, and senses occurrence of security events in time and arranges other resource handling early warning events. The authenticity of the edge forwarding or processing results is therefore very important to both the terminal and the cloud.
However, the edge node may not be absolutely trusted for the following reasons:
1. since an edge is made up of multiple edge nodes that are cooperatively serviced in a distributed manner, an unreliable edge node may propagate false (or intermediate) results to other adjacent edge nodes.
2. The edge has the characteristics of equipment isomerism, difficult management, wide distribution and the like. The edge may invoke a third party software or hardware component in the supply chain that has been compromised by the attacker and is therefore vulnerable to intrusion.
3. Due to high construction and management costs and difficulty in constructing private edge computing infrastructure, current applications mainly obtain services through a third party edge node.
The existing credible authentication does not solve the problem that if data is in a transmission link formed by multiple nodes and passes through a data processing link, how to ensure that the result of the data reaching the cloud is credible after the data is forwarded or processed by multiple untrusted edge nodes from a terminal is guaranteed.
In summary, there is a need for a method for data transmission and handling trusted authentication, which is used to solve the above-mentioned problems in the prior art.
Disclosure of Invention
Because the existing method has the problems, the invention provides a method, a device and an electronic device for data transmission and trusted authentication processing.
In a first aspect, the present invention provides a method for data transmission and processing trusted authentication, including:
acquiring an Nth characteristic element adding mechanism; the Nth feature element adding mechanism is determined by the (N-1) th edge node and the cloud server; wherein N is an integer not less than 2;
adding feature elements to the data processed by the (N-1) th edge node according to the Nth feature element adding mechanism to obtain feature element data;
sending the feature element data to an Nth edge node to enable the (N + 1) th edge node to judge whether the data processed by the Nth edge node conforms to the Nth feature element adding mechanism;
if the verification result is consistent with the verification result, the Nth edge node passes the trusted verification, otherwise, the trusted verification is finished.
Further, before the obtaining the nth feature element addition mechanism, the method further includes:
acquiring a first characteristic element adding mechanism; the first feature element adding mechanism is determined by a terminal and the cloud server;
adding characteristic elements to the original data collected by the terminal according to the first characteristic element adding mechanism;
sending, by the cloud server, the first feature element addition mechanism to a 2 nd edge node;
judging whether the data processed by the 1 st edge node accords with the first characteristic element adding mechanism or not through the 2 nd edge node;
if the result is consistent with the first edge node, the 1 st edge node passes the credible authentication, otherwise, the credible authentication is finished.
Further, before the feature element is added to the data processed by the N-1 th edge node according to the nth feature element adding mechanism to obtain feature element data, the method further includes:
acquiring an edge node newly added in a data transmission link;
sending an intelligent contract to the edge node newly added with the data transmission link through the cloud server;
and after the edge node which is newly added into the data transmission link signs the intelligent contract, allowing the edge node which is newly added into the data transmission link to be added.
Further, before the N +1 th edge node determines whether the data processed by the nth edge node conforms to the nth feature element addition mechanism, the method further includes:
sending the Nth feature element adding mechanism to an (N + 1) th edge node through the cloud server;
judging whether reporting information from the Nth edge node is received or not through the cloud server;
and if so, modifying the parameters of the intelligent contract corresponding to the Nth edge node according to the parameters of the intelligent contract corresponding to the (N + 1) th edge node.
Further, after the trusted authentication is finished, the method further includes:
and modifying the parameters of the intelligent contract corresponding to the (N + 1) th edge node according to the parameters of the intelligent contract corresponding to the Nth edge node through the cloud server.
In a second aspect, the present invention provides an apparatus for data transmission and processing trusted authentication, including:
the acquisition module is used for acquiring an Nth characteristic element adding mechanism; the Nth feature element adding mechanism is determined by the (N-1) th edge node and the cloud server; wherein N is an integer not less than 2;
the processing module is used for adding the characteristic elements to the data processed by the (N-1) th edge node according to the Nth characteristic element adding mechanism to obtain characteristic element data; sending the feature element data to an Nth edge node to enable the (N + 1) th edge node to judge whether the data processed by the Nth edge node conforms to the Nth feature element adding mechanism; if the verification result is consistent with the verification result, the Nth edge node passes the trusted verification, otherwise, the trusted verification is finished.
Further, the obtaining module is further configured to:
before the N characteristic element adding mechanism is obtained, obtaining a first characteristic element adding mechanism; the first feature element adding mechanism is determined by a terminal and the cloud server;
adding characteristic elements to the original data collected by the terminal according to the first characteristic element adding mechanism;
sending, by the cloud server, the first feature element addition mechanism to a 2 nd edge node;
judging whether the data processed by the 1 st edge node accords with the first characteristic element adding mechanism or not through the 2 nd edge node;
if the result is consistent with the first edge node, the 1 st edge node passes the credible authentication, otherwise, the credible authentication is finished.
Further, the processing module is further configured to:
before adding the characteristic elements to the data processed by the (N-1) th edge node according to the Nth characteristic element adding mechanism to obtain characteristic element data, acquiring edge nodes newly added to the data transmission link;
