CN117640620A - Method and device for sharing data in gas hidden danger investigation scene - Google Patents

Method and device for sharing data in gas hidden danger investigation scene Download PDF

Info

Publication number
CN117640620A
CN117640620A CN202311306829.XA CN202311306829A CN117640620A CN 117640620 A CN117640620 A CN 117640620A CN 202311306829 A CN202311306829 A CN 202311306829A CN 117640620 A CN117640620 A CN 117640620A
Authority
CN
China
Prior art keywords
file
signature
descriptor
data
blockchain
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311306829.XA
Other languages
Chinese (zh)
Inventor
程韦豪
张大兵
李建峰
李持佳
徐秀梅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Gas Group Co Ltd
Original Assignee
Beijing Gas Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Gas Group Co Ltd filed Critical Beijing Gas Group Co Ltd
Priority to CN202311306829.XA priority Critical patent/CN117640620A/en
Publication of CN117640620A publication Critical patent/CN117640620A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/56Provisioning of proxy services
    • H04L67/565Conversion or adaptation of application format or content
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention provides a method and a device for sharing data in a gas hidden trouble shooting scene, wherein the method comprises the following steps: collecting hidden danger data; extracting a file descriptor based on hidden danger data; based on a first intelligent contract of a block chain, acquiring a corresponding first file according to a file descriptor, and calculating a first file signature through a hash algorithm; generating first file description information according to the first file signature and the file descriptor obtained through calculation; converting the first file description information into a character string in json format, and uploading the character string into a blockchain; acquiring a corresponding second file according to the file descriptor based on a second intelligent contract of the block chain, and calculating a second file signature through a hash algorithm; judging whether the first file signature is identical to the second file signature or not based on a second intelligent contract of the block chain; if so, the second intelligent contract of the blockchain returns the second file to the file demander. The invention has relatively small block and ensures transaction speed.

