CN120179667B - Circulation data supervision method based on data interaction - Google Patents
Circulation data supervision method based on data interactionInfo
- Publication number
- CN120179667B CN120179667B CN202510650899.XA CN202510650899A CN120179667B CN 120179667 B CN120179667 B CN 120179667B CN 202510650899 A CN202510650899 A CN 202510650899A CN 120179667 B CN120179667 B CN 120179667B
- Authority
- CN
- China
- Prior art keywords
- data
- verification
- circulation
- interaction
- supervision
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/23—Updating
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/22—Indexing; Data structures therefor; Storage structures
- G06F16/2228—Indexing structures
- G06F16/2237—Vectors, bitmaps or matrices
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/22—Indexing; Data structures therefor; Storage structures
- G06F16/2228—Indexing structures
- G06F16/2255—Hash tables
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/10—Complex mathematical operations
- G06F17/16—Matrix or vector computation, e.g. matrix-matrix or matrix-vector multiplication, matrix factorization
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T17/00—Three dimensional [3D] modelling, e.g. data description of 3D objects
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Data Mining & Analysis (AREA)
- General Engineering & Computer Science (AREA)
- Databases & Information Systems (AREA)
- Software Systems (AREA)
- Mathematical Physics (AREA)
- Pure & Applied Mathematics (AREA)
- Mathematical Optimization (AREA)
- Mathematical Analysis (AREA)
- Computational Mathematics (AREA)
- Computing Systems (AREA)
- Algebra (AREA)
- Geometry (AREA)
- Computer Graphics (AREA)
- Arrangements For Transmission Of Measured Signals (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention discloses a circulation data supervision method based on data interaction, which belongs to the technical field of data supervision and comprises the steps of establishing a dynamic identification system in a data circulation process, generating a unique dynamic identifier by each data unit when interaction is initiated, carrying out irreversible chain updating on the dynamic identifier along with each data interaction behavior, setting an environment sensing node in a circulation path, collecting network topology states, equipment physical position offset and transmission medium electromagnetic characteristic parameters when the data interaction occurs in real time, generating an environment fingerprint data packet, asynchronously binding the dynamic identifier with the environment fingerprint data packet to form a supervision index with space-time relevance, and reconstructing a three-dimensional track model of the data circulation path by reversely analyzing the environment fingerprint data packet in the supervision index when the data unit carries out cross-domain circulation.
Description
Technical Field
The invention relates to the technical field of data supervision, in particular to a circulation data supervision method based on data interaction.
Background
With the rapid development of digital economy, data has become a key production element, and frequent circulation and interaction of data between multiple entities and multiple systems are normal.
At present, the data circulation supervision mainly adopts a mode of combining static identification and post audit. Static identification is usually to give a fixed label when data is generated, so that the characteristic change of the data in the dynamic interaction process is difficult to adapt, post audit depends on manual or simple log analysis, a great deal of manpower and time cost is required, and supervision hysteresis exists. In addition, although the partial supervision method introduces the dynamic identification concept, when data circulates across domains, it is difficult to accurately track the actual circulation path of the data, and effective perception and recording of the network environment and the physical environment where the data is located are lacking.
The existing data circulation supervision technology has a plurality of defects, the static identification mode cannot accurately reflect the circulation state of data in real time when facing complex and changeable data interaction scenes, and the effective perception of the data interaction environments is lacking, so that the data is difficult to construct a complete and accurate circulation track when circulating across domains, and the strict requirements of the current data security supervision on traceability and verifiability of the whole life cycle of the data cannot be met.
Disclosure of Invention
The invention aims to provide a circulation data supervision method based on data interaction, which solves the following technical problems:
The static identification mode cannot accurately reflect the circulation state of the data in real time when facing complex and changeable data interaction scenes, and lacks effective perception of the data interaction environment, so that the data is difficult to construct a complete and accurate circulation track when circulating across domains.