sending an intelligent contract to the edge node newly added with the data transmission link through the cloud server;
and after the edge node which is newly added into the data transmission link signs the intelligent contract, allowing the edge node which is newly added into the data transmission link to be added.
Further, the processing module is further configured to:
before the N +1 th edge node judges whether the data processed by the nth edge node conforms to the nth feature element adding mechanism, sending the nth feature element adding mechanism to the N +1 th edge node through the cloud server;
judging whether reporting information from the Nth edge node is received or not through the cloud server;
and if so, modifying the parameters of the intelligent contract corresponding to the Nth edge node according to the parameters of the intelligent contract corresponding to the (N + 1) th edge node.
Further, the processing module is further configured to:
after the trusted authentication is finished, modifying the parameters of the intelligent contract corresponding to the (N + 1) th edge node through the cloud server according to the parameters of the intelligent contract corresponding to the Nth edge node.
In a third aspect, the present invention also provides an electronic device, which includes a memory, a processor, and a computer program stored in the memory and executable on the processor, and when the processor executes the computer program, the method for transmitting data and processing trusted certificate according to the first aspect is implemented.
In a fourth aspect, the present invention also provides a non-transitory computer-readable storage medium having stored thereon a computer program which, when executed by a processor, implements the method of data transmission and handling of trusted authentication as described in the first aspect.
According to the technical scheme, the method, the device and the electronic equipment for data transmission and processing of the trusted authentication, provided by the invention, have the advantages that the trusted authentication task is put down to each edge node and the mutual trust among different edge nodes is manufactured, so that the phenomenon that the trusted authentication task is damaged by the edge nodes through collusion is prevented, the trusted authentication from the terminal to the edge nodes and then to the cloud server is ensured, and the trusted authentication in the data processing and data transmission can be supported.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the embodiments or the prior art descriptions will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is also possible for those skilled in the art to obtain other drawings based on the drawings without creative efforts.
FIG. 1 is a system framework for data transmission and handling of trusted certificates provided by the present invention;
FIG. 2 is a diagram of a system for data transmission and handling trust authentication provided by the present invention;
FIG. 3 is a schematic flow chart of a method for data transmission and processing trusted authentication according to the present invention;
FIG. 4 is a schematic diagram of a device for data transmission and processing of trusted authentication according to the present invention;
fig. 5 is a schematic structural diagram of an electronic device provided in the present invention.
Detailed Description
The following further describes embodiments of the present invention with reference to the accompanying drawings. The following examples are only for illustrating the technical solutions of the present invention more clearly, and the protection scope of the present invention is not limited thereby.
Fig. 1 is a schematic diagram of a system for data transmission and processing trusted authentication according to an embodiment of the present invention, where the system includes: terminal 100, edge node 200, cloud server 300.
The terminal 100 is configured to add a feature element to the first data according to a first feature element addition mechanism to obtain second data;
the cloud server 300 is configured to send the first feature element addition mechanism to the 2 nd edge node 200;
the 2 nd edge node 200 is configured to determine whether the second data processed by the 1 st edge node conforms to the first feature element addition mechanism; if yes, the 1 st edge node passes the credible authentication;
the (N-1) th edge node 200 is used for adding feature elements to the data processed by the (N-1) th edge node according to an N feature element adding mechanism; performing credible authentication on the Nth edge node; and if the trusted authentication is passed, continuing to perform trusted authentication on the (N + 1) th edge node, otherwise, ending the trusted authentication.
It should be noted that fig. 1 is only an example of a system architecture according to the embodiment of the present invention, and the present invention is not limited to this specifically.
Further, as shown in fig. 2, a schematic diagram of a system for data transmission and processing trusted authentication according to an embodiment of the present invention is provided.
As can be seen from the figure, when a terminal uploads data to a cloud server through an edge node, feature elements negotiated with the cloud server are added to original data according to a feature element addition mechanism to form brand new original data. The modified data are uploaded to the edge nodes for forwarding or model processing, and the edge nodes upload output data to the cloud server. And the cloud server judges whether the output data of the edge node is in accordance with the negotiated characteristic elements and the characteristic element adding mechanism. If the data transmission or processing process is in accordance with the data modification request, the data transmission or processing process from the terminal to the edge node and then to the cloud server is safe and credible, otherwise, the data modification request indicates that the non-credible edge node exists on the communication link and the data is modified.
Based on the above-mentioned system for data transmission and processing trusted authentication, fig. 3 exemplarily shows a flow of a method for data transmission and processing trusted authentication provided by an embodiment of the present invention. The process may be performed by the data transfer and trusted certificate processing system described above.
As shown in fig. 3, the process specifically includes:
step 301, an nth feature element adding mechanism is obtained.