Description

Method and device for sharing data in gas hidden danger investigation scene
Technical Field
The invention relates to the technical field of data sharing, in particular to a method and a device for data sharing in a gas hidden trouble shooting scene.
Background
In the block chain data sharing scenario, the current general technical scheme in the video image data sharing process is described as follows: uploading small image and video data directly into the blocks of the blockchain; based on a compression algorithm, carrying out uplink certification according to a cutting and segmentation mechanism on large image and video data; the advantages are that: the image and video are uplink, shared and exist; disadvantages: large block and low transaction speed.
Disclosure of Invention
In view of the foregoing, the present invention is directed to a method and apparatus for data sharing in a gas hidden danger check scenario, which overcome or at least partially solve the foregoing problems.
The invention provides a method for sharing data in a gas hidden trouble shooting scene, which comprises the following steps:
collecting hidden danger data;
extracting a file descriptor based on the hidden danger data;
based on a first intelligent contract of a block chain, acquiring a first file corresponding to the file descriptor according to the file descriptor, and calculating a first file signature through a hash algorithm according to the first file;
generating first file description information according to the calculated first file signature and the file descriptor;
converting the first file description information into a character string in json format, and uploading the character string into a blockchain;
acquiring a second file corresponding to the file descriptor according to the file descriptor based on a second intelligent contract of the block chain, and calculating a second file signature through a hash algorithm according to the second file;
judging whether the first file signature is identical to the second file signature or not based on a second intelligent contract of a block chain;
if so, a second intelligent contract of the blockchain returns the second file to the file demander.
Further, the hidden trouble data includes:
structured data and unstructured data;
the structured data comprises: hidden danger type, hidden danger position information and contact person information;
the unstructured data, comprising: and (5) audio and video files and image files in the hidden trouble shooting process.
Further, the obtaining, according to the file descriptor, the first file corresponding to the file descriptor includes:
and acquiring a first file corresponding to the file descriptor through an API interface provided by the file provider and a file provider system according to the file descriptor.
Further, the first file description information includes: a first sequence number, a file descriptor, and a first file signature.
Further, the obtaining, according to the file descriptor, a second file corresponding to the file descriptor includes:
and acquiring a second file corresponding to the file descriptor through an API interface provided by the file provider and a file provider system according to the file descriptor.
Further, the method further comprises the following steps: generating second file description information according to the calculated second file signature and the file descriptor, wherein the second file description information comprises the following components: a second sequence number, a file descriptor, and a second file signature;
and converting the second file description information into a character string in json format, and uploading the character string into a blockchain.
Further, the method further comprises the following steps: if the signature verification failure error information is different, the signature verification failure error information is returned to the file demander.
In a second aspect of the present invention, there is provided a device for sharing data in a gas hidden trouble shooting scene, the device comprising:
the acquisition module is used for acquiring hidden danger data;
the extraction module is used for extracting file descriptors based on the hidden danger data;
the acquisition module is used for acquiring a first file corresponding to the file descriptor according to the file descriptor based on a first intelligent contract of the blockchain, and calculating a first file signature through a hash algorithm according to the first file;
the generation module is used for generating first file description information according to the calculated first file signature and the file descriptor;
the conversion module is used for converting the first file description information into a character string in json format and uploading the character string into a blockchain;
the computing module is used for acquiring a second file corresponding to the file descriptor according to the file descriptor based on a second intelligent contract of the blockchain, and computing a second file signature through a hash algorithm according to the second file;
the judging module is used for judging whether the first file signature is identical to the second file signature or not based on a second intelligent contract of the blockchain;
and the return module is used for returning the second file to the file demander by the second intelligent contract of the blockchain when the first file signature is the same as the second file signature.
In another aspect of the present invention, a computer readable storage medium is provided, on which a computer program is stored which, when executed by a processor, implements the steps of the method for sharing data in a gas hazard investigation scenario as described above.
In yet another aspect of the present invention, there is also provided an electronic device including a storage controller, the storage controller including a memory, a processor, and a computer program stored on the memory and executable on the processor, the processor implementing the steps of the data sharing method in the above gas hazard detection scenario when the computer program is executed.
According to the method and the device for sharing data in the gas hidden trouble shooting scene, when unstructured data is uploaded to the blockchain, the problem of large number of files is solved, structured json format is adopted to package file description information, and the file description information is used as the whole uploading blockchain for verification; in the process of sharing unstructured file data based on block chains, file sharing api interfaces established by enterprises are used for realizing file sharing based on block chains by fusing a signature strategy, and the blocks are relatively small, so that the transaction speed is ensured; the adaptability is strong, and when the number of files is changed, independent adaptation is not needed; a file storage system for storing video and images is not newly built.