The aim of the invention can be achieved by the following technical scheme:
a circulation data supervision method based on data interaction comprises the following steps:
Establishing a dynamic identification system in the data circulation process, wherein each data unit generates a unique dynamic identifier when initiating interaction, the identifier is synthesized by a data content characteristic value, an interaction time stamp and an identity code of an objective receiver through a unidirectional conversion algorithm, and the dynamic identifier is irreversibly updated in a chain manner along with each data interaction action;
setting an environment sensing node in a circulation path, and collecting network topology state, equipment physical position offset and transmission medium electromagnetic characteristic parameters when data interaction occurs in real time to generate an environment fingerprint data packet;
when the data unit generates cross-domain circulation, reconstructing a three-dimensional track model of the data circulation path by reversely analyzing the environment fingerprint data packet in the supervision index.
The generation process of the dynamic identifier specifically comprises the following steps:
When a data unit is ready to be transmitted, a check value of a fixed interval byte in a binary sequence is extracted as a content characteristic value, a difference value between a local clock of a transmitting party and a standard time source is used as a timestamp correction factor, a receiving party identity code adopts a truncated hash value of a unique identification code of hardware equipment, the three are input into an elliptic curve function to carry out nonlinear mapping to generate an initial dynamic identifier, and when the data unit is forwarded in a follow-up mode, an exclusive OR operation is carried out on a last byte of a previous identifier and an identity code of a new receiving party, and an operation result is inserted into an identifier head to form an updated dynamic identifier chain.
The invention further provides the generation of the environment fingerprint data packet, which comprises the following steps:
The method comprises the steps of disposing a multi-axis motion sensor at a physical device where data interaction occurs, continuously monitoring three-dimensional acceleration and angular velocity changes of the device, recording motion track waveforms in a set time window before and after interaction when a data transmission instruction is detected, simultaneously collecting a signal intensity matrix of a wireless access point where the device is located, extracting phase offset of carrier frequencies of all channels, extracting a characteristic frequency band energy distribution diagram by wavelet transformation after time domain alignment of the motion track waveforms and the phase offset, quantifying the characteristic frequency band energy distribution diagram into a multidimensional vector, and attaching geofence coordinates of the device to form a basic data layer of environmental fingerprints.
The asynchronous binding process comprises the steps of splitting a dynamic identifier into a head verification section and a tail verification section after interactive transmission of a data unit is completed, performing space coding conversion on equipment geographic coordinates in an environment fingerprint data packet by the head verification section to generate a positioning hash value, performing convolution operation on waveform features acquired by a motion sensor by the tail verification section to generate a physical feature mark, and splicing the positioning hash value and the physical feature mark according to a transmission time sequence to form a verification chain of supervision indexes, wherein the verification chain is divided and stored to storage nodes of different geographic areas in an interactive path in a distributed storage mode.
The reconstruction method of the three-dimensional track model comprises the steps of extracting positioning hash values corresponding to each interaction from a supervision index, restoring a geographic coordinate sequence of equipment through inverse space coding, analyzing waveform parameters in physical feature marks, calculating motion correlation coefficients between adjacent nodes, establishing a propagation path curved surface model based on a geographic coordinate system by combining network topology state data, superposing an equipment motion vector field on the curved surface model, generating a three-dimensional circulation track through a hydrodynamic trace tracking algorithm, and dynamically zooming and displaying the track model along a time axis.
The distributed storage of the verification chain adopts a fragment redundancy strategy, each supervision index is divided into three parts of geographic positioning fragments, equipment characteristic fragments and time sequence fragments, the three parts are respectively stored into a verification server of an autonomous domain where a current interaction node is located, a buffer area of a next hop node and a public timestamp service center, when the complete index is needed, verification requests are initiated to three types of storage sources at the same time, and each fragment can pass integrity verification only when the continuity constraint of the timestamp and the space overlapping condition of a geographic area are met.