In the embodiment of the invention, before the Nth characteristic element adding mechanism is obtained, a first characteristic element adding mechanism is obtained;
it should be noted that the first feature element addition mechanism is determined by the terminal and the cloud server.
Adding characteristic elements into the original data acquired by the terminal according to a first characteristic element adding mechanism;
sending the first feature element adding mechanism to the 2 nd edge node through the cloud server;
judging whether the data processed by the 1 st edge node accords with a first feature element adding mechanism or not through the 2 nd edge node;
if the result is consistent, the 1 st edge node passes the credible authentication, otherwise, the credible authentication is finished.
In the embodiment of the invention, if the data transmission processing procedures from the terminal to the 1 st edge node and then to the 2 nd edge node are consistent, the data transmission processing procedures are safe and credible; otherwise, it indicates that there is an untrusted node on the communication link, i.e. the 1 st edge node is untrusted, and the data has been modified by the 1 st edge node.
And 302, adding feature elements to the data processed by the (N-1) th edge node according to the Nth feature element adding mechanism to obtain feature element data.
It should be noted that the nth feature element addition mechanism is determined by the nth-1 edge node and the cloud server. Wherein N is an integer not less than 2.
In the embodiment of the invention, when the terminal is registered in the edge computing system, a group of feature elements and a feature element adding mechanism are determined by the terminal and the cloud server.
Specifically, the terminal and the cloud server select data consistent with the application scene, so that the influence of the characteristic elements on the original data is reduced, and the influence on the normal service of the edge computing system based on the data is avoided.
For example, the data transmitted by the terminal to the cloud server is a picture, the content of the picture is that different types of fruits are placed on a dining table, and the fruits are apples, bananas and grapes. At the moment, the terminal and the cloud server jointly agree that the characteristic elements are apples, bananas and grapes.
Further, the feature element adding mechanism means that the position of adding the feature element meets a certain constraint condition.
For example, the position where 3 feature elements are added satisfies a specific shape such as a triangle, or the position is selected at a preset position, or the like.
For example, after the characteristic elements are apple, banana and grape, which are agreed by the terminal and the cloud server together, the terminal adds the characteristic elements including apple, banana and grape on the original picture, and enables the three characteristic elements of apple, banana and grape to satisfy the position relationship of three vertexes of an equilateral triangle.
According to the scheme, the efficiency and convenience of the trusted authentication are improved through the feature element adding mechanism.
Step 303, sending the feature element data to the nth edge node, so that the (N + 1) th edge node determines whether the data processed by the nth edge node conforms to the nth feature element adding mechanism.
For example, the 2 nd edge node obtains data from the 1 st edge node to see if the first feature element addition mechanism is met.
And step 304, if the result is consistent, the Nth edge node passes the trusted authentication, otherwise, the trusted authentication is finished.
In the embodiment of the invention, the credible authentication of the Nth edge node is completed through the (N + 1) th edge node on a communication link. And a communication channel is not newly established between the terminal and the cloud server, and continuous connection does not need to be maintained.
It should be noted that the embodiment of the present invention is not only applicable to trusted authentication of data transmission from the terminal to the edge node and then to the cloud server, but also applicable to cooperative authentication of correctness of data processing results among the terminal, the edge node, and the cloud server.
In the embodiment of the invention, when the terminal is added into the edge computing system for the first time, the terminal negotiates a group of characteristic elements and a characteristic element adding mechanism with a cloud weapon convention. When a terminal uploads data to a cloud server through an edge node, feature elements which are negotiated with the cloud server are added to original data according to a feature element adding mechanism to form brand-new original data.
Further, the modified data are uploaded to an edge node for forwarding or model processing, and the edge node uploads output data to a cloud server. And the cloud server judges whether the output data of the edge node is in accordance with the negotiated characteristic elements and the characteristic element adding mechanism. If the data transmission or processing procedure is in accordance with the data transmission or processing procedure, the data transmission or processing procedure from the terminal to the edge node and then to the cloud server is safe and credible, otherwise, the data transmission or processing procedure is in accordance with the data modification and the data transmission or processing procedure is in accordance with the data modification.
In the embodiment of the invention, when the edge computing system only has 1 edge node, the cloud server judges whether the second data processed by the 1 st edge node conforms to the first characteristic element adding mechanism. When only one edge node is available, the terminal and the cloud server complete the trusted authentication, and the edge does not need to be modified.
Further, when the edge computing system has a plurality of edge nodes, the trusted authentication task is released to the plurality of edge nodes through the cloud server.
In the embodiment of the invention, the communication among different edge nodes reveals related parameters of the credible authentication, which leads to the failure of the credible authentication result, so the embodiment of the invention prevents the communication among different edge nodes based on the game theory.
Specifically, in the embodiment of the present invention, before step 301, an edge node newly added to a data transmission link is obtained;
sending an intelligent contract to the edge node newly added with the data transmission link through the cloud server;