The foregoing description is only an overview of the present invention, and is intended to be implemented in accordance with the teachings of the present invention in order that the same may be more clearly understood and to make the same and other objects, features and advantages of the present invention more readily apparent.
Drawings
Various other advantages and benefits will become apparent to those of ordinary skill in the art upon reading the following detailed description of the preferred embodiments. The drawings are only for purposes of illustrating the preferred embodiments and are not to be construed as limiting the invention. Also, like reference numerals are used to designate like parts throughout the figures. In the drawings:
fig. 1 is a flowchart of a method for sharing data in a gas hidden trouble shooting scene provided by an embodiment of the present invention;
FIG. 2 is a flowchart of another method for sharing data in a gas hidden trouble shooting scene according to an embodiment of the present invention;
FIG. 3 is a flowchart of a method for data sharing according to an embodiment of the present invention;
fig. 4 is a schematic structural diagram of a device for sharing data in a gas hidden trouble shooting scene according to an embodiment of the present invention.
Detailed Description
Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art.
As used herein, the singular forms "a", "an", "the" and "the" are intended to include the plural forms as well, unless expressly stated otherwise, as understood by those skilled in the art. It will be further understood that the terms "comprises" and/or "comprising," when used in this specification, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
It will be understood by those skilled in the art that all terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs unless defined otherwise. It will be further understood that terms, such as those defined in commonly used dictionaries, should be interpreted as having a meaning that is consistent with their meaning in the context of the prior art and will not be interpreted in an idealized or overly formal sense unless expressly so defined herein.
Fig. 1 schematically illustrates a flowchart of a method for data sharing in a gas hazard investigation scene according to an embodiment of the invention. Referring to fig. 1, the method for sharing data in a gas hidden danger investigation scene according to the embodiment of the invention specifically includes the following steps:
s11, acquiring hidden danger data;
s12, extracting a file descriptor based on the hidden danger data;
s13, a first intelligent contract based on a block chain is used for acquiring a first file corresponding to the file descriptor according to the file descriptor, and calculating a first file signature through a hash algorithm according to the first file;
s14, generating first file description information according to the calculated first file signature and the file descriptor;
s15, converting the first file description information into a character string in json format, and uploading the character string into a blockchain;
s16, a second intelligent contract based on a block chain is used for acquiring a second file corresponding to the file descriptor according to the file descriptor, and calculating a second file signature through a hash algorithm according to the second file;
s17, judging whether the first file signature is identical to the second file signature or not based on a second intelligent contract of a blockchain;
and S18, if the second files are the same, returning the second files to the file demander by the second intelligent contract of the blockchain.
Further, the hidden trouble data includes:
structured data and unstructured data;
the structured data comprises: hidden danger type, hidden danger position information and contact person information;
the unstructured data, comprising: and (5) audio and video files and image files in the hidden trouble shooting process.
In this embodiment, the hidden danger position includes: cities, counties, cells, and detailed addresses.
In this embodiment, the contact information includes: name and phone number.
Further, the obtaining, according to the file descriptor, the first file corresponding to the file descriptor includes:
and acquiring a first file corresponding to the file descriptor through an API interface provided by the file provider and a file provider system according to the file descriptor.
Further, the first file description information includes: a first sequence number, a file descriptor, and a first file signature.
Further, the obtaining, according to the file descriptor, a second file corresponding to the file descriptor includes:
and acquiring a second file corresponding to the file descriptor through an API interface provided by the file provider and a file provider system according to the file descriptor.
Further, the method further comprises the following steps: generating second file description information according to the calculated second file signature and the file descriptor, wherein the second file description information comprises the following components: a second sequence number, a file descriptor, and a second file signature;
and converting the second file description information into a character string in json format, and uploading the character string into a blockchain.
In this embodiment, the file description information format is [ { index:0, filepath: ", fileSign:", } ], the structure is json format, and the file description information cannot be directly stored on a blockchain, serialization is required to be completed first, and structured data in json format can be converted into character strings through serialization, so that the file description information is convenient to store on the chain.
In this embodiment, the file descriptor corresponds to a file path in json format, which may be understood as a download address or a unique identifier of a file maintained in the gas enterprise system.
In this embodiment, the storage content is an array string composed of file description information composed of a sequence number, a file descriptor, and file signature information.
When hidden danger data is linked, the gas enterprise software service packages relevant file information of videos and images into the structure, wherein a fileSign field is an empty character string, the empty character string is submitted to a blockchain, the blockchain relies on an intelligent contract, file descriptors are sequentially taken out to obtain filePath, file downloading is completed through a file downloading api interface provided by a gas enterprise, file signature data is obtained by relying on a signature algorithm, the file signature data is stored in the fileSign field, the array structure is stored in a block, and uplink evidence storage of the file data is realized.
Further, the method further comprises the following steps: if the signature verification failure error information is different, the signature verification failure error information is returned to the file demander.
In this embodiment, the hash algorithm includes: md5 and hmac.
In this embodiment, a file signature information storage block address is obtained from a file download request; acquiring file related storage addresses and signature information from corresponding blocks of a block chain; the intelligent block chain contract obtains related files from gas enterprise service through an api interface of a gas enterprise terminal, and calculates file signatures; when the signature of the new file is consistent with the signature stored in the block, indicating that the file is not tampered, and returning the corresponding file; otherwise, when the signatures are inconsistent, the file is tampered, and the error information of the signature verification failure is returned to the file demander.
In this embodiment, the api interface is provided by a gas database, which is provided as a file provider.
In this embodiment, the data verification is a verification of tamper-proof aspect of data, including: consistency check of structured data in terms of data types and values; and checking the unstructured data in the aspects of file number consistency, file descriptor consistency, file signature consistency and the like.
According to the method for sharing data in the gas hidden danger investigation scene, when unstructured data is uploaded to the blockchain, the problem of large number of files is solved, file description information is packaged in a structured json format, and the file description information is used as the whole uploading blockchain for verification; in the process of sharing unstructured file data based on block chains, file sharing api interfaces established by enterprises are used for realizing file sharing based on block chains by fusing a signature strategy, and the blocks are relatively small, so that the transaction speed is ensured; the adaptability is strong, and when the number of files is changed, independent adaptation is not needed; a file storage system for storing video and images is not newly built.
Fig. 2 schematically illustrates a flowchart of another method for sharing data in a gas hazard investigation scenario according to an embodiment of the invention. Referring to fig. 2, the method for sharing data in a gas hidden danger investigation scene according to the embodiment of the invention specifically includes the following steps:
the gas enterprises carry out hidden danger investigation related work on gas users according to investigation task requirements, and the hidden danger data acquisition work is completed; after the system receives hidden danger data, uploading hidden danger related information to a blockchain according to the requirements of a supervision department, so as to realize hidden danger data storage; the system transmits hidden trouble data to a related system of a supervision department in an interface form; the supervision department and the gas enterprise carry out data verification based on the blockchain on hidden danger data according to the self business logic requirements, so that the data is prevented from being tampered; the supervision department pushes the hidden danger related approval and supervision data to the gas enterprise through an interface; and the gas enterprise carries out the gas hidden danger related return visit work and uploads return visit information to the system according to the return visit result.
FIG. 3 schematically illustrates a flow diagram of a method of data sharing in accordance with one embodiment of the invention. Referring to fig. 3, the method for sharing data in the embodiment of the present invention specifically includes the following steps:
the supervision department platform requests a file from the blockchain; after receiving the file downloading request, the block chain node requests a corresponding file through an api interface provided by a gas enterprise; the gas enterprise service returns a file to the blockchain node according to the request content; the block chain link point performs signature calculation on the received file and compares the received file with the data on the chain; when the signatures agree, the blockchain node returns a file to the regulatory agency platform.
For the purposes of simplicity of explanation, the methodologies are shown and described as a series of acts, it is to be understood and appreciated by one of ordinary skill in the art that the methodologies are not limited by the order of acts, as some acts may, in accordance with the methodologies, take place in other order or concurrently. Further, those skilled in the art will appreciate that the embodiments described in the specification are presently preferred embodiments, and that the acts are not necessarily required by the embodiments of the invention.
Fig. 4 schematically illustrates a structural diagram of a device for sharing data in a gas hidden trouble shooting scenario according to an embodiment of the present invention. Referring to fig. 4, a device for sharing data in a gas hidden danger investigation scene according to an embodiment of the present invention specifically includes:
the acquisition module 401 is used for acquiring hidden danger data;
an extracting module 402, configured to extract a file descriptor based on the hidden danger data;
the obtaining module 403 is configured to obtain, according to the file descriptor, a first file corresponding to the file descriptor based on a first intelligent contract of a blockchain, and calculate, according to the first file, a first file signature through a hash algorithm;
a generating module 404, configured to generate first file description information according to the calculated first file signature and the file descriptor;
the conversion module 405 is configured to convert the first file description information into a character string in json format, and upload the character string into a blockchain;
the calculating module 406 is configured to obtain, according to the file descriptor, a second file corresponding to the file descriptor based on a second intelligent contract of the blockchain, and calculate, according to the second file, a second file signature through a hash algorithm;
a judging module 407, configured to judge whether the first file signature and the second file signature are the same based on a second intelligent contract of a blockchain;
a return module 408, configured to return the second file to the file demander by using the second intelligent contract of the blockchain when the first file signature is the same as the second file signature.
According to the device for sharing data in the gas hidden danger investigation scene, when unstructured data is uploaded to the blockchain, the problem of large number of files is solved, file description information is packaged in a structured json format, and the file description information is used as the whole uploading blockchain for verification; in the process of sharing unstructured file data based on block chains, file sharing api interfaces established by enterprises are used for realizing file sharing based on block chains by fusing a signature strategy, and the blocks are relatively small, so that the transaction speed is ensured; the adaptability is strong, and when the number of files is changed, independent adaptation is not needed; a file storage system for storing video and images is not newly built.
For the device embodiments, since they are substantially similar to the method embodiments, the description is relatively simple, and reference is made to the description of the method embodiments for relevant points.
In addition, the embodiment of the invention also provides a computer readable storage medium, on which a computer program is stored, which when being executed by a processor, realizes the steps of the method for sharing data in the gas hidden trouble shooting scene.
In this embodiment, the module/unit integrated with the data sharing device in the gas hidden trouble shooting scene may be stored in a computer readable storage medium if implemented in the form of a software functional unit and sold or used as an independent product. Based on such understanding, the present invention may implement all or part of the flow of the method of the above embodiment, or may be implemented by a computer program to instruct related hardware, where the computer program may be stored in a computer readable storage medium, and when the computer program is executed by a processor, the computer program may implement the steps of each of the method embodiments described above. Wherein the computer program comprises computer program code which may be in source code form, object code form, executable file or some intermediate form etc. The computer readable medium may include: any entity or device capable of carrying the computer program code, a recording medium, a U disk, a removable hard disk, a magnetic disk, an optical disk, a computer memory, a Read-only memory (ROM), a random access memory (RAM, random Access Memory), an electrical carrier signal, a telecommunications signal, a software distribution medium, and so forth. It should be noted that the computer readable medium contains content that can be appropriately scaled according to the requirements of jurisdictions in which such content is subject to legislation and patent practice, such as in certain jurisdictions in which such content is subject to legislation and patent practice, the computer readable medium does not include electrical carrier signals and telecommunication signals.
In addition, the embodiment of the invention also provides electronic equipment, which comprises a storage controller, wherein the storage controller comprises a memory, a processor and a computer program which is stored in the memory and can run on the processor, and the processor realizes the steps of the method for sharing data in the gas hidden trouble shooting scene when executing the program. For example, steps S11 to S18 shown in fig. 1. Or, the processor performs the functions of each module/unit in the embodiment of the apparatus for sharing data in the gas hidden danger checking scene when executing the computer program, for example, the acquisition module 401, the extraction module 402, the acquisition module 403, the generation module 404, the conversion module 405, the calculation module 406, the judgment module 407, and the return module 408 shown in fig. 4.
According to the method and the device for sharing data in the gas hidden trouble shooting scene, when unstructured data is uploaded to the blockchain, the problem of large number of files is solved, structured json format is adopted to package file description information, and the file description information is used as the whole uploading blockchain for verification; in the process of sharing unstructured file data based on block chains, file sharing api interfaces established by enterprises are used for realizing file sharing based on block chains by fusing a signature strategy, and the blocks are relatively small, so that the transaction speed is ensured; the adaptability is strong, and when the number of files is changed, independent adaptation is not needed; a file storage system for storing video and images is not newly built.
The apparatus embodiments described above are merely illustrative, wherein the elements illustrated as separate elements may or may not be physically separate, and the elements shown as elements may or may not be physical elements, may be located in one place, or may be distributed over a plurality of network elements. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of this embodiment. Those of ordinary skill in the art will understand and implement the present invention without undue burden.
From the above description of the embodiments, it will be apparent to those skilled in the art that the embodiments may be implemented by means of software plus necessary general hardware platforms, or of course may be implemented by means of hardware. Based on this understanding, the foregoing technical solution may be embodied essentially or in a part contributing to the prior art in the form of a software product, which may be stored in a computer readable storage medium, such as ROM/RAM, a magnetic disk, an optical disk, etc., including several instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to execute the method described in the respective embodiments or some parts of the embodiments.
Furthermore, those skilled in the art will appreciate that while some embodiments herein include some features but not others included in other embodiments, combinations of features of different embodiments are meant to be within the scope of the invention and form different embodiments. For example, any of the claimed embodiments can be used in any combination.
Finally, it should be noted that: the above embodiments are only for illustrating the technical solution of the present invention, and are not limiting; although the invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical scheme described in the foregoing embodiments can be modified or some technical features thereof can be replaced by equivalents; such modifications and substitutions do not depart from the spirit and scope of the technical solutions of the embodiments of the present invention.

Claims (10)

1. The method for sharing data in the gas hidden trouble shooting scene is characterized by comprising the following steps:
collecting hidden danger data;
extracting a file descriptor based on the hidden danger data;
based on a first intelligent contract of a block chain, acquiring a first file corresponding to the file descriptor according to the file descriptor, and calculating a first file signature through a hash algorithm according to the first file;
generating first file description information according to the calculated first file signature and the file descriptor;
converting the first file description information into a character string in json format, and uploading the character string into a blockchain;
acquiring a second file corresponding to the file descriptor according to the file descriptor based on a second intelligent contract of the block chain, and calculating a second file signature through a hash algorithm according to the second file;
judging whether the first file signature is identical to the second file signature or not based on a second intelligent contract of a block chain;
if so, a second intelligent contract of the blockchain returns the second file to the file demander.
2. The method of claim 1, wherein the hidden danger data comprises:
structured data and unstructured data;
the structured data comprises: hidden danger type, hidden danger position information and contact person information;
the unstructured data, comprising: and (5) audio and video files and image files in the hidden trouble shooting process.
3. The method according to claim 1, wherein the obtaining, according to the file descriptor, the first file corresponding to the file descriptor includes:
and acquiring a first file corresponding to the file descriptor through an API interface provided by the file provider and a file provider system according to the file descriptor.
4. The method of claim 1, wherein the step of determining the position of the substrate comprises,
the first file description information includes: a first sequence number, a file descriptor, and a first file signature.
5. The method according to claim 1, wherein the obtaining, according to the file descriptor, the second file corresponding to the file descriptor includes:
and acquiring a second file corresponding to the file descriptor through an API interface provided by the file provider and a file provider system according to the file descriptor.
6. The method as recited in claim 1, further comprising:
generating second file description information according to the calculated second file signature and the file descriptor, wherein the second file description information comprises the following components: a second sequence number, a file descriptor, and a second file signature;
and converting the second file description information into a character string in json format, and uploading the character string into a blockchain.
7. The method as recited in claim 1, further comprising:
if the signature verification failure error information is different, the signature verification failure error information is returned to the file demander.
8. A device for sharing data in a gas hidden trouble shooting scene, the device comprising:
the acquisition module is used for acquiring hidden danger data;
the extraction module is used for extracting file descriptors based on the hidden danger data;
the acquisition module is used for acquiring a first file corresponding to the file descriptor according to the file descriptor based on a first intelligent contract of the blockchain, and calculating a first file signature through a hash algorithm according to the first file;
the generation module is used for generating first file description information according to the calculated first file signature and the file descriptor;
the conversion module is used for converting the first file description information into a character string in json format and uploading the character string into a blockchain;
the computing module is used for acquiring a second file corresponding to the file descriptor according to the file descriptor based on a second intelligent contract of the blockchain, and computing a second file signature through a hash algorithm according to the second file;
the judging module is used for judging whether the first file signature is identical to the second file signature or not based on a second intelligent contract of the blockchain;
and the return module is used for returning the second file to the file demander by the second intelligent contract of the blockchain when the first file signature is the same as the second file signature.
9. A computer readable storage medium, on which a computer program is stored, characterized in that the computer program, when being executed by a processor, implements the steps of the method according to any of claims 1-7.
10. An electronic device comprising a memory controller, the memory controller comprising a memory, a processor, and a computer program stored on the memory and executable on the processor, the processor implementing the steps of the method of any one of claims 1-7 when the computer program is executed.
CN202311306829.XA 2023-10-10 2023-10-10 Method and device for sharing data in gas hidden danger investigation scene Pending CN117640620A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311306829.XA CN117640620A (en) 2023-10-10 2023-10-10 Method and device for sharing data in gas hidden danger investigation scene

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311306829.XA CN117640620A (en) 2023-10-10 2023-10-10 Method and device for sharing data in gas hidden danger investigation scene

Publications (1)

Publication Number Publication Date
CN117640620A true CN117640620A (en) 2024-03-01

Family

ID=90022401

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311306829.XA Pending CN117640620A (en) 2023-10-10 2023-10-10 Method and device for sharing data in gas hidden danger investigation scene

Country Status (1)

Country Link
CN (1) CN117640620A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109660356A (en) * 2018-12-18 2019-04-19 深圳前海微众银行股份有限公司 Data cochain method, apparatus, equipment and computer readable storage medium
CN110138733A (en) * 2019-04-03 2019-08-16 华南理工大学 Object storage system based on block chain is credible to deposit card and access right control method
US20200159696A1 (en) * 2018-11-16 2020-05-21 Advanced Messaging Technologies, Inc. Systems and Methods for Distributed Data Storage and Delivery Using Blockchain
KR102132118B1 (en) * 2019-03-21 2020-07-08 울산대학교 산학협력단 Apparatus and method for supporting workspace based on blockchain
US20200412525A1 (en) * 2019-06-26 2020-12-31 Grid7 Llc D/B/A Taekion Blockchain filesystem

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20200159696A1 (en) * 2018-11-16 2020-05-21 Advanced Messaging Technologies, Inc. Systems and Methods for Distributed Data Storage and Delivery Using Blockchain
CN109660356A (en) * 2018-12-18 2019-04-19 深圳前海微众银行股份有限公司 Data cochain method, apparatus, equipment and computer readable storage medium
KR102132118B1 (en) * 2019-03-21 2020-07-08 울산대학교 산학협력단 Apparatus and method for supporting workspace based on blockchain
CN110138733A (en) * 2019-04-03 2019-08-16 华南理工大学 Object storage system based on block chain is credible to deposit card and access right control method
US20200412525A1 (en) * 2019-06-26 2020-12-31 Grid7 Llc D/B/A Taekion Blockchain filesystem

Similar Documents

Publication Publication Date Title
JP7126174B2 (en) Verification system and method for collaboration of blockchain and off-chain devices
EP3859644B1 (en) Block chain-based data check system and method, computing device, and storage medium
US20220231856A1 (en) Verification system and method for chaining data
CN112686671B (en) Intelligent contract deployment method, device, equipment and medium based on block chain
US11361110B2 (en) File verification method, file verification system and file verification server
CN111144083B (en) Report generation method, device, equipment and computer readable storage medium
CN114465998B (en) Multi-device file transmission method and device, terminal device and readable storage medium
CN112307458A (en) Light node uplink method and device, Internet of things central control terminal and block chain network
CN109908585A (en) A kind of document handling method and system calculate equipment and storage medium
US20230205849A1 (en) Digital and physical asset tracking and authentication via non-fungible tokens on a distributed ledger
CN114185808A (en) Automatic testing method and device, electronic equipment and computer readable storage medium
CN113011907A (en) Data processing method, device, storage medium and equipment
CN106203179B (en) A kind of completeness check system and method for pair of file
CN113762956A (en) Transaction method and device based on block chain and electronic equipment
CN113129002A (en) Data processing method and equipment
US20210099772A1 (en) System and method for verification of video integrity based on blockchain
CN117640620A (en) Method and device for sharing data in gas hidden danger investigation scene
CN113704123B (en) Interface testing method, device, equipment and storage medium
CN115913802A (en) Service data processing method and device, electronic equipment and storage medium
CN112035471B (en) Transaction processing method and computer equipment
CN112016134A (en) Method and device for verifying integrity of file
CN112487065A (en) Data retrieval method and device
CN112688905A (en) Data transmission method, device, client, server and storage medium
CN111339097B (en) Data processing method and related equipment
CN113704176B (en) File scanning method, device, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination