Movatterモバイル変換


[0]ホーム

URL:


CN117134979A - Data communication method, device, equipment and medium - Google Patents

Data communication method, device, equipment and medium
Download PDF

Info

Publication number
CN117134979A
CN117134979ACN202311135817.5ACN202311135817ACN117134979ACN 117134979 ACN117134979 ACN 117134979ACN 202311135817 ACN202311135817 ACN 202311135817ACN 117134979 ACN117134979 ACN 117134979A
Authority
CN
China
Prior art keywords
information
access
data
circulation
transmission
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311135817.5A
Other languages
Chinese (zh)
Inventor
陈文彬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Jinhuawei Digital Technology Co ltd
Original Assignee
Shenzhen Jinhuawei Digital Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Jinhuawei Digital Technology Co ltdfiledCriticalShenzhen Jinhuawei Digital Technology Co ltd
Priority to CN202311135817.5ApriorityCriticalpatent/CN117134979A/en
Publication of CN117134979ApublicationCriticalpatent/CN117134979A/en
Pendinglegal-statusCriticalCurrent

Links

Classifications

Landscapes

Abstract

The present application relates to the field of data communications, and in particular, to a data communication method, apparatus, device, and medium. The method comprises the following steps: when a data communication instruction is detected, a digital transmission address is acquired, block chain encryption circulation is carried out on the transmission address based on each server node and transmission data, a circulation block chain is obtained, when data access request information is monitored, data access authority is determined according to the access request information, data information to be generated is determined based on the data access authority, verification information corresponding to the access authority is determined according to the data information to be generated, the verification information is fed back to a user terminal of a user, whether the feedback verification information is consistent with preset verification information is judged, and if so, the transmission address connection corresponding to the user terminal and the user request is established through the acquisition request of the circulation block chain corresponding to the access authority of the user terminal. The application has the effect of improving the data transmission safety.

Description

Data communication method, device, equipment and medium
Technical Field
The present application relates to the field of data communications, and in particular, to a data communication method, apparatus, device, and medium.
Background
Data communication is a new communication mode generated by combining communication technology and computer technology. In order to achieve data communication, data transmission is necessary, i.e. data information from a data source located at one place is transmitted via a transmission channel to a data receiving device located at another place.
In a data communication system, the transmission channels used may be fixed or may be provided by a switching network. There are two main ways of data exchange: circuit-switched and packet-switched, with packet-switched being more commonly used in practical data networks. In a data network employing packet switching, in addition to the functions required for data transmission and data link control procedures between adjacent switching nodes, various tasks such as storage and forwarding of data packets, routing, flow control, congestion control, user access connection, and maintenance and management of the network are performed at each switching node. Accordingly, certain relevant functions are also required to be implemented in the end system connected to the data switching network. All of these functions associated with the construction of the data switching network are defined in terms of communication protocols, which also include the interface protocols of the end system with the network. The protocol is a rule and convention that both parties must follow in order to communicate accurately and efficiently. They are of great significance in data communications, the data link control procedure in the foregoing is also actually a data communications protocol.
In a large traffic transmission scenario of a data communication system, such as uploading services of power inspection pictures and inspection videos, data packets are often very large, and a single data packet transmission mode is adopted to cause a plurality of problems such as transmission delay, increasing the processing complexity of a receiver, reducing the system capacity and the like, so that a load balancing technical means is generally adopted to transmit data, so as to enhance the processing capability of data transmission, namely, the data is distributed to a plurality of operation units for transmission execution, for example: the Web server, the FTP server and the like are used for completing data transmission tasks together, solving the problems caused by single data packet transmission, defining a data link control procedure and effectively controlling the segmentation, the ordered transmission, the ordered receiving and the ordered splicing of data.
Of course, although the single data packet transmission mode has the problems of transmission delay and the like, a general application server adopted by the single data packet transmission mode only configures an intranet address and can be protected in the intranet, an application server cluster adopted by the load balancing transmission mode does not configure the intranet address, and an http redirection method is often adopted during data transmission, so that the address of the application server cluster is exposed to the public network, and illegal personnel acquire the address through the public network, thereby stealing data transmitted by the application server cluster and further reducing the security of data transmission.
Disclosure of Invention
In order to solve at least one of the above technical problems, the present application provides a data communication method, apparatus, device and medium.
In a first aspect, the present application provides a data communication method, which adopts the following technical scheme:
a method of data communication, comprising:
when a data communication instruction is detected, acquiring transmission addresses corresponding to all server nodes in the data transmission process;
performing blockchain encryption circulation on the transmission addresses based on each server node and the transmission data corresponding to each server node to obtain circulation blockchains;
when data access request information is monitored, determining data access permission according to the access request information, wherein the access request information is used for representing user identity information and is generated after being triggered by a user, and the access permission is used for representing the block range of the circulation block chain which can be accessed by the user;
determining data information to be generated based on the data access authority, determining verification information corresponding to the access authority according to the data information to be generated, and feeding the verification information back to a user terminal corresponding to the user, wherein the data information to be generated comprises transmission data information corresponding to at least one circulation node in a circulation block chain corresponding to the access authority;
And after receiving feedback verification information sent by the user terminal, judging whether the feedback verification information is consistent with preset verification information, if so, establishing transmission address connection corresponding to the user terminal and the user request through a request for acquiring the circulation blockchain corresponding to the access right of the user terminal, and if not, generating alarm information to inform the user that the feedback verification information is abnormal currently, and terminating the request for acquiring the circulation blockchain corresponding to the access right of the user terminal.
In another possible implementation manner, the performing blockchain encryption circulation on the transport address based on each server node and the transport data corresponding to each server node to obtain a circulation blockchain includes:
determining data transmission standards corresponding to all server nodes based on the data communication instruction, matching data to be transmitted corresponding to all server nodes with the data transmission standards corresponding to all server nodes, and generating transmission data information corresponding to all server nodes according to the matching result information;
and calculating a root hash value corresponding to the transmission data information of each server node, acquiring a transmission path corresponding to the transmission data information of each server node, and forming a circulation block chain based on the root hash value corresponding to each server node and the transmission path, wherein the circulation block chain comprises at least one block, and each block corresponds to each initial data transmission node.
In another possible implementation manner, the determining the data information to be generated based on the data access right includes:
determining at least one accessible block according to the access rights;
acquiring transmission data information corresponding to at least one accessible block according to a storage path corresponding to each block;
determining an access data requirement according to the access request information, and determining feature information to be accessed corresponding to the access data requirement from the transmission data information of the at least one accessible block according to the corresponding relation between the access data requirement and the access feature;
and determining the characteristic information to be accessed as data information to be generated corresponding to the access right.
In another possible implementation, the method further includes:
acquiring the number of accessible blocks corresponding to each access right in real time;
judging whether the access authority has a block to be accessed according to the access authority, the corresponding relation between the access authority and the access block and the number of the accessible blocks corresponding to the access authority;
if yes, determining aging information of the verification information according to the current time and request circulation information, and adding the aging information to the verification information, wherein the request circulation information is a predicted time when the access request information circulates to each circulation node in the circulation block chain;
And when the number of the accessible blocks of the access authority corresponding to the access request information is detected to be increased, updating the verification information based on the transmission data information corresponding to the newly increased accessible blocks.
In another possible implementation manner, the determining the aging information of the verification information according to the current time and the data information to be generated, and adding the aging information to the verification information, includes:
according to the request transfer information and the transfer node corresponding to the current moment, predicting the transfer duration required when transferring from the transfer node corresponding to the current moment to the node corresponding to the next block to be accessed;
determining aging information of the verification information according to the current moment and the required circulation duration, and generating aging two-dimensional code information based on the aging information;
and adding the aging two-dimensional code information to the verification information.
In another possible implementation, the method further includes:
acquiring an access record of the verification information in a preset time period, wherein the access record is used for characterizing access time and an access account number of verification access to the verification information in the preset time period;
judging whether the verification information has access abnormality or not according to the access time and the access account in a preset time period;
When access abnormality exists, performing at least one parameter splice based on the position relation between the transmission data information corresponding to the verification information and the initial account information to obtain a parameter key corresponding to each parameter splice, recording each parameter splice process to obtain a splice rule corresponding to each parameter splice process, wherein the initial account information comprises an initial account, and the initial account is an account for providing access request information triggered for the first time;
distributing the use time length for each splicing rule according to the aging information to obtain the use time length respectively corresponding to each splicing rule; when the access request information is received again, analyzing the access request information to obtain access parameters, and recording the re-access time when the access request information is received again;
determining a target splicing rule corresponding to the revisit moment according to the use time length respectively corresponding to each splicing rule, and carrying out parameter splicing on the access parameters and the transmission data information corresponding to the verification information according to the target splicing rule to obtain a transmission data information key;
and restoring the transmission data information key based on the target splicing rule and the use duration corresponding to each splicing rule respectively, matching the restored transmission data information key with the parameter key, and feeding the verification information back to the terminal equipment corresponding to the initial account if the matching is successful.
In another possible implementation manner, the determining whether the authentication information has an access abnormality includes: judging whether the access time and the access account number meet preset conditions in a preset time period, and determining that the verification information has access abnormality when the access time and the access account number meet the preset conditions;
wherein the preset conditions include at least one of the following:
the access times of the same access account number in a preset time period are higher than a first preset threshold value;
the security level corresponding to the access account is lower than the preset security level;
the number of different access accounts within the preset access time period exceeds a second preset threshold.
In a second aspect, the present application provides a data communication apparatus, which adopts the following technical scheme:
a data communication apparatus comprising:
the address acquisition module is used for acquiring transmission addresses corresponding to all server nodes in the data transmission process when the data communication instruction is detected;
the circulation encryption module is used for conducting block chain encryption circulation on the transmission addresses based on each server node and the transmission data corresponding to each server node to obtain circulation block chains;
the right determining module is used for determining data access right according to the access request information when the data access request information is monitored, wherein the access request information is used for representing user identity information and is generated after being triggered by a user, and the access right is used for representing the block range of the circulation block chain which can be accessed by the user;
The verification sending module is used for determining data information to be generated based on the data access authority, determining verification information corresponding to the access authority according to the data information to be generated, and feeding the verification information back to a user terminal corresponding to the user, wherein the data information to be generated comprises transmission data information corresponding to at least one circulation node in a circulation blockchain corresponding to the access authority;
and the verification module is used for judging whether the feedback verification information is consistent with preset verification information after receiving the feedback verification information sent by the user terminal, if so, establishing transmission address connection corresponding to the user terminal and the user request through the acquisition request of the circulation blockchain corresponding to the access right of the user terminal, and if not, generating alarm information to inform the user that the feedback verification information is abnormal currently, and terminating the acquisition request of the circulation blockchain corresponding to the access right of the user terminal.
In one possible implementation manner, the circulation secret module is specifically configured to, when performing blockchain encryption circulation on the transport address based on each server node and transport data corresponding to each server node to obtain a circulation blockchain: determining data transmission standards corresponding to all server nodes based on the data communication instruction, matching data to be transmitted corresponding to all server nodes with the data transmission standards corresponding to all server nodes, and generating transmission data information corresponding to all server nodes according to the matching result information;
And calculating a root hash value corresponding to the transmission data information of each server node, acquiring a transmission path corresponding to the transmission data information of each server node, and forming a circulation block chain based on the root hash value corresponding to each server node and the transmission path, wherein the circulation block chain comprises at least one block, and each block corresponds to each initial data transmission node.
In another possible implementation manner, the verification sending module is specifically configured to, when determining that data information is to be generated based on the data access authority:
determining at least one accessible block according to the access rights;
acquiring transmission data information corresponding to at least one accessible block according to a storage path corresponding to each block;
determining an access data requirement according to the access request information, and determining feature information to be accessed corresponding to the access data requirement from the transmission data information of the at least one accessible block according to the corresponding relation between the access data requirement and the access feature;
and determining the characteristic information to be accessed as data information to be generated corresponding to the access right.
In another possible implementation, the apparatus further includes: the system comprises a quantity acquisition module, a judgment module to be accessed, an aging adding module and a verification updating module, wherein,
the number acquisition module is used for acquiring the number of the accessible blocks corresponding to each access right in real time;
the to-be-accessed judging module is used for judging whether the access authority has a to-be-accessed block or not according to the access authority, the corresponding relation between the access authority and the access block and the number of the accessible blocks corresponding to the access authority;
the aging adding module is used for determining aging information of the verification information according to the current moment and request circulation information when the access right has a block to be accessed, and adding the aging information to the verification information, wherein the request circulation information is the predicted moment when the access request information circulates to each circulation node in the circulation block chain;
and the verification updating module is used for updating the verification information based on the transmission data information corresponding to the newly added accessible block when the increase of the number of the accessible blocks of the access authority corresponding to the access request information is detected.
In another possible implementation manner, the aging adding module is specifically configured to, when determining aging information of the verification information according to the current time and data information to be generated, and adding the aging information to the verification information: according to the request transfer information and the transfer node corresponding to the current moment, predicting the transfer duration required when transferring from the transfer node corresponding to the current moment to the node corresponding to the next block to be accessed;
determining aging information of the verification information according to the current moment and the required circulation duration, and generating aging two-dimensional code information based on the aging information;
and adding the aging two-dimensional code information to the verification information.
In another possible implementation, the apparatus further includes: the system comprises a record acquisition module, an abnormality judgment module, a parameter splicing module, a duration distribution module, a moment determination module, a secret key determination module and a verification feedback module, wherein the record acquisition module is used for acquiring an access record of verification information in a preset time period, and the access record is used for representing access moment and an access account number of verification access to the verification information in the preset time period;
The abnormality judging module is used for judging whether the verification information has access abnormality or not according to the access time and the access account in a preset time period;
the parameter splicing module is used for carrying out parameter splicing at least once based on the position relation between the transmission data information corresponding to the verification information and the initial account information when the access abnormality exists, obtaining a parameter key corresponding to each parameter splicing process, recording each parameter splicing process, and obtaining a splicing rule corresponding to each parameter splicing process, wherein the initial account information comprises an initial account, and the initial account is an account for which the access request information is triggered for the first time;
the time length distribution module is used for distributing the use time length to each splicing rule according to the aging information to obtain the use time length respectively corresponding to each splicing rule;
the moment determining module is used for analyzing the access request information to obtain access parameters when the access request information is received again, and recording the revisit moment when the access request information is received again;
the key determining module is used for determining a target splicing rule corresponding to the revisit moment according to the use time length respectively corresponding to each splicing rule, and performing parameter splicing on the access parameter and the transmission data information corresponding to the verification information according to the target splicing rule to obtain a transmission data information key;
And the verification feedback module is used for restoring the transmission data information key based on the target splicing rule and the use duration respectively corresponding to each splicing rule, matching the restored transmission data information key with the parameter key, and feeding the verification information back to the terminal equipment corresponding to the initial account if the matching is successful.
In another possible implementation manner, the abnormality determination module is specifically configured to, when determining whether the authentication information has an access abnormality:
judging whether the access time and the access account number meet preset conditions in a preset time period, and determining that the verification information has access abnormality when the access time and the access account number meet the preset conditions;
wherein the preset conditions include at least one of the following:
the access times of the same access account number in a preset time period are higher than a first preset threshold value;
the security level corresponding to the access account is lower than the preset security level;
the number of different access accounts within the preset access time period exceeds a second preset threshold.
In a third aspect, the present application provides an electronic device, which adopts the following technical scheme:
an electronic device, the electronic device comprising:
at least one processor;
a memory;
At least one application program, wherein the at least one application program is stored in the memory and configured to be executed by the at least one processor, the at least one application program configured to: a data communication method as shown in any one of the possible implementations of the first aspect is performed.
In a fourth aspect, a computer readable storage medium is provided, the storage medium storing at least one instruction, at least one program, code set, or instruction set, the at least one instruction, at least one program, code set, or instruction set being loaded and executed by a processor to implement a data communication method as shown in any one of the possible implementations of the first aspect.
In summary, the present application includes at least one of the following beneficial technical effects:
the application provides a data communication method, a device, equipment and a medium, compared with the related technology, in the application, when data communication security is monitored, when a data communication instruction is detected, a transmission address corresponding to each server node in a data transmission process is acquired, then a block chain encryption circulation is carried out on the transmission address based on each server node and transmission data corresponding to each server node, a circulation block chain is obtained, when data access request information is monitored, data access authority is determined according to the access request information, then data information to be generated is determined based on the data access authority, verification information corresponding to the access authority is determined according to the data information to be generated, the verification information is fed back to a user terminal corresponding to a user, after the feedback verification information sent by the user terminal is received, whether the feedback verification information is consistent with preset verification information is judged, if so, a transmission address connection corresponding to the user terminal and the user request is established through the user terminal corresponding to the transmission address of the circulation block chain, if not consistent, alarm information is generated, the user terminal corresponding to the user terminal is stopped, and the communication authentication information corresponding to the user terminal is stopped through the user terminal and the communication authentication information in a double verification mode is stopped in the communication process.
Drawings
FIG. 1 is a schematic flow chart of a data communication method according to an embodiment of the application;
FIG. 2 is a block diagram of a data communication device according to an embodiment of the present application;
fig. 3 is a schematic diagram of an electronic device according to an embodiment of the application.
Detailed Description
The application is described in further detail below with reference to fig. 1-3.
Modifications of the embodiments which do not creatively contribute to the application may be made by those skilled in the art after reading the present specification, but are protected by patent laws only within the scope of the claims of the present application.
For the purpose of making the objects, technical solutions and advantages of the embodiments of the present application more apparent, the technical solutions of the embodiments of the present application will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present application, and it is apparent that the described embodiments are some embodiments of the present application, but not all embodiments of the present application. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application.
In addition, the term "and/or" is merely an association relation describing the association object, and indicates that three relations may exist, for example, a data communication method, apparatus, device, medium and/or B may indicate: there are separately a data communication method, apparatus, device and medium, and there are simultaneously a data communication method, apparatus, device and medium and B, and there are separately B. In this context, unless otherwise specified, the term "/" generally indicates that the associated object is an "or" relationship.
Embodiments of the application are described in further detail below with reference to the drawings.
The embodiment of the application provides a data communication method which is executed by electronic equipment, wherein the electronic equipment can be a server or terminal equipment, and the server can be an independent physical server, a server cluster or a distributed system formed by a plurality of physical servers, or a cloud server for providing cloud computing service. The terminal device may be, but is not limited to, a smart phone, a tablet computer, a notebook computer, a desktop computer, etc., and the terminal device and the server may be directly or indirectly connected through wired or wireless communication, which is not limited herein, and as shown in fig. 1, the method includes:
step S10, when a data communication instruction is detected, transmission addresses corresponding to all server nodes in the data transmission process are acquired.
In an embodiment of the present application, the data communication instruction is an instruction generated when the electronic device distributes data to a plurality of servers through load balancing. When the data communication instruction is generated, the electronic equipment distributes data to a plurality of server nodes for transmission communication, and meanwhile the plurality of server nodes can send the addresses of the server nodes to the electronic equipment.
And S11, conducting block chain encryption circulation on the transmission addresses based on each server node and the transmission data corresponding to each server node to obtain circulation block chains.
And step S12, when the data access request information is monitored, determining the data access authority according to the access request information.
The access request information is used for representing user identity information and is generated after being triggered by a user, and the access authority is used for representing the block range of the circulation block chain which can be accessed by the user.
Specifically, the access request information is formed after the triggering device is triggered by the user and is uploaded to the data processing device, the access request information comprises the identity information of the user and the content to be accessed, and the access permission of the user is conveniently determined through the identity information of the user, wherein the identity information of the user can be a mailbox account number or a mobile phone number of the user, and the specific identity information type is not particularly limited in the embodiment of the application, so long as the access permission corresponding to the user can be determined through the identity information of the user. The accessible content corresponding to the access right of the user may be the same as or different from the content to be accessed included in the access request information of the user, for example, the content to be accessed included in the access request information sent by the user includes node a, node B, and node C, but the accessible content corresponding to the access right of the user may include only node a and node B.
And step S13, determining data information to be generated based on the data access authority, determining verification information corresponding to the access authority according to the data information to be generated, and feeding back the verification information to a user terminal corresponding to the user.
The data information to be generated comprises transmission data information corresponding to at least one circulation node in a circulation block chain corresponding to the access authority.
Specifically, the data information to be generated is determined by the access right corresponding to the user and the content of the node to be accessed, and the data information to be generated is an intersection of the accessible content in the access right of the user and the content to be accessed in the access request information, and the intersection of the content to be accessed may include monitoring information corresponding to one node or monitoring information corresponding to a plurality of nodes. For example, when the content to be accessed in the access request information sent by the user is node a, node B and node D, and the accessible content corresponding to the access authority of the user includes node a and node C, the data information to be generated corresponding to the user is monitoring information corresponding to node a; when the content to be accessed in the access request information sent by the user is node A, node B and node D, and the accessible content corresponding to the access authority of the user comprises node A and node B, the data information to be generated corresponding to the user is monitoring information corresponding to node A and node B.
The verification information is used for verifying and checking links in the circulation process, namely the verification information corresponding to the access authority, namely the verification information corresponding to the data information to be generated can be a two-dimensional code or a bar code, and the two-dimensional code can generally accommodate 1850 capital letters or 2710 numbers or 1108 bytes or 500 Chinese characters, and the data accommodating amount corresponding to the two-dimensional code is large.
Step S14, after receiving feedback verification information sent by the user terminal, judging whether the feedback verification information is consistent with preset verification information, if so, establishing transmission address connection corresponding to the user terminal and the user request through the acquisition request of the circulation blockchain corresponding to the user terminal and the access right, if not, generating alarm information, informing the user that the feedback verification information is abnormal currently, and terminating the acquisition request of the circulation blockchain corresponding to the user terminal and the access right.
The embodiment of the application provides a data communication method, when data communication safety is monitored, when a data communication instruction is detected, a transmission address corresponding to each server node in a data transmission process is acquired, then block chain encryption circulation is carried out on the transmission address based on each server node and transmission data corresponding to each server node, a circulation block chain is obtained, when data access request information is monitored, data access authority is determined according to the access request information, then data information to be generated is determined based on the data access authority, verification information corresponding to the access authority is determined according to the data information to be generated, the verification information is fed back to a user terminal corresponding to a user, after feedback verification information sent by the user terminal is received, whether the feedback verification information is consistent with preset verification information is judged, if so, a circulation block chain acquisition request corresponding to the user terminal and the user request is established through the user terminal, if not consistent, alarm information is generated, the user is informed that the feedback verification information exists, the user terminal and the user terminal is stopped from the communication request corresponding to the user request is stopped, and the communication safety of the communication authority in a double verification mode is improved.
In one possible implementation manner of the embodiment of the present application, a blockchain encryption stream is performed on the transport address based on each server node and transport data corresponding to each server node, so as to obtain a stream blockchain, including:
determining data transmission standards corresponding to all server nodes based on the data communication instruction, matching data to be transmitted corresponding to all server nodes with the data transmission standards corresponding to all server nodes, and generating transmission data information corresponding to all server nodes according to the matching result information;
and calculating a root hash value corresponding to the transmission data information of each server node, acquiring a transmission path corresponding to the transmission data information of each server node, and forming a circulation block chain based on the root hash value corresponding to each server node and the transmission path, wherein the circulation block chain comprises at least one block, and each block corresponds to each initial data transmission node.
In the embodiment of the application, the displayed blockchain encryption stream generally comprises a plurality of stream nodes such as an approval node, a processing node, a registration node, a notification node and the like, so as to ensure the accuracy and the security of data information.
Specifically, the data transmission standard is used for judging whether the data transfer process accords with the transfer standard corresponding to the node, and the transfer process of the data to be transmitted is conveniently supervised through the data transmission standard. The data to be transmitted comprises a plurality of data types and corresponding transmission data, the data transmission standard comprises a plurality of data types to be monitored and corresponding monitoring standards, whether the data to be transmitted accords with the monitoring standard or not is determined by matching the data types in the data to be transmitted with the data types to be monitored in the data transmission standard, corresponding matching results are generated, and the matching results corresponding to the data types form matching result information corresponding to the data to be transmitted.
Specifically, a sub hash value corresponding to each data type in the transmission data information of each server node is calculated through a hash algorithm, then a root hash value corresponding to each server node is calculated through a merck tree algorithm and each sub hash value contained in the transmission data information of the streaming node, and all the transmission data information contained in the server node is conveniently checked through the root hash value. For example, when the transmission data information corresponding to the node a includes a plurality of nodes, each node may further include a child node, each node or child node corresponds to node monitoring data or child node monitoring data, the node monitoring data type corresponding to each node is different, and the child node monitoring data type corresponding to each child node is also different. The root hash value corresponding to each node is associated with the storage space of the transmission data information of the node, the storage space corresponding to the transmission data information of the node is conveniently determined from the association relation of the root hash value and the storage address through the root hash value of the node, therefore, all the transmission data information corresponding to the node is conveniently checked through the root hash value, wherein the establishment process of the association relation of the root hash value and the storage address comprises the steps of determining the data quantity according to the transmission data information corresponding to the node, determining the target storage space from the idle storage space of the data processing equipment according to the data quantity, and binding the target storage space with the root hash value.
One possible implementation manner of the embodiment of the present application, the determining data information to be generated based on the data access authority includes: determining at least one accessible block according to the access rights; acquiring transmission data information corresponding to at least one accessible block according to a storage path corresponding to each block; determining an access data requirement according to the access request information, and determining feature information to be accessed corresponding to the access data requirement from the transmission data information of the at least one accessible block according to the corresponding relation between the access data requirement and the access feature; and determining the characteristic information to be accessed as data information to be generated corresponding to the access right.
Specifically, the access rights correspond to the access request information triggered by the user, the accessible blocks corresponding to different access rights are different, that is, the accessible nodes corresponding to different access rights are different, the corresponding relationship between the access rights and the access blocks can be determined according to historical access data, and can be input and modified by related technicians, and the method and the device are not particularly limited in the embodiment of the application.
Because the root hash value of each block and the storage address corresponding to the transmission data information of the block are in association relation, after the root hash value of the accessible block is determined, the transmission data information corresponding to the accessible block is determined from the association relation of the root hash value and the storage address, the transmission data information corresponding to the accessible block can be directly determined as the data information to be generated, the monitoring information containing the access characteristic is screened out from the monitoring information corresponding to at least one access block, and the monitoring information containing the access characteristic is determined as the monitoring information to be generated. When monitoring information containing access features is screened out from monitoring information corresponding to at least one block, feature word vectors of the access features can be determined, information containing the feature word vectors is screened out from the monitoring information corresponding to at least one block according to the feature word vectors, information not containing the feature word vectors is eliminated, experience feeling when a user views the information is facilitated to be improved by eliminating invalid information, and in addition, workload of a computer is facilitated to be reduced by reducing data volume when verification information is generated.
One possible implementation manner of the embodiment of the present application, the method further includes: acquiring the number of accessible blocks corresponding to each access right in real time; judging whether the access authority has a block to be accessed according to the access authority, the corresponding relation between the access authority and the access block and the number of the accessible blocks corresponding to the access authority; if yes, determining aging information of the verification information according to the current time and request circulation information, and adding the aging information to the verification information, wherein the request circulation information is a predicted time when the access request information circulates to each circulation node in the circulation block chain; and when the number of the accessible blocks of the access authority corresponding to the access request information is detected to be increased, updating the verification information based on the transmission data information corresponding to the newly increased accessible blocks.
Specifically, because the access right and the accessible blocks have an association relationship, the number of accessible blocks corresponding to the access right is convenient to determine through the association relationship between the access right and the accessible blocks, for example, if the nodes accessible by the X user access right are node a, node B and node C, the number of accessible blocks corresponding to the X user access right is 3.
Specifically, since the verification information is formed according to the transmission data information corresponding to the accessible blocks, the verification information corresponding to the different number of accessible blocks is also different, if the block to be accessed still exists at the current time, the verification information generated at the current time needs to be updated when the data stream is transferred to the node corresponding to the block to be accessed, so that the user can check the complete verification information. In order to remind a user to download updated verification information at the time or refresh the verification information in time after updating, in the embodiment of the application, the required circulation time length between the current time and the next block to be accessed is calculated, the access request information is confirmed to circulate to the prediction time at each block in the circulation block chain according to the circulation time length, the circulation time length is confirmed to be the ageing information corresponding to the verification information generated at the current time, the current time reaches the node D, and the ageing information corresponding to the verification information generated at the moment is confirmed by circulation between the node D and the node E corresponding to the next block to be accessed.
In one possible implementation manner of the embodiment of the present application, the determining the aging information of the verification information according to the current time and the data information to be generated, and adding the aging information to the verification information includes:
According to the request transfer information and the transfer node corresponding to the current moment, predicting the transfer duration required when transferring from the transfer node corresponding to the current moment to the node corresponding to the next block to be accessed;
determining aging information of the verification information according to the current moment and the required circulation duration, and generating aging two-dimensional code information based on the aging information;
and adding the aging two-dimensional code information to the verification information.
Specifically, the request circulation information includes circulation speed of the request in the request circulation process, and in the embodiment of the application, the circulation speed of the default request in the request circulation process is the same, and the circulation speed can be determined according to historical circulation data and can also be determined by related technicians. Starting timing from the circulation-out time of the last node, comparing the circulation-out time with the current time to facilitate determining the circulation time of the request, facilitating determining the circulation distance of the request from the last node according to the circulation time, facilitating determining the standby circulation distance between the request and the next node according to the node distance between the two nodes, and finally determining the required circulation time through the circulation speed, wherein the required circulation time can be brought into a required circulation time calculation formula by the distance between the last circulation node and the departure point, the distance between the next circulation node and the departure point, the current time, the circulation-out time from the last node and the circulation speed when the required circulation time is calculated, and the required circulation time is as follows:
Wherein T isRequired that The method comprises the steps of representing required circulation duration between a position circulation corresponding to the current moment and a next node;
relower part(s) For characterizing the distance between the next flow node and the departure point;
reupper part For characterizing the distance between the last streaming node and the departure point;
Tcurrently, the method is that Used for representing the current moment;
Tupper part For characterizing the moment of the streaming out from the previous node;
v is used to characterize the speed of circulation.
The aging information includes a circulation time period required for circulation to the next node and node information corresponding to the verification information, for example, the aging information may include verification information from node a and node B, which is to be updated after XX hours, XX minutes and XX seconds, wherein the required circulation time period is updated in real time according to a circulation position of a request, when the aging watermark information is generated, the real-time required circulation time period and the node information can be compiled into the aging watermark information by using a Java algorithm, and the aging watermark information and the node information are added to the verification information. In addition, watermark colors, fonts and character transparency can be set for the generated aging watermark information.
Judging whether the verification information needs to be updated or not through the change of the number of the accessible blocks, namely determining that the request is transferred to the next node to be accessed when the number of the accessible nodes is increased, and updating the verification information according to the monitoring information corresponding to the node to be accessed after the transfer is completed.
One possible implementation manner of the embodiment of the present application, the method further includes: acquiring an access record of the verification information in a preset time period, wherein the access record is used for characterizing access time and an access account number of verification access to the verification information in the preset time period; judging whether the verification information has access abnormality or not according to the access time and the access account in a preset time period; when access abnormality exists, performing at least one parameter splice based on the position relation between the transmission data information corresponding to the verification information and the initial account information to obtain a parameter key corresponding to each parameter splice, recording each parameter splice process to obtain a splice rule corresponding to each parameter splice process, wherein the initial account information comprises an initial account, and the initial account is an account for providing access request information triggered for the first time; distributing the use time length for each splicing rule according to the aging information to obtain the use time length respectively corresponding to each splicing rule; when the access request information is received again, analyzing the access request information to obtain access parameters, and recording the re-access time when the access request information is received again; determining a target splicing rule corresponding to the revisit moment according to the use time length respectively corresponding to each splicing rule, and carrying out parameter splicing on the access parameters and the transmission data information corresponding to the verification information according to the target splicing rule to obtain a transmission data information key; and restoring the transmission data information key based on the target splicing rule and the use duration corresponding to each splicing rule respectively, matching the restored transmission data information key with the parameter key, and feeding the verification information back to the terminal equipment corresponding to the initial account if the matching is successful.
Specifically, the preset time period may be one hour or two hours after the generation of the verification information, and the specific preset time period is not specifically limited in the embodiment of the present application, as long as the access condition of the verification code can be recorded and counted, and each access record includes an access account number and the access time of the access account number to the verification information.
In one possible implementation manner of the embodiment of the present application, the determining whether the authentication information has an access abnormality includes:
judging whether the access time and the access account number meet preset conditions in a preset time period, and determining that the verification information has access abnormality when the access time and the access account number meet the preset conditions;
wherein the preset conditions include at least one of the following:
the access times of the same access account number in a preset time period are higher than a first preset threshold value;
the security level corresponding to the access account is lower than the preset security level;
the number of different access accounts within the preset access time period exceeds a second preset threshold.
Specifically, since the verification information can be accessed by any device, the access record of the verification information in the preset time period may include only one access device or may include a plurality of access devices, and the access times may be one time or may be a plurality of times, the access times of each access device in the access record of the verification information and the access time of each access are counted, and if the access times of the same access device are higher than a first preset threshold, it is determined that the verification has access abnormality; the security level detection can be carried out on each access account, and when the access account with the security level lower than the preset security level exists in the access record, the verification information is determined to have access abnormality; in addition, the number of the access accounts accessing the verification in the preset time period can be counted, and when the access accounts exceeding the second preset threshold number exist in the preset time period to access the verification information, the verification information is determined to be in abnormal access. The first preset threshold, the second preset threshold and the preset security level standard are not specifically limited in the embodiment of the present application, and may be input by a related technician.
The above-described embodiments describe a data communication method from the viewpoint of a method flow, and the following embodiments describe a data communication apparatus from the viewpoint of a virtual module or a virtual unit, and the following embodiments are described in detail.
An embodiment of the present application provides a data communication apparatus, as shown in fig. 2, the data communication apparatus 20 may specifically include: an address acquisition module 21, a stream encryption module 22, a rights determination module 23, a verification transmission module 24, and a verification module 25, wherein,
an address obtaining module 21, configured to obtain, when a data communication instruction is detected, a transmission address corresponding to each server node in a data transmission process;
a circulation encryption module 22, configured to perform blockchain encryption circulation on the transport addresses based on each server node and transport data corresponding to each server node, so as to obtain circulation blockchains;
the permission determining module 23 is configured to determine, when data access request information is monitored, data access permission according to the access request information, where the access request information is used to characterize user identity information, and is generated after being triggered by a user, and the access permission is used to characterize a block range in which the user can access the circulation blockchain;
The verification sending module 24 is configured to determine data information to be generated based on the data access right, determine verification information corresponding to the access right according to the data information to be generated, and feed back the verification information to a user terminal corresponding to the user, where the data information to be generated includes transmission data information corresponding to at least one circulation node in a circulation blockchain corresponding to the access right;
and the verification module 25 is configured to determine whether the feedback verification information is consistent with the preset verification information after receiving the feedback verification information sent by the user terminal, if so, establish a transmission address connection corresponding to the user terminal and the user request through an acquisition request of a circulation blockchain corresponding to the user terminal and the access right, and if not, generate alarm information to inform the user that the feedback verification information is abnormal currently, and terminate the acquisition request of the circulation blockchain corresponding to the user terminal and the access right.
In one possible implementation manner of the embodiment of the present application, the stream encryption module 22 is specifically configured to, when performing blockchain encryption stream on the transport address based on each server node and the transport data corresponding to each server node to obtain a stream blockchain:
Determining data transmission standards corresponding to all server nodes based on the data communication instruction, matching data to be transmitted corresponding to all server nodes with the data transmission standards corresponding to all server nodes, and generating transmission data information corresponding to all server nodes according to the matching result information;
and calculating a root hash value corresponding to the transmission data information of each server node, acquiring a transmission path corresponding to the transmission data information of each server node, and forming a circulation block chain based on the root hash value corresponding to each server node and the transmission path, wherein the circulation block chain comprises at least one block, and each block corresponds to each initial data transmission node.
In another possible implementation manner of the embodiment of the present application, when the verification sending module 24 determines that the data information is to be generated based on the data access right, the verification sending module is specifically configured to:
determining at least one accessible block according to the access rights;
acquiring transmission data information corresponding to at least one accessible block according to a storage path corresponding to each block;
determining an access data requirement according to the access request information, and determining feature information to be accessed corresponding to the access data requirement from the transmission data information of the at least one accessible block according to the corresponding relation between the access data requirement and the access feature;
And determining the characteristic information to be accessed as data information to be generated corresponding to the access right.
Another possible implementation manner of the embodiment of the present application, the apparatus 20 further includes: the system comprises a quantity acquisition module, a judgment module to be accessed, an aging adding module and a verification updating module, wherein,
the number acquisition module is used for acquiring the number of the accessible blocks corresponding to each access right in real time;
the to-be-accessed judging module is used for judging whether the access authority has a to-be-accessed block or not according to the access authority, the corresponding relation between the access authority and the access block and the number of the accessible blocks corresponding to the access authority;
the aging adding module is used for determining aging information of the verification information according to the current moment and request circulation information when the access right has a block to be accessed, and adding the aging information to the verification information, wherein the request circulation information is the predicted moment when the access request information circulates to each circulation node in the circulation block chain;
and the verification updating module is used for updating the verification information based on the transmission data information corresponding to the newly added accessible block when the increase of the number of the accessible blocks of the access authority corresponding to the access request information is detected.
In another possible implementation manner of the embodiment of the present application, when determining the aging information of the verification information according to the current time and the data information to be generated, the aging adding module is specifically configured to:
according to the request transfer information and the transfer node corresponding to the current moment, predicting the transfer duration required when transferring from the transfer node corresponding to the current moment to the node corresponding to the next block to be accessed;
determining aging information of the verification information according to the current moment and the required circulation duration, and generating aging two-dimensional code information based on the aging information;
and adding the aging two-dimensional code information to the verification information.
Another possible implementation manner of the embodiment of the present application, the apparatus 20 further includes: the system comprises a record acquisition module, an abnormality judgment module, a parameter splicing module, a duration distribution module, a moment determination module, a secret key determination module and a verification feedback module,
the record acquisition module is used for acquiring an access record of the verification information in a preset time period, wherein the access record is used for characterizing access time and an access account number for verifying and accessing the verification information in the preset time period;
The abnormality judging module is used for judging whether the verification information has access abnormality or not according to the access time and the access account in a preset time period;
the parameter splicing module is used for carrying out parameter splicing at least once based on the position relation between the transmission data information corresponding to the verification information and the initial account information when the access abnormality exists, obtaining a parameter key corresponding to each parameter splicing process, recording each parameter splicing process, and obtaining a splicing rule corresponding to each parameter splicing process, wherein the initial account information comprises an initial account, and the initial account is an account for which the access request information is triggered for the first time;
the time length distribution module is used for distributing the use time length to each splicing rule according to the aging information to obtain the use time length respectively corresponding to each splicing rule;
the moment determining module is used for analyzing the access request information to obtain access parameters when the access request information is received again, and recording the revisit moment when the access request information is received again;
the key determining module is used for determining a target splicing rule corresponding to the revisit moment according to the use time length respectively corresponding to each splicing rule, and performing parameter splicing on the access parameter and the transmission data information corresponding to the verification information according to the target splicing rule to obtain a transmission data information key;
And the verification feedback module is used for restoring the transmission data information key based on the target splicing rule and the use duration respectively corresponding to each splicing rule, matching the restored transmission data information key with the parameter key, and feeding the verification information back to the terminal equipment corresponding to the initial account if the matching is successful.
In another possible implementation manner of the embodiment of the present application, when the abnormality determination module determines whether the verification information has an access abnormality, the abnormality determination module is specifically configured to:
judging whether the access time and the access account number meet preset conditions in a preset time period, and determining that the verification information has access abnormality when the access time and the access account number meet the preset conditions;
wherein the preset conditions include at least one of the following:
the access times of the same access account number in a preset time period are higher than a first preset threshold value;
the security level corresponding to the access account is lower than the preset security level;
the number of different access accounts within the preset access time period exceeds a second preset threshold.
It will be clear to those skilled in the art that, for convenience and brevity of description, specific working procedures of the above-described systems, apparatuses and units may refer to corresponding procedures in the foregoing method embodiments, and are not repeated herein.
The embodiment of the application also introduces an electronic device from the perspective of a physical device, as shown in fig. 3, and the electronic device 300 shown in fig. 3 includes, in addition to a conventional configuration device: a processor 301 and a memory 303. Wherein the processor 301 is coupled to the memory 303, such as via a bus 302. Optionally, the electronic device 300 may also include a transceiver 304. It should be noted that, in practical applications, the transceiver 304 is not limited to one, and the structure of the electronic device 300 is not limited to the embodiment of the present application.
The processor 301 may be a CPU (Central Processing Unit ), general purpose processor, DSP (Digital Signal Processor, data signal processor), ASIC (Application Specific Integrated Circuit ), FPGA (Field Programmable Gate Array, field programmable gate array) or other programmable logic device, transistor logic device, hardware components, or any combination thereof. Which may implement or perform the various exemplary logic blocks, modules and circuits described in connection with this disclosure. Processor 301 may also be a combination that implements computing functionality, e.g., comprising one or more microprocessor combinations, a combination of a DSP and a microprocessor, etc.
Bus 302 may include a path to transfer information between the components. Bus 302 may be a PCI (Peripheral Component Interconnect, peripheral component interconnect Standard) bus or an EISA (Extended Industry Standard Architecture ) bus, or the like. Bus 302 may be divided into an address bus, a data bus, a control bus, and the like. For ease of illustration, only one thick line is shown in fig. 3, but not only one bus or one type of bus.
The Memory 303 may be, but is not limited to, a ROM (Read Only Memory) or other type of static storage device that can store static information and instructions, a RAM (Random Access Memory ) or other type of dynamic storage device that can store information and instructions, an EEPROM (Electrically Erasable Programmable Read Only Memory ), a CD-ROM (Compact Disc Read Only Memory, compact disc Read Only Memory) or other optical disk storage, optical disk storage (including compact discs, laser discs, optical discs, digital versatile discs, blu-ray discs, etc.), magnetic disk storage media or other magnetic storage devices, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer.
The memory 303 is used for storing application program codes for executing the inventive arrangements and is controlled to be executed by the processor 301. The processor 301 is configured to execute the application code stored in the memory 303 to implement what is shown in the foregoing method embodiments.
Among them, electronic devices include, but are not limited to: mobile terminals such as mobile phones, notebook computers, digital broadcast receivers, PDAs (personal digital assistants), PADs (tablet computers), PMPs (portable multimedia players), in-vehicle terminals (e.g., in-vehicle navigation terminals), and the like, and stationary terminals such as digital TVs, desktop computers, and the like. But may also be a server or the like. The electronic device shown in fig. 3 is only an example and should not be construed as limiting the functionality and scope of use of the embodiments of the application.
Embodiments of the present application provide a computer-readable storage medium having a computer program stored thereon, which when run on a computer, causes the computer to perform the corresponding method embodiments described above. Compared with the prior art, in the embodiment of the application, when the data communication security is monitored, when a data communication instruction is detected, the transmission address corresponding to each server node in the data transmission process is acquired, then the block chain encryption circulation is carried out on the transmission address based on each server node and the transmission data corresponding to each server node, the circulation block chain is obtained, when the data access request information is monitored, the data access authority is determined according to the access request information, then the data information to be generated is determined according to the data access authority, the verification information corresponding to the access authority is determined according to the data information to be generated, the verification information is fed back to the user terminal corresponding to the user, after the feedback verification information sent by the user terminal is received, whether the feedback verification information is consistent with the preset verification information is judged, if so, the acquisition request of the circulation block chain corresponding to the user terminal and the user request is established, if not consistent, the alarm information is generated, the user is informed that the current feedback verification information exists, the user terminal is stopped, and the user terminal is stopped from the corresponding to the user request is stopped, and the communication authority of the communication request is improved in the double verification mode.
It should be understood that, although the steps in the flowcharts of the figures are shown in order as indicated by the arrows, these steps are not necessarily performed in order as indicated by the arrows. The steps are not strictly limited in order and may be performed in other orders, unless explicitly stated herein. Moreover, at least some of the steps in the flowcharts of the figures may include a plurality of sub-steps or a plurality of stages, which are not necessarily performed at the same time 0, but may be performed at different times, the order of their execution is not necessarily sequential, but may be performed in turn or alternately with at least some of the other steps or sub-steps of other steps.
The foregoing is only a partial embodiment of the present application, and it should be noted that it will be apparent to those skilled in the art that modifications and adaptations can be made without departing from the principles of the present application, and such modifications and adaptations should and are intended to be comprehended within the scope of the present application.

Claims (10)

CN202311135817.5A2023-09-022023-09-02Data communication method, device, equipment and mediumPendingCN117134979A (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN202311135817.5ACN117134979A (en)2023-09-022023-09-02Data communication method, device, equipment and medium

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN202311135817.5ACN117134979A (en)2023-09-022023-09-02Data communication method, device, equipment and medium

Publications (1)

Publication NumberPublication Date
CN117134979Atrue CN117134979A (en)2023-11-28

Family

ID=88856234

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN202311135817.5APendingCN117134979A (en)2023-09-022023-09-02Data communication method, device, equipment and medium

Country Status (1)

CountryLink
CN (1)CN117134979A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN117478427A (en)*2023-12-262024-01-30广东省能源集团贵州有限公司Network security data processing method and system
CN118487958A (en)*2024-06-212024-08-13苏州盖雅信息技术有限公司 A gateway customized middleware dynamic loading method, system, device and medium
CN119416230A (en)*2024-06-262025-02-11福建中锐电子科技有限公司 A cloud-based collaborative forensic data protection method, device, equipment and medium

Cited By (5)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN117478427A (en)*2023-12-262024-01-30广东省能源集团贵州有限公司Network security data processing method and system
CN117478427B (en)*2023-12-262024-04-02广东省能源集团贵州有限公司Network security data processing method and system
CN118487958A (en)*2024-06-212024-08-13苏州盖雅信息技术有限公司 A gateway customized middleware dynamic loading method, system, device and medium
CN118487958B (en)*2024-06-212024-11-15苏州盖雅信息技术有限公司 A gateway customized middleware dynamic loading method, system, device and medium
CN119416230A (en)*2024-06-262025-02-11福建中锐电子科技有限公司 A cloud-based collaborative forensic data protection method, device, equipment and medium

Similar Documents

PublicationPublication DateTitle
CN117134979A (en)Data communication method, device, equipment and medium
CN103491056B (en)The control method and device of application permission
CN114553540B (en)Zero trust-based Internet of things system, data access method, device and medium
CN111104675A (en)Method and device for detecting system security vulnerability
US12225132B2 (en)Cybersecurity guard for core network elements
CN112311769B (en)Method, system, electronic device and medium for security authentication
CN111988644B (en)Anti-stealing-link method, device, equipment and storage medium for network video
CN112165445B (en)Method, device, storage medium and computer equipment for detecting network attack
CN112968910A (en)Replay attack prevention method and device
CN114268957A (en)Abnormal business data processing method, device, server and storage medium
CN113225348A (en)Request anti-replay verification method and device
CN114567678B (en)Resource calling method and device for cloud security service and electronic equipment
CN114866331B (en)Dynamic access authentication method and device under zero trust network and storage medium
CN112134843A (en)Authentication method of Internet of things equipment
CN111259428A (en)Data processing method and device based on block chain, node equipment and storage medium
CN111314332A (en)Access control method, device, computer system and computer-readable storage medium
CN115643039A (en)Security protection method and device for internet of things terminal and computer readable storage medium
CN119743303A (en) Data transmission method, device, computer equipment and computer readable medium
CN110650132A (en)Access method and device of edge computing node, computer equipment and storage medium
CN113243093B (en)System and method for message transmission and retrieval using blockchain
CN118300785A (en)Safe data encryption method and device for electric power Internet of things
CN110659476A (en)Method and apparatus for resetting password
CN116781353A (en)Data acquisition method and device based on device fingerprint, electronic device and medium
CN118300832B (en)Multi-device access platform processing method and system
CN119854039B (en)Road terminal access method and related equipment of road traffic network

Legal Events

DateCodeTitleDescription
PB01Publication
PB01Publication
SE01Entry into force of request for substantive examination
SE01Entry into force of request for substantive examination

[8]ページ先頭

©2009-2025 Movatter.jp