The method comprises the steps of performing a blind convolution on original sensor data and a random noise sequence by using a device feature fragment, performing a difference value storage method on a time sequence fragment, and only recording relative time delay of adjacent time nodes instead of absolute time values, wherein decryption of the three fragments needs to be performed by using digital certificate keys of both interaction parties, device hardware fingerprint keys and public timestamp keys.
The verification process of the three-dimensional track model comprises the steps of establishing a virtual verification channel between any two adjacent nodes, discretizing a track model of a section between the two adjacent nodes into a plurality of detection points, wherein each detection point needs to meet the outbound constraint condition of the previous node and the inbound constraint condition of the next node at the same time, the outbound constraint condition comprises a data packet length change threshold value, a transmission delay fluctuation range and a signal strength attenuation gradient, the inbound constraint condition comprises a checksum matching degree, a packet header structural integrity degree and a load distribution balance degree, and when the detection points meet the bidirectional constraint at the same time, the section track is marked as a trusted path.
The dynamic establishment method of the virtual verification channels comprises the steps of automatically generating a candidate verification channel set when new network topology connection is detected in a data circulation process, carrying out weighted scoring on each candidate channel according to historical verification passing rate, path redundancy and node reputation values of the candidate channels, selecting three candidate channels with highest scores to establish temporary verification links in parallel, synchronously executing verification operation when data flows, marking a corresponding section track model as an effective path only when verification results of at least two temporary channels are consistent, and feeding back the verification results to an upstream node to update the reputation values of the candidate channels.
The invention has the beneficial effects that:
The invention solves the problems that the static identification of the existing data circulation supervision is difficult to adapt to dynamic change, post audit lag, lack of environment perception, difficult cross-domain path tracking and the like by establishing a dynamic identification system, setting environment perception nodes and adopting a series of innovative technologies. The dynamic identifier is synthesized by data content characteristic values, interaction time stamps and identity codes of target receivers and updated in a chained mode, is suitable for the dynamic interaction characteristics of data, and ensures real-time and accurate reflection of the data circulation state. The environment sensing node collects network topology state, equipment physical position offset and transmission medium electromagnetic characteristic parameters to generate an environment fingerprint data packet, and the environment fingerprint data packet is bound with the dynamic identifier Fu Yibu to form a supervision index, so that effective sensing of the data interaction environment is realized. The three-dimensional track model is reconstructed by reversely analyzing the supervision index during cross-domain circulation, and the data circulation path can be accurately tracked. And the generation of the dynamic identifier adopts elliptic curve function nonlinear mapping and exclusive-or operation updating, so that the uniqueness and the dynamic property of the identifier are ensured. The environment fingerprint data packet generates comprehensive multi-axis motion sensor data and a wireless access point signal intensity matrix, and the characteristic frequency band energy distribution map is extracted through wavelet transformation, so that the data is more comprehensive and accurate. Asynchronous binding generates a positioning hash value and physical characteristic marks, and the positioning hash value and the physical characteristic marks are spliced into a verification chain and are stored in a distributed mode, so that supervision index safety and traceability are enhanced. And the three-dimensional track model is reconstructed, and the track which can be dynamically scaled is generated by combining the geographic coordinates, the motion correlation coefficient and the network topology data through a track tracing algorithm, so that the whole life cycle traceability is realized. The distributed storage of the verification chain adopts a fragmentation redundancy strategy and various storage and encryption modes, so that the data integrity and the security are ensured. And verifying and establishing a virtual verification channel by the three-dimensional track model, dynamically selecting, ensuring the credibility of a data circulation path, and improving the efficiency and accuracy of data circulation supervision.
Drawings
The invention is further described below with reference to the accompanying drawings.
Fig. 1 is a schematic flow chart of the present invention.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
Referring to fig. 1, the present invention is a method for supervising circulation data based on data interaction, comprising the following steps:
In the data circulation process, the construction of a dynamic identification system is a key basis. Each data unit generates a unique dynamic identifier at the instant the interaction is initiated. The generation process is based on three core elements of data content characteristic values, interaction time stamps and target receiver identity codes, and synthesis is realized through a unidirectional conversion algorithm. The method comprises the steps of extracting key information from a binary sequence of data units to generate key information representing internal characteristics of the data, accurately recording interaction time stamp, giving time dimension information, and determining a target object of data transmission by identity coding of a target receiver. In addition, as data are continuously interacted among different nodes, the dynamic identifier can generate irreversible chain type update, and each update carries new interaction information like a 'digital footprint' of data circulation, so that the data can be accurately identified and tracked in the whole circulation life cycle.
On the flow path, the setting of the environment-aware node provides rich environment data for the supervision work. The nodes can acquire multidimensional information in real time, wherein the network topology state reflects the connection structure and the change condition of a network during data transmission, the physical position offset of equipment records the moving track of the equipment in space, and the electromagnetic characteristic parameters of a transmission medium capture the electromagnetic characteristics of the data transmission medium. By the integrated processing of this information, an environmental fingerprint data packet is generated, which resembles a "digital representation" of the data interaction environment. The dynamic identifier is then asynchronously bound to the ambient fingerprint data packet, which is not simply a data combination, but rather a spatio-temporal association is established by a specific algorithm, forming a supervision index. The index integrates information of the data and interactive environment information, and provides a complete and relevant data basis for subsequent supervision.
When the data unit is in cross-domain circulation, the reconstruction stage of the data circulation path is entered. At this time, the environmental fingerprint data packet in the supervision index is reversely analyzed, and the transmission paths of the data among different areas are gradually restored by utilizing various environmental information contained in the data packet and combining the space analysis and the data processing technology. And finally, constructing a three-dimensional track model of the data circulation path, wherein the model presents the circulation overall view of the data in an intuitive and three-dimensional mode, can not only show the path trend of the data from the starting point to the end point, but also reflect the interaction state of the data on different time and space nodes, and realizes the omnibearing and visual supervision of the data cross-domain circulation.
In the dynamic identifier generation process, when a data unit is ready to be sent, the system extracts check values of fixed interval bytes in a binary sequence of the data unit as characteristic values of data content, so that the core content attribute of the data is represented. After the difference value between the local clock of the sender and the standard time source is calculated and processed, the difference value is used as a time stamp correction factor, so that time recording errors caused by clock deviation are eliminated, and the accuracy of time information is ensured. The receiving party identity code adopts the truncated hash value of the unique identification code of the hardware equipment, so that the identity information leakage risk is reduced while the identity identification uniqueness is ensured. The three are input into elliptic curve functions to carry out nonlinear mapping, and initial dynamic identifiers are generated by utilizing high security and mathematical characteristics of elliptic curve encryption. And when the subsequent data is forwarded, performing exclusive OR operation on the last byte of the previous identifier and the identity code of the new receiver, and inserting an operation result into the head of the identifier to realize chain updating of the dynamic identifier. The updating mechanism enables the identifier to continuously record new interaction information along with the interaction of the data among different nodes, and ensures that the data can be accurately identified and traced in the whole circulation link.
The generation of the environmental fingerprint data packet relies on multi-source data acquisition and fusion processing techniques. A multi-axis motion sensor is deployed at the physical device where the data interaction occurs, which sensor is capable of continuously monitoring the device for three-dimensional acceleration and angular velocity changes. When a data transmission instruction is detected, the system automatically records motion track waveforms in a set time window before and after interaction, and captures physical motion characteristics of the equipment in the data transmission process. Meanwhile, a signal intensity matrix of a wireless access point where the equipment is located is acquired, phase offset of carrier frequency of each channel is extracted, and detailed parameters of a wireless transmission environment are acquired. And performing time domain alignment on the motion track waveform and the phase offset to ensure the consistency of the two types of data in the time dimension, and then extracting a characteristic frequency band energy distribution diagram from the aligned data by adopting a wavelet transformation technology. The distribution map is quantized into a multidimensional vector, geofence coordinates of the device are added, so that a basic data layer of the environment fingerprint is formed, and physical environment and network environment information during data interaction are completely recorded.
The asynchronous binding process aims to establish an efficient association between the dynamic identifier and the ambient fingerprint data packet. After the data unit completes the interactive transmission, the system splits the dynamic identifier into a head verification section and a tail verification section. The head verification section performs space coding conversion with equipment geographic coordinates in the environment fingerprint data packet, a positioning hash value is generated through a specific coding algorithm, a corresponding relation between a data identifier and a geographic position is established, the tail verification section performs convolution operation with waveform characteristics acquired by a motion sensor, a physical characteristic mark is generated, and binding of the data identifier and the equipment motion characteristics is realized. And splicing the positioning hash value and the physical characteristic mark according to the transmission time sequence to form a verification chain of the supervision index. In order to ensure data security and traceability, the verification chain adopts a distributed storage mode to divide and store storage nodes in different geographic areas in a data interaction path. The storage mode not only improves the security of the data, but also facilitates the quick retrieval and verification of the data when needed.
Reconstruction of the three-dimensional trajectory model is based on depth parsing of the supervision index and multi-source data fusion. And extracting positioning hash values corresponding to each interaction from the supervision index, restoring the geographic coordinate sequence of the equipment through an inverse spatial coding algorithm, and determining the spatial position information in the data transmission process. Meanwhile, waveform parameters in the physical feature marks are analyzed, motion correlation coefficients between adjacent nodes are calculated, and motion relations of the equipment among different nodes are clarified. And establishing a curved surface model of the data propagation path in a geographic coordinate system by combining the network topology state data, wherein the model intuitively presents the data propagation path in the form of a mathematical curved surface. And on the basis of the curved surface model, the motion vector field of the equipment is superimposed, and a three-dimensional circulation track containing time and space dimensions is generated through a trace tracking algorithm in fluid mechanics. The track model supports dynamic scaling display along a time axis, and a supervisor can check the circulation track of data under different time scales according to the needs, so that omnibearing visual supervision on data circulation is realized.
The distributed storage of the verification chain adopts a fragment redundancy strategy so as to improve the safety and the integrity of data storage. Each supervision index is split into three parts, namely a geographic positioning slice, a device characteristic slice and a time sequence slice. The geographic positioning fragments are stored in a verification server of the autonomous domain where the current interaction node is located, the device characteristic fragments are stored in a buffer area of the next hop node, and the time sequence fragments are stored in a public time stamp service center. When the complete index needs to be acquired, a verification request must be initiated to three types of storage sources at the same time, and each fragment needs to meet the continuity constraint of the time stamp and the spatial overlapping condition of the geographic area, so that the integrity check can be passed. The storage and verification mechanism effectively prevents the data from being tampered or lost in the storage and transmission process, and ensures the integrity and usability of the data.
In terms of data storage safety, the geographic positioning slicing adopts a multi-projection storage technology to convert coordinate data into a double expression form of a WGS84 coordinate system and a local plane coordinate system at the same time so as to adapt to the use requirements of the coordinate data in different scenes. The device feature fragments implement feature confusion processing, and the real features of the data are hidden by blindly convoluting the original sensor data with a random noise sequence, so that risks caused by data leakage are prevented. The time sequence slicing adopts a difference value storage method, only records the relative time delay of adjacent time nodes, but not absolute time values, and reduces the data storage capacity while guaranteeing the continuity of the time sequence. The decryption process of the three fragments needs to use the digital certificate keys, the device hardware fingerprint keys and the public timestamp keys of the two interacting parties to act together respectively to form a multi-level encryption protection system, so that the safety of data is ensured.
The verification process of the three-dimensional track model is realized by establishing a virtual verification channel. And constructing a virtual check channel between any two adjacent nodes, and discretizing a track model of a section between the two adjacent nodes into a plurality of detection points. Each detection point needs to meet both the outbound constraint of the previous node and the inbound constraint of the next node. The outbound constraint conditions comprise indexes such as a data packet length change threshold, a transmission delay fluctuation range, a signal intensity attenuation gradient and the like, so that the data is ensured to meet transmission specifications when being outbound, and the inbound constraint conditions cover the requirements of checksum matching degree, packet header structural integrity, load distribution balance degree and the like, so that the integrity and usability of the data are ensured when being inbound. When the detection points simultaneously meet the bidirectional constraint condition, the section track is marked as a trusted path, so that an abnormal path is effectively screened out, and the credibility of the data circulation path is ensured.
The dynamic establishment mechanism of the virtual check channel further optimizes the verification process. When a new network topology connection is detected in the data circulation process, the system automatically generates a candidate check channel set. Each candidate channel is weighted and scored according to the historical verification passing rate, the path redundancy, the node reputation value and other indexes. Three candidate channels with highest scores are selected to establish temporary check links in parallel, and verification operations are synchronously executed when data flows through the temporary links. Only when the verification results of at least two temporary channels are consistent, marking the track model of the corresponding section as a valid path, and feeding back the verification results to the upstream node for updating the node credit value of the upstream node. The dynamic establishment and verification mechanism not only improves verification efficiency, but also stimulates the nodes to maintain accuracy and safety of data transmission through updating the node reputation value, thereby forming benign data circulation supervision ecology.
The foregoing describes one embodiment of the present invention in detail, but the description is only a preferred embodiment of the present invention and should not be construed as limiting the scope of the invention. All equivalent changes and modifications within the scope of the present invention are intended to be covered by the present invention.
Claims (7)
1. The circulation data supervision method based on data interaction is characterized by comprising the following steps of:
Establishing a dynamic identification system in the data circulation process, wherein each data unit generates a unique dynamic identifier when initiating interaction, the identifier is synthesized by a data content characteristic value, an interaction time stamp and an identity code of an objective receiver through a unidirectional conversion algorithm, and the dynamic identifier is irreversibly updated in a chain manner along with each data interaction action;
setting an environment sensing node in a circulation path, and collecting network topology state, equipment physical position offset and transmission medium electromagnetic characteristic parameters when data interaction occurs in real time to generate an environment fingerprint data packet;
when the data unit generates cross-domain circulation, reconstructing a three-dimensional track model of a data circulation path by reversely analyzing an environment fingerprint data packet in the supervision index;
the verification process of the three-dimensional track model comprises the following steps:
establishing a virtual check channel between any two adjacent nodes, discretizing a track model of a section between the two adjacent nodes into a plurality of detection points, wherein each detection point needs to simultaneously meet an outbound constraint condition of a previous node and an inbound constraint condition of a next node, wherein the outbound constraint condition comprises a data packet length change threshold, a transmission delay fluctuation range and a signal strength attenuation gradient;
The dynamic establishment method of the virtual verification channel comprises the following steps:
When new network topology connection is detected in the data circulation process, a candidate verification channel set is automatically generated, each candidate channel carries out weighted scoring according to the historical verification passing rate, path redundancy and node reputation value, three candidate channels with the highest scoring are selected to establish temporary verification links in parallel, verification operation is synchronously executed when data flow occurs, a corresponding section track model is marked as an effective path only when verification results of at least two temporary channels are consistent, and the verification results are fed back to an upstream node to update the reputation value of the upstream node.
2. The method for supervising circulation data based on data interaction according to claim 1, wherein the process of generating the dynamic identifier specifically comprises:
When a data unit is ready to be transmitted, a check value of a fixed interval byte in a binary sequence is extracted as a content characteristic value, a difference value between a local clock of a transmitting party and a standard time source is used as a timestamp correction factor, a receiving party identity code adopts a truncated hash value of a unique identification code of hardware equipment, the three are input into an elliptic curve function to carry out nonlinear mapping to generate an initial dynamic identifier, and when the data unit is forwarded in a follow-up mode, an exclusive OR operation is carried out on a last byte of a previous identifier and an identity code of a new receiving party, and an operation result is inserted into an identifier head to form an updated dynamic identifier chain.
3. A method of data interaction based on data manipulation of circulation according to claim 2, wherein the generation of the environmental fingerprint data package comprises the steps of:
The method comprises the steps of disposing a multi-axis motion sensor at a physical device where data interaction occurs, continuously monitoring three-dimensional acceleration and angular velocity changes of the device, recording motion track waveforms in a set time window before and after interaction when a data transmission instruction is detected, simultaneously collecting a signal intensity matrix of a wireless access point where the device is located, extracting phase offset of carrier frequencies of all channels, extracting a characteristic frequency band energy distribution diagram by wavelet transformation after time domain alignment of the motion track waveforms and the phase offset, quantifying the characteristic frequency band energy distribution diagram into a multidimensional vector, and attaching geofence coordinates of the device to form a basic data layer of environmental fingerprints.
4. A circulation data supervision method based on data interaction is characterized in that after data units are transmitted interactively, a dynamic identifier is split into a head verification segment and a tail verification segment, the head verification segment and equipment geographic coordinates in an environment fingerprint data packet are subjected to space coding conversion to generate a positioning hash value, the tail verification segment and waveform features acquired by a motion sensor are subjected to convolution operation to generate a physical feature mark, the positioning hash value and the physical feature mark are spliced according to transmission time sequence to form a verification chain of supervision indexes, and the verification chain is divided and stored to storage nodes of different geographic areas in an interaction path in a distributed storage mode.
5. The circulation data supervision method based on data interaction according to claim 1 is characterized in that the reconstruction method of the three-dimensional track model comprises the steps of extracting positioning hash values corresponding to each interaction from supervision indexes, restoring a geographic coordinate sequence of equipment through inverse space coding, analyzing waveform parameters in physical characteristic marks, calculating motion correlation coefficients between adjacent nodes, establishing a propagation path curved surface model based on a geographic coordinate system by combining network topology state data, superposing an equipment motion vector field on the curved surface model, generating a three-dimensional circulation track through a hydrodynamic trace tracking algorithm, and enabling the track model to be displayed in a dynamic scaling mode along a time axis.
6. The method for supervising circulation data based on data interaction according to claim 4, wherein the distributed storage of the verification chain adopts a fragment redundancy strategy, each supervision index is divided into three parts of a geographic positioning fragment, a device characteristic fragment and a time sequence fragment, and the three parts are respectively stored in a verification server of an autonomous domain where a current interaction node is located, a buffer area of a next hop node and a public timestamp service center, when a complete index is needed, verification requests must be initiated to three types of storage sources at the same time, and each fragment can pass integrity verification only by meeting the continuity constraint of a timestamp and the space overlapping condition of a geographic area.
7. The circulation data supervision method based on data interaction according to claim 6, wherein the geographic positioning fragments adopt multiple projection storage, coordinate data are simultaneously converted into a double expression form of a WGS84 coordinate system and a local plane coordinate system, the device feature fragments implement feature confusion processing, original sensor data and random noise sequences are subjected to blind convolution, the time sequence fragments adopt a difference storage method, only the relative time delay of adjacent time nodes is recorded instead of absolute time values, and decryption of the three fragments needs to be combined by using digital certificate keys of interaction parties, device hardware fingerprint keys and public timestamp keys.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202510650899.XA CN120179667B (en) | 2025-05-20 | 2025-05-20 | Circulation data supervision method based on data interaction |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202510650899.XA CN120179667B (en) | 2025-05-20 | 2025-05-20 | Circulation data supervision method based on data interaction |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| CN120179667A CN120179667A (en) | 2025-06-20 |
| CN120179667B true CN120179667B (en) | 2025-08-29 |
Family
ID=96026350
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN202510650899.XA Active CN120179667B (en) | 2025-05-20 | 2025-05-20 | Circulation data supervision method based on data interaction |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN120179667B (en) |
Families Citing this family (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN120825433B (en) * | 2025-09-16 | 2026-01-09 | 北京科杰科技有限公司 | Data circulation method crossing data space |
Citations (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN119538269A (en) * | 2025-01-23 | 2025-02-28 | 越亮传奇科技股份有限公司 | Method and system for implementing electronic channel risk control based on code insertion technology |
| CN119989425A (en) * | 2025-04-15 | 2025-05-13 | 法正智能科技有限公司 | A blockchain-based bidding data security processing method |
Family Cites Families (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| EP3191998B1 (en) * | 2014-09-13 | 2020-12-23 | Advanced Elemental Technologies, Inc. | Methods and systems for secure and reliable identity-based computing |
| CN119892215B (en) * | 2025-03-27 | 2025-06-06 | 北京凌云光子技术有限公司 | Key information extraction method and system based on multi-mode model |
-
2025
- 2025-05-20 CN CN202510650899.XA patent/CN120179667B/en active Active
Patent Citations (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN119538269A (en) * | 2025-01-23 | 2025-02-28 | 越亮传奇科技股份有限公司 | Method and system for implementing electronic channel risk control based on code insertion technology |
| CN119989425A (en) * | 2025-04-15 | 2025-05-13 | 法正智能科技有限公司 | A blockchain-based bidding data security processing method |
Also Published As
| Publication number | Publication date |
|---|---|
| CN120179667A (en) | 2025-06-20 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Lone et al. | Forensic-chain: Blockchain based digital forensics chain of custody with PoC in Hyperledger Composer | |
| CN120179667B (en) | Circulation data supervision method based on data interaction | |
| CN108520293A (en) | A kind of product false proof source tracing method, device, server and storage medium | |
| CN104199848B (en) | The correlating method and device of user data under a kind of not same area | |
| CN111507709A (en) | Data traceability system | |
| WO2001069455A3 (en) | A system and method for analyzing a query and generating results and related questions | |
| CN108809932A (en) | A kind of deposit system, method and readable medium based on block chain | |
| KR20250034915A (en) | Systems and methods for digitally monitoring, reporting, and authenticating greenhouse gas emissions in real time and converting them into digital assets | |
| CN116506230A (en) | Data acquisition method and system based on RSA asymmetric encryption | |
| CN119538312B (en) | Encryption method and system based on symmetric cryptographic algorithm | |
| CN114860730A (en) | Land data storage method, system and storage medium based on block chain | |
| CN120578584A (en) | A method, system, device and medium for intelligent test generation for H5 pages | |
| CN117910018B (en) | Data calculation and exchange sharing method applied to artificial intelligence and based on homomorphic encryption and plaintext calculation technology | |
| CN116069952B (en) | Data processing method, device, computer equipment and storage medium | |
| CN116962077A (en) | Data encryption and decryption method based on data capacity and data transmission system | |
| Zhang et al. | Fast information streaming handler (fish): A unified seismic neural network for single station real-time earthquake early warning | |
| US20030131229A1 (en) | Method, system, and data structure for trustworthy digital document interchange and preservation | |
| CN107347071B (en) | A kind of power data security sharing method and tracking method | |
| CN120951313B (en) | Comprehensive data management method and system for intelligent park | |
| Hogan et al. | Information technology measurement and testing activities at NIST | |
| CN119906587B (en) | Efficient leakage detection method and system for secure channel | |
| CN115344659B (en) | Processing method and system for mass track big data, storage medium and electronic equipment | |
| Facon et al. | Binary data analysis for source code leakage assessment | |
| Cohen | Analysis of redundant traces for consistency: with examples from electronic messaging and graphical images | |
| CN120768692A (en) | A method and system for detecting asset damage vulnerabilities |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| GR01 | Patent grant |