and after the edge node newly added into the data transmission link signs an intelligent contract, allowing the edge node newly added into the data transmission link to be added.
In the embodiment of the invention, the cloud server requires the edge nodes participating in the edge computing system to sign an intelligent contract with the cloud server when the edge nodes are added into the system.
Smart contracts aim to penalise an edge node when it is found that the node is dishonest.
For example, the edge node signs an intelligent contract with the cloud server to pay a part of the deposit as a guarantee deposit for trusted data transmission or processing. When dishonest behavior is found, the deposit will be withheld.
It should be noted that the dishonest behavior includes collusion between edge nodes and non-passing of trusted authentication of edge nodes.
Further, after the sending, by the cloud server, the first feature element addition mechanism to the 2 nd edge node, the embodiment of the present invention further includes:
judging whether the report information from the 1 st edge node is received or not through the cloud server;
in one possible implementation, the reporting information includes signature information of the 2 nd edge node.
Specifically, the 1 st edge node signs a contract with the 2 nd edge node through an intelligent contract of the block chain, so that the purpose of communicating with the 2 nd edge node is achieved.
And if so, modifying the parameters of the intelligent contract corresponding to the 1 st edge node according to the parameters of the intelligent contract corresponding to the 2 nd edge node.
Specifically, if the 2 nd edge node agrees to sign a contract with the 1 st edge node, the 1 st edge node reports the dishonest behavior of the 2 nd edge node to the cloud server.
Further, before the (N + 1) th edge node judges whether the data processed by the nth edge node conforms to the nth feature element adding mechanism, the nth feature element adding mechanism is sent to the (N + 1) th edge node through the cloud server;
judging whether the report information from the Nth edge node is received or not through the cloud server;
and if so, modifying the parameters of the intelligent contract corresponding to the Nth edge node according to the parameters of the intelligent contract corresponding to the (N + 1) th edge node.
For example, the cloud server aims to prevent the edge nodes from being communicated with each other, so that the reliability of the trusted authentication is damaged. After the cloud server reports the dishonest behavior of the (N + 1) th edge node at the nth edge node, even if the nth edge node has a dishonest motivation before, the cloud server does not punish the nth edge node as long as other unreliable edge nodes in the edge computing system are caught, and rewards the deposit of the (N + 1) th edge node to the nth edge node.
In the embodiment of the invention, the cloud server causes the situation of mutual distrust among different edge nodes, so that the reasonable profit of the collusion of all the edge nodes is less than the honest profit in the game, and therefore the collusion is not selected to destroy the credible authentication.
Further, after the trusted authentication is finished, the embodiment of the present invention further includes:
and modifying the parameters of the intelligent contract corresponding to the (N + 1) th edge node according to the parameters of the intelligent contract corresponding to the Nth edge node through the cloud server.
For example, after the N +1 th edge node authenticates that the nth edge node is not trusted, the cloud server awards the deposit of the nth edge node to the N +1 th edge node.
The embodiment of the invention is suitable for the data uploading stage from the terminal to the cloud server and also suitable for the data downloading stage from the cloud server to the terminal. Meanwhile, the embodiment of the invention is suitable for any credible authentication task of the communication link with the intermediate node.
According to the scheme, the trusted authentication task is put down to each edge node and mutual trust among different edge nodes is manufactured, so that the phenomenon that each edge node destroys the trusted authentication task through collusion is prevented, the trusted authentication from the terminal to the edge nodes and then to the cloud server is guaranteed, and the trusted authentication in data processing and data transmission can be supported.
Based on the same inventive concept, fig. 4 exemplarily illustrates an apparatus for data transmission and processing trusted certificate provided by the embodiment of the present invention, which may be a flow of a method for data transmission and processing trusted certificate.
The apparatus, comprising:
an obtaining module 401, configured to obtain an nth feature element adding mechanism; the Nth feature element adding mechanism is determined by the (N-1) th edge node and the cloud server; wherein N is an integer not less than 2;
a processing module 402, configured to add a feature element to the data processed by the N-1 th edge node according to the nth feature element addition mechanism, to obtain feature element data; sending the feature element data to an Nth edge node to enable the (N + 1) th edge node to judge whether the data processed by the Nth edge node conforms to the Nth feature element adding mechanism; if the verification result is consistent with the verification result, the Nth edge node passes the trusted verification, otherwise, the trusted verification is finished.
Further, the obtaining module 401 is further configured to:
before the Nth characteristic element adding mechanism is obtained, obtaining a first characteristic element adding mechanism; the first feature element adding mechanism is determined by a terminal and the cloud server;
adding characteristic elements to the original data collected by the terminal according to the first characteristic element adding mechanism;
sending, by the cloud server, the first feature element addition mechanism to a 2 nd edge node;
judging whether the data processed by the 1 st edge node accords with the first characteristic element adding mechanism or not through the 2 nd edge node;
if the result is consistent with the first edge node, the 1 st edge node passes the credible authentication, otherwise, the credible authentication is finished.
Further, the processing module 402 is further configured to:
before adding the characteristic elements to the data processed by the (N-1) th edge node according to the Nth characteristic element adding mechanism to obtain characteristic element data, acquiring edge nodes newly added to the data transmission link;
sending an intelligent contract to the edge node newly added with the data transmission link through the cloud server;
and after the edge node which is newly added into the data transmission link signs the intelligent contract, allowing the edge node which is newly added into the data transmission link to be added.
Further, the processing module 402 is further configured to:
before the (N + 1) th edge node judges whether the data processed by the (N) th edge node conforms to the (N + 1) th feature element addition mechanism, sending the (N + 1) th feature element addition mechanism to the (N + 1) th edge node through the cloud server;
judging whether reporting information from the Nth edge node is received or not through the cloud server;
and if so, modifying the parameters of the intelligent contract corresponding to the Nth edge node according to the parameters of the intelligent contract corresponding to the (N + 1) th edge node.
Further, the processing module 402 is further configured to:
after the trusted authentication is finished, modifying the parameters of the intelligent contract corresponding to the (N + 1) th edge node through the cloud server according to the parameters of the intelligent contract corresponding to the Nth edge node.
Based on the same inventive concept, an embodiment of the present invention provides an electronic device, which specifically includes the following contents, with reference to fig. 5: a processor 501, a memory 502, a communication interface 503, and a communication bus 504;
the processor 501, the memory 502 and the communication interface 503 complete mutual communication through the communication bus 504; the communication interface 503 is used for implementing information transmission between the devices;
the processor 501 is configured to call a computer program in the memory 502, and when the processor executes the computer program, the processor implements all the steps of the above method for transmitting data and processing trusted certificate, for example, when the processor executes the computer program, the processor implements the following steps: acquiring an Nth characteristic element adding mechanism; the Nth feature element adding mechanism is determined by the (N-1) th edge node and the cloud server; wherein N is an integer not less than 2; adding feature elements to the data processed by the (N-1) th edge node according to the Nth feature element adding mechanism to obtain feature element data; sending the feature element data to an Nth edge node to enable the (N + 1) th edge node to judge whether the data processed by the Nth edge node conforms to the Nth feature element adding mechanism; if the verification result is consistent with the verification result, the Nth edge node passes the trusted verification, otherwise, the trusted verification is finished.
Based on the same inventive concept, a further embodiment of the present invention provides a non-transitory computer-readable storage medium, having stored thereon a computer program, which when executed by a processor implements all the steps of the above-mentioned method for data transmission and handling of trusted authentication, for example, the processor implements the following steps when executing the computer program: acquiring an Nth characteristic element adding mechanism; the Nth feature element adding mechanism is determined by the (N-1) th edge node and the cloud server; wherein N is an integer not less than 2; adding feature elements to the data processed by the (N-1) th edge node according to the Nth feature element adding mechanism to obtain feature element data; sending the feature element data to an Nth edge node so that the (N + 1) th edge node judges whether the data processed by the Nth edge node conforms to the Nth feature element adding mechanism or not; if the verification result is consistent with the verification result, the Nth edge node passes the trusted verification, otherwise, the trusted verification is finished.
In addition, the logic instructions in the memory may be implemented in the form of software functional units and may be stored in a computer readable storage medium when sold or used as a stand-alone product. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes several instructions for causing a computer device (which may be a personal computer, a device for data transmission and processing of trust authentication, or a network device, etc.) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
The above-described embodiments of the apparatus are merely illustrative, and the units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the embodiment of the present invention. One of ordinary skill in the art can understand and implement it without inventive effort.
Through the above description of the embodiments, those skilled in the art will clearly understand that each embodiment can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware. Based on such understanding, the technical solutions in essence or part contributing to the prior art may be embodied in the form of a software product, which may be stored in a computer readable storage medium, such as ROM/RAM, magnetic disk, optical disk, etc., and includes several instructions for enabling a computer device (which may be a personal computer, an apparatus for data transmission and processing of a trusted certificate, or a network device, etc.) to execute the method for data transmission and processing of a trusted certificate according to various embodiments or some parts of embodiments.
In addition, in the present invention, terms such as "first" and "second" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defined as "first" or "second" may explicitly or implicitly include at least one of the feature. In the description of the present invention, "a plurality" means at least two, e.g., two, three, etc., unless specifically limited otherwise.
Moreover, in the present invention, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
Furthermore, in the description herein, reference to the description of the term "one embodiment," "some embodiments," "an example," "a specific example," or "some examples," etc., means that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the invention. In this specification, the schematic representations of the terms used above are not necessarily intended to refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples. Furthermore, various embodiments or examples and features of different embodiments or examples described in this specification can be combined and combined by one skilled in the art without contradiction.
Finally, it should be noted that: the above examples are only intended to illustrate the technical solution of the present invention, but not to limit it; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions of the embodiments of the present invention.

Claims (10)

1. A method for data transmission and handling trusted authentication, comprising:
acquiring an Nth characteristic element adding mechanism; the Nth feature element adding mechanism is determined by the (N-1) th edge node and the cloud server; wherein N is an integer not less than 2;
adding feature elements to the data processed by the (N-1) th edge node according to the Nth feature element adding mechanism to obtain feature element data;
sending the feature element data to an Nth edge node to enable the (N + 1) th edge node to judge whether the data processed by the Nth edge node conforms to the Nth feature element adding mechanism;
if the verification result is consistent with the verification result, the Nth edge node passes the trusted verification, otherwise, the trusted verification is finished.
2. The data transmission and processing method for trusted authentication as claimed in claim 1, wherein before said obtaining the nth feature element adding mechanism, further comprising:
acquiring a first characteristic element adding mechanism; the first feature element adding mechanism is determined by a terminal and the cloud server;
adding characteristic elements to the original data collected by the terminal according to the first characteristic element adding mechanism;
sending, by the cloud server, the first feature element addition mechanism to a 2 nd edge node;
judging whether the data processed by the 1 st edge node accords with the first characteristic element adding mechanism or not through the 2 nd edge node;
if the result is consistent with the first edge node, the 1 st edge node passes the credible authentication, otherwise, the credible authentication is finished.
3. The method for data transmission and processing trusted authentication according to claim 1, wherein before adding a feature element to the data processed by the N-1 th edge node according to the nth feature element addition mechanism to obtain feature element data, the method further includes:
acquiring an edge node newly added in a data transmission link;
sending an intelligent contract to the edge node newly added with the data transmission link through the cloud server;
and after the edge node which is newly added into the data transmission link signs the intelligent contract, allowing the edge node which is newly added into the data transmission link to be added.
4. The method of claim 3, wherein before the N +1 th edge node determines whether the data processed by the nth edge node conforms to the nth feature element adding mechanism, the method further comprises:
sending the Nth feature element adding mechanism to an (N + 1) th edge node through the cloud server;
judging whether reporting information from the Nth edge node is received or not through the cloud server;
and if so, modifying the parameters of the intelligent contract corresponding to the Nth edge node according to the parameters of the intelligent contract corresponding to the (N + 1) th edge node.
5. The method for data transmission and processing trusted authentication as claimed in claim 3, further comprising, after said trusted authentication is over:
and modifying the parameters of the intelligent contract corresponding to the (N + 1) th edge node according to the parameters of the intelligent contract corresponding to the Nth edge node through the cloud server.
6. An apparatus for data transmission and handling trusted authentication, comprising:
the acquisition module is used for acquiring an Nth characteristic element adding mechanism; the Nth feature element adding mechanism is determined by the (N-1) th edge node and the cloud server; wherein N is an integer not less than 2;
the processing module is used for adding the characteristic elements to the data processed by the (N-1) th edge node according to the Nth characteristic element adding mechanism to obtain characteristic element data; sending the feature element data to an Nth edge node to enable the (N + 1) th edge node to judge whether the data processed by the Nth edge node conforms to the Nth feature element adding mechanism; if the verification result is consistent with the verification result, the Nth edge node passes the trusted verification, otherwise, the trusted verification is finished.
7. The apparatus for data transmission and processing trusted authentication as claimed in claim 6, wherein said obtaining module is further configured to:
before the N characteristic element adding mechanism is obtained, obtaining a first characteristic element adding mechanism; the first feature element adding mechanism is determined by a terminal and the cloud server;
adding characteristic elements to the original data collected by the terminal according to the first characteristic element adding mechanism;
sending, by the cloud server, the first feature element addition mechanism to a 2 nd edge node;
judging whether the data processed by the 1 st edge node accords with the first characteristic element adding mechanism or not through the 2 nd edge node;
if the result is consistent with the first edge node, the 1 st edge node passes the credible authentication, otherwise, the credible authentication is finished.
8. The apparatus for data transmission and processing trusted authentication as claimed in claim 6, wherein said processing module is further configured to:
before adding the characteristic elements to the data processed by the (N-1) th edge node according to the Nth characteristic element adding mechanism to obtain characteristic element data, acquiring edge nodes newly added to the data transmission link;
sending an intelligent contract to the edge node newly added with the data transmission link through the cloud server;
and after the edge node which is newly added into the data transmission link signs the intelligent contract, allowing the edge node which is newly added into the data transmission link to be added.
9. An electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the steps of the method according to any of claims 1 to 5 are implemented when the processor executes the program.
10. A non-transitory computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the method according to any one of claims 1 to 5.
CN202111643646.8A 2021-12-29 2021-12-29 Method and device for transmitting data and processing trusted authentication and electronic equipment Active CN114520733B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111643646.8A CN114520733B (en) 2021-12-29 2021-12-29 Method and device for transmitting data and processing trusted authentication and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111643646.8A CN114520733B (en) 2021-12-29 2021-12-29 Method and device for transmitting data and processing trusted authentication and electronic equipment

Publications (2)

Publication Number Publication Date
CN114520733A true CN114520733A (en) 2022-05-20
CN114520733B CN114520733B (en) 2023-05-26

Family

ID=81596149

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111643646.8A Active CN114520733B (en) 2021-12-29 2021-12-29 Method and device for transmitting data and processing trusted authentication and electronic equipment

Country Status (1)

Country Link
CN (1) CN114520733B (en)

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104065760A (en) * 2013-11-25 2014-09-24 中国科学院计算机网络信息中心 Method and system of CCN trusted addressing based on DNS and extension protocol thereof
US20170228371A1 (en) * 2016-02-05 2017-08-10 Manifold Technology, Inc. Blockchain-enhanced database
CN107278364A (en) * 2017-05-04 2017-10-20 深圳前海达闼云端智能科技有限公司 Node authentication method and entity authentication system
CN108805570A (en) * 2018-06-01 2018-11-13 腾讯科技(深圳)有限公司 Data processing method, device and storage medium
CN110493020A (en) * 2019-07-05 2019-11-22 深圳壹账通智能科技有限公司 Broadcast message transmission method, device and system based on block chain technology
US20200089791A1 (en) * 2018-09-19 2020-03-19 International Business Machines Corporation Distributed platform for computation and trusted validation
CN111241549A (en) * 2020-01-08 2020-06-05 广州中国科学院计算机网络信息中心 Credible analysis method under heterogeneous identification system
WO2020180365A1 (en) * 2019-12-05 2020-09-10 Futurewei Technologies, Inc. System and method of establishing a trusted relationship in a distributed system
CN113326516A (en) * 2021-04-22 2021-08-31 远光软件股份有限公司 Block chain consensus method, block chain system and computer equipment
US20210385065A1 (en) * 2020-05-26 2021-12-09 Tata Consultancy Services Limited Method and system for securing peer nodes in a blockchain network

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104065760A (en) * 2013-11-25 2014-09-24 中国科学院计算机网络信息中心 Method and system of CCN trusted addressing based on DNS and extension protocol thereof
US20170228371A1 (en) * 2016-02-05 2017-08-10 Manifold Technology, Inc. Blockchain-enhanced database
CN107278364A (en) * 2017-05-04 2017-10-20 深圳前海达闼云端智能科技有限公司 Node authentication method and entity authentication system
CN108805570A (en) * 2018-06-01 2018-11-13 腾讯科技(深圳)有限公司 Data processing method, device and storage medium
US20200089791A1 (en) * 2018-09-19 2020-03-19 International Business Machines Corporation Distributed platform for computation and trusted validation
CN110493020A (en) * 2019-07-05 2019-11-22 深圳壹账通智能科技有限公司 Broadcast message transmission method, device and system based on block chain technology
WO2020180365A1 (en) * 2019-12-05 2020-09-10 Futurewei Technologies, Inc. System and method of establishing a trusted relationship in a distributed system
CN111241549A (en) * 2020-01-08 2020-06-05 广州中国科学院计算机网络信息中心 Credible analysis method under heterogeneous identification system
US20210385065A1 (en) * 2020-05-26 2021-12-09 Tata Consultancy Services Limited Method and system for securing peer nodes in a blockchain network
CN113326516A (en) * 2021-04-22 2021-08-31 远光软件股份有限公司 Block chain consensus method, block chain system and computer equipment

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
周全兴等: "基于智能合约的三方博弈防共谋委托计算协议", 《计算机工程》 *
孙跃等: "基于可信计算和区块链的配电物联网内生安全研究", 《华电技术》 *
陈梦蓉等: "基于"奖励制度"的DPoS共识机制改进", 《计算机科学》 *

Also Published As

Publication number Publication date
CN114520733B (en) 2023-05-26

Similar Documents

Publication Publication Date Title
CN108416577B (en) Block chain service system
AU2016242813B2 (en) Networking flow logs for multi-tenant environments
KR102566892B1 (en) Blockchain consensus method, device and system
Siddiqui et al. A survey of trust management in the internet of vehicles
CN108306873A (en) A kind of intelligent contract data interactive system based on manufacture block chain
JP2017204304A (en) Maintaining limited user profile for social networking system users unable to establish user profile
CN112612856A (en) Data processing method and device based on block chain
Shao et al. Blockchain-based SDN security guaranteeing algorithm and analysis model
Ma et al. Blockchain-enabled privacy-preserving internet of vehicles: Decentralized and reputation-based network architecture
Liang et al. Research on IoT forensics system based on blockchain technology
Gai et al. Ratee-based trust management system for internet of vehicles
CN112269838B (en) Blockchain-based supervision method and device, electronic equipment and storage medium
Liu et al. Blockchain-empowered lifecycle management for AI-generated content products in edge networks
CN111832862B (en) Flow management method and system based on block chain
CN114520733A (en) Method and device for data transmission and trusted authentication processing, and electronic equipment
CN116436689A (en) Vulnerability processing method and device, storage medium and electronic equipment
US20190288977A1 (en) Systems and methods for providing data analytics for videos based on a tiered architecture
CN113259384B (en) Mechanism model call information processing method, server and system based on block chain
CN109299053A (en) Operating method, equipment and the computer storage medium of file
Zhao et al. Detection and incentive: A tampering detection mechanism for object detection in edge computing
CN113486409A (en) Electronic contract tamper-proof method and device, storage medium and electronic equipment
CN112465642A (en) Method and system for realizing block chain transaction based on state channel
Meng et al. Towards statistical trust computation for medical smartphone networks based on behavioral profiling
CN113949508B (en) Process data processing method and device based on random number consensus mechanism
CN110659476A (en) Method and apparatus for resetting password

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant