CN108600262A - A kind of includes the device of the block chain node as recipient - Google Patents

A kind of includes the device of the block chain node as recipient Download PDF

Info

Publication number
CN108600262A
CN108600262A CN201810437378.6A CN201810437378A CN108600262A CN 108600262 A CN108600262 A CN 108600262A CN 201810437378 A CN201810437378 A CN 201810437378A CN 108600262 A CN108600262 A CN 108600262A
Authority
CN
China
Prior art keywords
block chain
internet
secure data
things system
gateway device
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810437378.6A
Other languages
Chinese (zh)
Inventor
张焱
施逸
田宝同
邓晓军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hefei Da Pu Hui Couplet Technology Co Ltd
Hefei DappWorks Technology Co Ltd
Original Assignee
Hefei Da Pu Hui Couplet Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hefei Da Pu Hui Couplet Technology Co Ltd filed Critical Hefei Da Pu Hui Couplet Technology Co Ltd
Priority to CN201810437378.6A priority Critical patent/CN108600262A/en
Publication of CN108600262A publication Critical patent/CN108600262A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/08Protocols for interworking; Protocol conversion

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer And Data Communications (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses it is a kind of include the block chain node as recipient device, including:Receiving module, the secure data for receiving the Internet of things system that other block chain nodes are sent out;Authentication module, for being verified to the secure data with other each block chain nodes;Memory module, for will be preserved into corresponding block chain database by the secure data of verification.The advantages of invention, is:The characteristic that can not be distorted using the data in block chain database, the secure data that Internet of things system generates is stored in block chain database, the secure data that Internet of things system generates faithfully is recorded to reflect the actual motion state of Internet of things system, obtains corresponding secure data from block chain database when needed.This programme realizes recalling to the practical operation situation of Internet of things system, can more effectively protect the safety of Internet of things system.

Description

A kind of includes the device of the block chain node as recipient
Technical field
The present invention relates to Internet technical field more particularly to it is a kind of include the block chain node as recipient dress It sets.
Background technology
Internet of Things is by information carriers such as internet, conventional telecommunications nets, and the multiple general of standalone feature can be exercised by allowing Logical object realizes the network to interconnect.Internet of Things is by real world digitisation, the information for the dispersion that furthers, the number of unite whole object and object The application field of word information, Internet of Things includes:Transport and logistics field, health medical treatment field, intelligent environment (family, office, work Factory) field, individual and social field etc., there is very wide application prospect.
During realizing present inventive concept, inventor has found that at least there are the following problems in the prior art:Internet of Things Secure data in system is easy to be maliciously tampered so that secure data is insincere, and then can not be based on Internet of things system Secure data operates Internet of things system accordingly.
Invention content
Present invention solves the technical problem that being the effect for the safety for promoting Internet of things system.
In order to solve the above technical problems, the present invention provides it is a kind of include the block chain node as recipient device, Including:Receiving module, the secure data for receiving the Internet of things system that other block chain nodes are sent out;Authentication module is used for The secure data is verified with other each block chain nodes;Memory module, for the safe number of verification will to be passed through According in preservation to corresponding block chain database.
Optionally, the secure data of Internet of things system includes:The safety regulation of the gateway device of Internet of things system and/or behaviour Make daily record.
Optionally, the secure data received is according to the encrypted secure data of predetermined encryption rule.
Optionally, receiving module is additionally operable to receive the corresponding digital signature of the secure data together and sends out the peace The public key of the block chain node of total evidence;The corresponding digital signature of wherein described secure data is to be based on the secure data and hair Go out the private key generation of the block chain node of the secure data;The authentication module, for being based on the digital signature and institute State secure data described in public key verifications.
Optionally, receiving module is additionally operable to receive the mark letter of the corresponding gateway device of the secure data together Breath;The memory module, for the mark of the secure data and the corresponding gateway device of the secure data of verification will to be passed through Know in information preservation to corresponding block chain database.
Optionally, this block chain link point includes:The gateway device of Internet of things system.
Optionally, the gateway device of Internet of things system is at least one of following:Local monitoring is carried out to Internet of things system, Procotol conversion is carried out to Internet of things system, edge calculations are carried out to Internet of things system.
Beneficial effects of the present invention:
(1) characteristic that can not be distorted using the data in block chain database, the secure data that Internet of things system is generated It is stored in block chain database so that the secure data that Internet of things system generates can faithfully be recorded with reflection The actual motion state of networked system obtains corresponding secure data from block chain database when needed, based on acquired Secure data can execute the operation that is consistent with the actual motion state of Internet of things system to Internet of things system.This programme is realized To recalling for the practical operation situation of Internet of things system, the safety of Internet of things system can be more effectively protected.
(2) ensureing what the secure data of Internet of things system was not tampered using the multi-party supervision characteristic of block chain database Meanwhile also by the secure data to Internet of things system be encrypted in the way of ensure that deposit block chain database in Internet of Things The privacy of the secure data of net system.
Description of the drawings
By referring to the drawings to the description of the embodiment of the present invention, above-mentioned and other purposes of the invention, feature and Advantage will be apparent from, in the accompanying drawings:
Fig. 1 diagrammatically illustrates the method and apparatus according to the ... of the embodiment of the present invention that can be applied for block chain node Exemplary system architecture;
Fig. 2 diagrammatically illustrates the flow of the method for the block chain node according to the ... of the embodiment of the present invention as sender Figure;
Fig. 3 diagrammatically illustrates the stream of the method for the block chain node according to another embodiment of the present invention as recipient Cheng Tu;
Fig. 4 A diagrammatically illustrate it is according to the ... of the embodiment of the present invention include the block chain node as sender device Block diagram;
Fig. 4 B diagrammatically illustrate it is according to another embodiment of the present invention include the block chain node as sender dress The block diagram set;
Fig. 4 C diagrammatically illustrate it is according to another embodiment of the present invention include the block chain node as recipient dress The block diagram set;
Fig. 5 diagrammatically illustrates the computer according to the ... of the embodiment of the present invention for being adapted for carrying out the method for block chain node System block diagram in equipment.
Specific implementation mode
Hereinafter, will be described with reference to the accompanying drawings the embodiment of the present invention.However, it should be understood that these descriptions are only exemplary , and it is not intended to limit the scope of the present invention.In the following detailed description, it for ease of explaining, elaborates many specific thin Section is to provide the comprehensive understanding to the embodiment of the present invention.It may be evident, however, that one or more embodiments are not having these specific thin It can also be carried out in the case of section.In addition, in the following description, descriptions of well-known structures and technologies are omitted, to avoid Unnecessarily obscure idea of the invention.
Term as used herein is not intended to limit the present invention just for the sake of description specific embodiment.It uses herein The terms "include", "comprise" etc. show the presence of the feature, step, operation and/or component, but it is not excluded that in the presence of Or other one or more features of addition, step, operation or component.
There are all terms (including technical and scientific term) as used herein those skilled in the art to be generally understood Meaning, unless otherwise defined.It should be noted that term used herein should be interpreted that with consistent with the context of this specification Meaning, without should by idealization or it is excessively mechanical in a manner of explain.
It, in general should be according to this using " in A, B and C etc. at least one " such statement is similar to Field technology personnel are generally understood the meaning of the statement to make an explanation (for example, " with system at least one in A, B and C " Should include but not limited to individually with A, individually with B, individually with C, with A and B, with A and C, with B and C, and/or System etc. with A, B, C).Using " in A, B or C etc. at least one " such statement is similar to, it is general come Say be generally understood the meaning of the statement to make an explanation (for example, " having in A, B or C at least according to those skilled in the art One system " should include but not limited to individually with A, individually with B, individually with C, with A and B, with A and C, have B and C, and/or system etc. with A, B, C).It should also be understood by those skilled in the art that substantially arbitrarily indicating two or more The adversative conjunction and/or phrase of optional project shall be construed as either in specification, claims or attached drawing It gives including one of these projects, the possibility of these projects either one or two projects.For example, phrase " A or B " should It is understood to include the possibility of " A " or " B " or " A and B ".
It is understandable to enable above-mentioned purpose, feature and the advantageous effect of the present invention to become apparent, below in conjunction with the accompanying drawings to this The specific embodiment of invention is described in detail.
Fig. 1 diagrammatically illustrates the method and apparatus according to the ... of the embodiment of the present invention that can be applied for block chain node Exemplary system architecture.It should be noted that be only the example for the system architecture that can apply the embodiment of the present invention shown in Fig. 1, To help skilled in the art to understand the technology contents of the present invention, but it is not meant to that the embodiment of the present invention may not be usable for it His equipment, system, environment or scene.
As shown in Figure 1, the system architecture of the embodiment shows that an Internet of things system, Internet of things system are to pass through interconnection The information carriers such as net, conventional telecommunications net allow the multiple common objects that can exercise standalone feature to realize the network to interconnect, Each node therein correspond to the equipment being connected into Internet of Things, as shown in fig. 1, the equipment can be mobile terminal, Automobile, household equipment etc. are a variety of.Machine, equipment can be managed concentratedly, controlled by Internet of things system, it can also be to family Front yard equipment, automobile are remotely controlled and searching position, prevent erroneous judgement stolen etc., realizes similar automation control system, leads to simultaneously Big data can be gathered by crossing the data of each node in collection Internet of things system, can be designed accordingly based on big data, Update, prediction, control etc. realize that object is connected with object.
It should be understood that the number of the Internet of things system interior joint shown in Fig. 1 is only schematical.According to realize needs, The embodiment of the present invention can be applied to random scale, Internet of things system with several destination nodes.
Fig. 2 diagrammatically illustrates the flow of the method for the block chain node according to the ... of the embodiment of the present invention as sender Figure illustrates this method from the angle of the block chain node for the secure data for sending Internet of things system, can specifically include as follows Step:
The secure data of Internet of things system is sent to other block chain nodes, so that each block chain node by step S201 The secure data of Internet of things system is preserved into corresponding block chain database.
Step S202 obtains the one or more of Internet of things system from the corresponding block chain database of this block chain link point Secure data executes corresponding operating based on acquired secure data to Internet of things system.
As it can be seen that the characteristic that method shown in Fig. 2 can not be distorted using the data in block chain database, by Internet of things system The secure data of generation is stored in block chain database so that the secure data that Internet of things system generates can faithfully be remembered It records to reflect the actual motion state of Internet of things system, obtains corresponding safe number from block chain database when needed According to based on acquired secure data the behaviour that is consistent with the actual motion state of Internet of things system can be executed to Internet of things system Make.This programme realizes recalling to the practical operation situation of Internet of things system, can more effectively protect Internet of things system Safety.
In one embodiment of the invention, method shown in Fig. 2 further includes:It is sent out by the secure data of Internet of things system It send to before other block chain nodes, the secure data is encrypted according to predetermined encryption rule, obtains encryption safe number According to.The secure data of Internet of things system is sent to other block chain nodes by step S201:Encryption safe data are sent To other block chain nodes, so that each block chain node preserves the encryption safe data to corresponding block chain database In.
The present embodiment can execute in the following way:For example, after Internet of things system generates secure data A, it is local to protect There is a secure data A, secure data A is encrypted, encryption key and decryption are generated according to predetermined encryption rule Key is encrypted secure data A using encryption key to obtain encryption safe data A, by the encryption safe data A and mark Know information A and is sent to other block chain nodes, it is by each block chain node that the encryption safe data A and identification information A deposits is each In self-corresponding block chain database.When needing data A safe to use, corresponded to from this block chain link point according to identification information A Block chain database in obtain encryption safe data A, encryption safe data A is decrypted to obtain safety using decruption key Certainly without distorting, the secure data A obtained by the decryption can be tested by data A, the secure data A which obtains The secure data A whether the secure data A that card locally preserves is tampered and is obtained based on the decryption can be to Internet of things system Execute corresponding operating.
Alternatively, for another example after Internet of things system generates secure data A, a secure data A is locally preserved, it is right Secure data A is encrypted, and predetermined encryption rule is hash algorithm, such as MD5 algorithms, SHA256 algorithms, national secret algorithm, profit The cryptographic Hash that secure data A is calculated with hash algorithm, other blocks are sent to by the cryptographic Hash of secure data A and identification information A The cryptographic Hash of secure data A and identification information A are stored in corresponding block chain database by chain node by each block chain node In.When needing data A safe to use, obtained from the corresponding block chain database of this block chain link point according to identification information A Whether the cryptographic Hash of secure data A, the secure data locally preserved by the cryptographic Hash verification of acquired secure data A are usurped Change, it, can be to Internet of Things system based on the secure data A locally preserved when determining that the secure data A locally preserved is not tampered with System executes corresponding operation.
By above-described embodiment, in the safe number for ensureing Internet of things system using the multi-party supervision characteristic of block chain database While according to not being tampered, also by the secure data to Internet of things system be encrypted in the way of ensure that deposit block chain number According to the privacy of the secure data of the Internet of things system in library.
In order to further ensure the authenticity of the secure data in deposit block chain database, in the implementation of the present invention In example, digital signature is increased in secure data by asymmetrical cryptographic method, specifically, method shown in Fig. 2 further includes:It is raw The public key and private key of cost block chain node;Before the secure data of Internet of things system to be sent to other block chain nodes, Based on the secure data and the private key, digital signature is generated.The secure data of Internet of things system is sent to by step S201 Other block chain nodes include:Together by the secure data, the corresponding digital signature of the secure data and the public key Other block chain nodes are sent to, so that each block chain node is based on safe number described in the digital signature and the public key verifications According to will be preserved into corresponding block chain database by the secure data of verification.
Specifically, above-mentioned to be based on the secure data and the private key, generating digital signature includes:To by the safe number Hash calculation is carried out according to the character string formed with the private key, obtains digital signature;Then by digital signature, public key and safe number It is sent to each block chain node according to correspondence, judges secure data using corresponding public key and digital signature by each block chain node Whether source is reliable, whether midway is tampered, if out of question can just be stored into block chain database.Can also be to count The character string of the cryptographic Hash for calculating secure data, cryptographic Hash and private key composition to secure data carries out Hash calculation again, obtains Digital signature;Then the cryptographic Hash correspondence of digital signature, public key and secure data is sent to each block chain node, by each block Chain node judges whether the source of the cryptographic Hash of secure data is reliable, whether midway is usurped using corresponding public key and digital signature Change, if out of question can just be stored into block chain database.Can also be that secure data is encrypted to obtain encryption peace Total evidence, the character string formed to encryption safe data and private key carry out Hash calculation, obtain digital signature again;Then it will count Word signature, public key and encryption safe data correspondence are sent to each block chain node, and corresponding public key is utilized by each block chain node Judge whether the source of encryption safe data is reliable, whether midway is tampered with digital signature, if out of question can just be deposited Enter in block chain database.
In current Internet of things system, gateway device plays the part of very important role, the gateway as Internet of things system Equipment, the protocol conversion between sensing network and communication network and different type sensing network may be implemented in it, both can be real Existing wide area interconnection, can also realize Interconnected, and the gateway device of Internet of things system can also have equipment Management Function in addition, Each perception Internet of things node that bottom can be managed by gateway device, understands the relevant information of each Internet of things node, and realize Remote control, further, the gateway device of Internet of things system can have distinctive Internet of Things edge calculations ability, realize object More fast and accurate data acquisition and transmission in networking.It therefore, in one embodiment of the invention, can be by Internet of Things The gateway device of system executes above-mentioned steps S201-S202 as this block chain link point, alternatively, this block chain link point and Internet of Things The gateway device of system interacts, and obtains the secure data of Internet of things system from the gateway device of Internet of things system and then executes Above-mentioned steps S201-S202, then the secure data of above-mentioned Internet of things system include:The safety rule of the gateway device of Internet of things system Then and/or operation log.The secure data of Internet of things system is sent to other block chain nodes by step S201:Work as Internet of Things When the safety regulation of the gateway device of net system is set, the safety regulation that setting obtains is sent to other block chain nodes, It is stored in corresponding block chain database by the safety regulation that each block chain node obtains the setting;And/or when When generating operation log in the gateway device of Internet of things system, the operation log of generation is sent to other block chain nodes, by The operation log is stored in corresponding block chain database by each block chain node.
Specifically, the safety regulation of the gateway device of Internet of things system refer to Internet of things system gateway device in stored Safety regulation it is whole, safety regulation is made of one or more sub-rule.The safety of the gateway device of Internet of things system It may include following one or more situations that rule, which is set,:Increase by one or more new cuckoo in existing safety regulation Then, one or more sub-rule is deleted from existing safety regulation, to one or more cuckoo in existing safety regulation Then modify.After the safety regulation of the gateway device to Internet of things system is configured, one after being arranged Or a plurality of sub-rule, this one or more sub-rule constitute the safety regulation that setting obtains.Whenever the gateway of Internet of things system is set When standby safety regulation changes, the safety regulation in the gateway device is just deposited into block chain data as a whole In library.The gateway device of Internet of things system can generate corresponding operation log when executing operation, whenever the net of Internet of things system It closes equipment and generates an operation log, just the operation log is deposited into block chain database.As it can be seen that through this embodiment, History in the gateway device for having Internet of things system is recorded in block chain database, and obtained safety regulation and history is set every time The operation log generated every time.
Wherein, the gateway device of Internet of things system has the function of at least one of following:Local prison is carried out to Internet of things system The function of survey carries out Internet of things system the function of procotol conversion, and the function of edge calculations is carried out to Internet of things system.
In current Internet of things system, the Internet of things system of a local is connected to internet by gateway device.It is whole The safety of a Internet of things system is monitored by gateway device, and common security monitoring mode is:Gateway device has been locally located Safety regulation, gateway device locally records the corresponding operation log of operation occurred in Internet of things system, when in Internet of things system When certain operation occurs, judge whether the operation is legal by safety regulation, if not, being reported to the operation personnel of Internet of things system Alert, operation personnel is made corresponding by checking that operation log positions the illegal operation occurred in Internet of things system Processing.For example, a gateway device is to running the behaviour of access device in the operation of application, Internet of things system in Internet of things system Work etc. is monitored, and gateway device locally prestores the white list or blacklist work that the operation personnel of Internet of things system pre-defines For safety regulation, when gateway device finds that the application not defined in white list will run in Internet of things system or not exist When equipment defined in white list will be connected into Internet of things system, in time to operation personnel's early warning, or when gateway device discovery is black Application defined in list to be run in Internet of things system or blacklist defined in equipment want operation or access Internet of Things When net system, according to default rule, gateway device forbids it or is sent out alarm so that operation personnel is according to operation The event occurred in daily record makes corresponding processing for different situations in time.Such scheme problem encountered is:Gateway is set The standby safety regulation being locally stored can maliciously be reset, and the operation log of gateway device local record can also be disliked Meaning ground increases, is deleted or modified, all incredible in safety regulation and/or operation rules, to the peace of Internet of things system Full monitoring also becomes meaningless.
And scheme provided by the present invention can effectively solve the problem that the above problem, by Internet of things system in the embodiment of the present invention Gateway device in safety regulation and operation log be stored in block chain database, and for safety regulation every time setting It sets, the either setting of operation personnel is still maliciously arranged, and the safety regulation that setting obtains is stored in block chain data In library, each generation for operation log, the either operation log of valid operation or the operation log of illegal operation, The operation log of generation is stored in block chain database, spy can not be distorted due to the data in block chain database The each safety regulation of history of property, the gateway device recorded in block chain database can reflect the institute that safety regulation is undergone There are setting, the operation log recorded in block chain database that can reflect all operations that Internet of things system is undergone, in turn Secure data based on the Internet of things system recorded in block chain database can make Internet of things system correct operation.
Specifically, in one embodiment of the invention, when operation personnel's initial setting up gateway device of Internet of things system Safety regulation when, the safety regulation of the initial setting up is sent to other block chain nodes, is passed through by other block chain nodes The safety regulation of the initial setting up is stored in corresponding block chain database by common recognition verification.Above-mentioned steps S202 is from local area One or more secure data of the Internet of things system is obtained in the corresponding block chain database of block chain node, based on acquired Secure data to the Internet of things system execute corresponding operating include:From the corresponding block chain database of this block chain link point Obtain the safety regulation of the gateway device initial setting up;Judge the safety regulation of the gateway device local and acquired peace Whether full rule is consistent;Be that the safety regulation of the determining gateway device local is not tampered with so that the gateway device according to Corresponding operating is executed to the Internet of things system according to local safety regulation;Otherwise the local safety rule of the gateway device are determined It is then tampered, so that the gateway device executes corresponding operating according to acquired safety regulation to the Internet of things system.
The present embodiment is suitable for Internet of things system, and the safety regulation of gateway device keeps initially setting under normal operating conditions The constant situation of the safety regulation set under normal circumstances, the net is only recorded in block chain database for a gateway device A The safety regulation for closing the corresponding initial setting up of device A, when the safety regulation that gateway device A is locally preserved and block chain data When the safety regulation of the corresponding initial setting up of gateway device A recorded in library differs, illustrate the peace that gateway device A is locally preserved Full rule is no longer the safety regulation of operation personnel's initial setting up, i.e., the safety regulation of the locals gateway device A is usurped by malice Change, further, compares A pairs of the gateway device recorded in the safety regulation and block chain database that gateway device A is locally preserved Difference between the safety regulation for the initial setting up answered distorts which portion specifically distorted by malice known to the difference of the two Point, you can to show that malice distorts corresponding malicious act, these malicious acts can be forbidden and be taken precautions against.
In another embodiment of the present invention, when the gateway device of Internet of things system often generates an operation log, Just the operation log of generation is issued into other block chain nodes so that the operation log is stored in corresponding by other block chains In block chain database, wherein having recorded temporal information, mode of operation and operation object in every operation log.Above-mentioned steps S202 obtains one or more secure data of the Internet of things system from the corresponding block chain database of this block chain link point, Executing corresponding operating to the Internet of things system based on acquired secure data includes:According to the temporal information of operation log from Operation log of the gateway device in preceding preset time period is obtained in the corresponding block chain database of this block chain link point;Sentence Whether the operation log and acquired operation log in the preceding preset time period of the disconnected gateway device local are consistent;It is then true Operation log in the preceding preset time period of the fixed gateway device local is not tampered with, so that the gateway device is according to local Operation log to Internet of things system execute corresponding operating;Otherwise the behaviour before the determining gateway device local in preset time period It is tampered as daily record, so that the gateway device executes corresponding operating according to acquired operation log to Internet of things system.
More specifically, the operation log of gateway device is:Modify, add to safety regulation, delete at least one The operation log of item operation.Every operation log includes:Operating time, mode of operation and operation object, wherein operating time are Refer to and operate the corresponding time, mode of operation includes modification, addition and/or deletes, and operation object refers to the corresponding safety rule of operation Then content.When the safety regulation in gateway device is by modification, addition and/or deletes, no matter the operation is legal or dislikes Meaning, the corresponding operation log of the operation is stored in by multiple block chain nodes in block chain database.Above-mentioned steps S202 obtains one or more secure data of the Internet of things system from the corresponding block chain database of this block chain link point, Executing corresponding operating to the Internet of things system based on acquired secure data includes:From the corresponding block of this block chain link point The operation log of the gateway device is obtained in chain database;Judge the operation log of the gateway device local with it is acquired Whether operation log is consistent;It is that the safety regulation and operation log of the determining gateway device local are not tampered with, so that institute It states gateway device and corresponding operating is executed to Internet of things system according to local safety regulation;Otherwise determine that the gateway device is local Safety regulation and operation log be tampered, distorted according to the difference of local operation log and acquired operation log Preceding safety regulation, so that the gateway device executes corresponding operating according to the safety regulation before distorting to Internet of things system.
In the above embodiments, the secure data of Internet of things system is sent to other block chain nodes, so that each area Block chain node preserves the secure data to corresponding block chain database:By the secure data and described The identification information of gateway device is sent to other block chain nodes together, so that each block chain node is by the secure data and institute The identification information for stating gateway device corresponds in preservation to corresponding block chain database;From the corresponding area of this block chain link point One or more secure data of the Internet of things system is obtained in block chain database, including:According to the mark of the gateway device Know information to search from the corresponding block chain database of this block chain link point and read corresponding one or more secure data.
Fig. 3 diagrammatically illustrates the stream of the method for the block chain node according to another embodiment of the present invention as recipient Cheng Tu illustrates this method from the angle of the block chain node for the secure data for receiving Internet of things system, can specifically include as Lower step:
Step S301 receives the secure data for the Internet of things system that other block chain nodes are sent out.
Step S302 verifies secure data with other each block chain nodes, will be protected by the secure data of verification It deposits into corresponding block chain database.
Since block chain technology (blockchain) records all data using distributed account book, maximum feature is to go through Records of the Historian record can not distort, i.e., data are once recorded on chain, by persistence.Block chain technology uses the distribution of decentralization System.The equipment of wherein each operation block chain is an independent server, saves a independent account book.Account book In data ensure that historical data can not be tampered using block chain structure.As it can be seen that method shown in Fig. 3 utilizes block chain number According to the characteristic that the data in library can not distort, the secure data that Internet of things system generates is stored in block chain database, is made Obtaining the secure data that Internet of things system generates can faithfully be recorded to reflect the actual motion state of Internet of things system, When needed corresponding secure data is obtained from block chain database.The reality to Internet of things system is realized by this programme Operating condition is recalled, and the safety of Internet of things system can be more effectively protected.
In current Internet of things system, gateway device plays the part of very important role, the gateway as Internet of things system Equipment, the protocol conversion between sensing network and communication network and different type sensing network may be implemented in it, both can be real Existing wide area interconnection, can also realize Interconnected, and the gateway device of Internet of things system can also have equipment Management Function in addition, Each perception Internet of things node that bottom can be managed by gateway device, understands the relevant information of each Internet of things node, and realize Remote control, further, the gateway device of Internet of things system can have distinctive Internet of Things edge calculations ability, realize object More fast and accurate data acquisition and transmission in networking.Therefore, in one embodiment of the invention, what is received comes from The secure data of the Internet of things system of other block chain nodes includes:The safety regulation of the gateway device of Internet of things system and/or Operation log.When the safety regulation of the gateway device of Internet of things system is set, receive what corresponding block chain node was sent Obtained safety regulation is set, secure data is verified with other each block chain nodes, the secure data of verification will be passed through It preserves into corresponding block chain database;And/or when generating operation log in the gateway device of Internet of things system When, the operation log of generation is sent to other block chain nodes, it is by each block chain node that operation log deposit is respectively right In the block chain database answered.
As it can be seen that in the embodiment of the present invention by the gateway device of Internet of things system safety regulation and operation log store In block chain database, and for each setting of safety regulation, the either setting of operation personnel is still maliciously arranged, The safety regulation that setting obtains is stored in block chain database, each generation for operation log is either legal The operation log of generation is stored in block chain database by the operation log of operation or the operation log of illegal operation In, due to the characteristic that can not distort of the data in block chain database, gateway device recorded in block chain database is gone through The each safety regulation of history can reflect all settings that safety regulation is undergone, the operation log recorded in block chain database It can reflect all operations that Internet of things system is undergone, and then based on the peace of the Internet of things system recorded in block chain database Total evidence can make Internet of things system correct operation.
In one embodiment of the invention, when the safety of the Internet of things system from other block chain nodes received Data include:When the safety regulation and/or operation log of the gateway device of Internet of things system, above-mentioned steps S301 receives other areas The secure data of Internet of things system that block chain node is sent further includes:Receive the corresponding gateway device of the secure data Identification information.Above-mentioned steps S302 verifies the secure data with other each block chain nodes, will pass through the institute of verification It states secure data and preserves to corresponding block chain database and include:With other each block chain nodes to the secure data It is verified, will be preserved to respectively right by the identification information of the secure data of verification gateway device corresponding with the safety equipment In the block chain database answered.It, can be according to gateway device in this way when needing to obtain secure data from block chain database Identification information find corresponding secure data.
In one embodiment of the invention, when the safety of the Internet of things system from other block chain nodes received Data include:When the safety regulation and/or operation log of the gateway device of Internet of things system, this block chain link point can also be object The gateway device of networked system.That is, one or more of block chain network block chain node in the present embodiment To be the gateway device of Internet of things system, to pass through the safety of block chain technical maintenance one or more Internet of things system.And When multiple block chain nodes are the gateway devices of Internet of things system, it is equivalent to multiple gateway devices and maintains block link network jointly Network, the demand of the common Internet of things system security monitoring according to gateway device and reach the common recognitions of multiple block chain nodes, altogether With the safety for safeguarding each Internet of things system.Alternatively, when block chain node is not the gateway device of Internet of things system, can also be The block chain node can be interacted with gateway device, can also equally utilize the peace of block chain technical maintenance Internet of things system Entirely.
Wherein, the gateway device of Internet of things system is at least one of following:Local monitoring is carried out to Internet of things system, it is right Internet of things system carries out procotol conversion, and edge calculations are carried out to Internet of things system.
In one embodiment of the invention, the secure data received is according to the encrypted safety of predetermined encryption rule Data.The present embodiment can execute in the following way:For example, after Internet of things system generates secure data A, locally preserve A secure data A, is encrypted secure data A, and encryption key and decruption key are generated according to predetermined encryption rule, Secure data A is encrypted using encryption key to obtain encryption safe data A.Receive what corresponding block chain node was sent Encryption safe data A and identification information A, by after knowing together and verifying, by each block chain node by the encryption safe data A and mark Know information A to be stored in corresponding block chain database.When corresponding block chain node needs data A safe to use, root Encryption safe data A is obtained from its corresponding block chain database according to identification information A, using decruption key to encryption safe number It is decrypted to obtain secure data A according to A, the secure data A which obtains is certainly without distorting, by the decryption To secure data A can verify the safe number whether the secure data A locally preserved be tampered and obtained based on the decryption According to A corresponding operating can be executed to Internet of things system.
Alternatively, for another example after Internet of things system generates secure data A, a secure data A is locally preserved, it is right Secure data A is encrypted, and predetermined encryption rule is hash algorithm, such as MD5 algorithms, SHA256 algorithms, national secret algorithm, profit The cryptographic Hash of secure data A is calculated with hash algorithm.Receive the secure data A that corresponding block chain node is sent cryptographic Hash and The cryptographic Hash of secure data A and identification information A are stored in corresponding block chain number by identification information A by each block chain node According in library.When corresponding block chain node needs data A safe to use, according to identification information A from its corresponding block chain number According to the cryptographic Hash for obtaining secure data A in library, the safe number locally preserved is verified by the cryptographic Hash of acquired secure data A It, can be with based on the secure data A locally preserved when determining that the secure data A locally preserved is not tampered with according to whether being tampered Corresponding operation is executed to Internet of things system.
By above-described embodiment, in the safe number for ensureing Internet of things system using the multi-party supervision characteristic of block chain database While according to not being tampered, also by the secure data to Internet of things system be encrypted in the way of ensure that deposit block chain number According to the privacy of the secure data of the Internet of things system in library.
In one embodiment of the invention, above-mentioned steps S301 receives the Internet of things system that other block chain nodes are sent out Secure data further include:It receives the corresponding digital signature of the secure data and sends out the block chain node of the secure data Public key;The corresponding digital signature of wherein described secure data is based on the secure data and the area for sending out the secure data What the private key of block chain node generated.Above-mentioned steps S302 verifies the secure data with other each block chain nodes, will It is preserved to corresponding block chain database by the secure data of verification and includes:Number based on the secure data Word signs and sends out secure data described in the public key verifications of the secure data, will be preserved to respective by the secure data of verification In corresponding block chain database.
Specifically, the above-mentioned process based on the secure data and private key generation digital signature can be to by described The character string of secure data and private key composition carries out Hash calculation and obtains digital signature.It is receiving digital signature, public affairs After key and secure data, based on corresponding public key and digital signature come judge whether the source of secure data reliable, midway whether It is tampered, is verified if there is no problem.Can also be the cryptographic Hash for calculating secure data, to the Hash of secure data Value and the character string of private key composition carry out Hash calculation and obtain digital signature again.Receiving digital signature, public key and safety After the cryptographic Hash of data, based on corresponding public key and digital signature come judge whether the source of secure data reliable, midway whether It is tampered, is verified if there is no problem..Can also be that secure data is encrypted to obtain encryption safe data, it is right Encryption safe data and the character string of private key composition carry out Hash calculation and obtain digital signature again.Receive digital signature, After public key and encryption safe data, based on corresponding public key and digital signature come judge whether the source of secure data reliable, in Whether way is tampered, and is verified if there is no problem.
Fig. 4 A diagrammatically illustrate it is according to the ... of the embodiment of the present invention include the block chain node as sender device Block diagram.
As shown in Figure 4 A, which includes:Sending module 401 and security module 402.
Sending module 401, for the secure data of Internet of things system to be sent to other block chain nodes, so that each block Chain node preserves the secure data into corresponding block chain database.
Security module 402, for obtaining the Internet of things system from the corresponding block chain database of this block chain link point One or more secure data, based on acquired secure data to the Internet of things system execute corresponding operating.
In one embodiment of the invention, the secure data of Internet of things system includes:The gateway device of Internet of things system Safety regulation and/or operation log.Sending module 401, the safety regulation for the gateway device when Internet of things system are set When setting, the safety regulation that setting obtains is sent to other block chain nodes, the safety regulation includes one or more son Rule;And/or when generating operation log in the gateway device of Internet of things system, the operation log of generation is sent to Other block chain nodes.
In one embodiment of the invention, security module 402 are used for from the corresponding block chain data of this block chain link point The safety regulation of the gateway device initial setting up is obtained in library;Judge the safety regulation of the gateway device local with it is acquired Safety regulation it is whether consistent;It is that the safety regulation of the determining gateway device local is not tampered with, so that the gateway is set It is standby that corresponding operating is executed to the Internet of things system according to local safety regulation;Otherwise the peace of the gateway device local is determined Full rule is tampered, so that the gateway device executes corresponding behaviour according to acquired safety regulation to the Internet of things system Make.
In one embodiment of the invention, security module 402 are used for from the corresponding block chain data of this block chain link point Operation log of the gateway device in preceding preset time period is obtained in library;When judging local preceding default of the gateway device Between operation log in section and acquired operation log it is whether consistent;Be then the determining gateway device local preceding default when Between operation log in section be not tampered with so that the gateway device executes phase according to local operation log to Internet of things system It should operate;Otherwise the operation log before the determining gateway device local in preset time period is tampered, so that the gateway is set It is standby that corresponding operating is executed to Internet of things system according to acquired operation log.
In one embodiment of the invention, the operation log of gateway device is:Modify, add to safety regulation, The operation log of at least one of deletion operation.Security module 402 is used for from the corresponding block chain database of this block chain link point The middle operation log for obtaining the gateway device;Judge the operation log of the gateway device local and acquired operation log It is whether consistent;It is that the safety regulation and operation log of the determining gateway device local are not tampered with, so that the gateway is set It is standby that corresponding operating is executed to Internet of things system according to local safety regulation;Otherwise the local safety rule of the gateway device are determined It is then tampered with operation log, the safety before being distorted according to the difference of local operation log and acquired operation log Rule, so that the gateway device executes corresponding operating according to the safety regulation before distorting to Internet of things system.
In one embodiment of the invention, sending module 401 are additionally operable to the secure data and the gateway device Identification information be sent to other block chain nodes together so that each block chain node sets the secure data and the gateway Standby identification information, which corresponds to, to be preserved into corresponding block chain database.Security module 402, for being set according to the gateway Standby identification information is searched from the corresponding block chain database of this block chain link point and reads corresponding one or more safety Data.
In one embodiment of the invention, this block chain link point includes:The gateway device of Internet of things system.
In one embodiment of the invention, the gateway device of Internet of things system is at least one of following:To Internet of Things System carries out local monitoring, and procotol conversion is carried out to Internet of things system, and edge calculations are carried out to Internet of things system.
Fig. 4 B diagrammatically illustrate it is according to another embodiment of the present invention include the block chain node as sender dress The block diagram set.
As shown in Figure 4 B, which includes:Sending module 401, security module 402, encryption Module 403 and signature blocks 404.
Explanation above was carried out to sending module 401 and security module 402, the part repeated repeats no more.
Encrypting module 403 obtains encryption safe number for the secure data to be encrypted according to predetermined encryption rule According to.
Sending module 401, for the encryption safe data to be sent to other block chain nodes, so that each block chain link Point preserves the encryption safe data into corresponding block chain database.
Signature blocks 404, for generating public key and private key;The secure data of Internet of things system is being sent to other blocks Before chain node, it is based on the secure data and the private key, generates digital signature.
Sending module 401 is used for the secure data, the corresponding digital signature of the secure data and the public key It is sent to other block chain nodes together, so that each block chain node is based on pacifying described in the digital signature and the public key verifications Total evidence will be preserved by the secure data of verification into corresponding block chain database.
In one embodiment of the invention, signature blocks 404, for the character string to being made of secure data and private key Hash calculation is carried out, digital signature is obtained.
In other embodiments of the invention, the device for being used for block chain node can only include sending module 401, safety Module 402 and encrypting module 403, alternatively, the device for block chain node can only include sending module 401, security module 402 and signature blocks 404, corresponding function hereinbefore by the agency of repeats no more.
Fig. 4 C diagrammatically illustrate it is according to another embodiment of the present invention include the block chain node as recipient dress The block diagram set.As shown in Figure 4 C, which includes:It receiving module 405, authentication module 406 and deposits Store up module 407.
Receiving module 405, the secure data for receiving the Internet of things system that other block chain nodes are sent out.
Authentication module 406, for being verified to the secure data with other each block chain nodes.
Memory module 407, for will be preserved to corresponding block chain database by the secure data of verification In.
In one embodiment of the invention, the secure data of Internet of things system includes:The gateway device of Internet of things system Safety regulation and/or operation log.
In one embodiment of the invention, the secure data received is according to the encrypted safety of predetermined encryption rule Data.
In one embodiment of the invention, receiving module 405 are additionally operable to receive the corresponding number of the secure data together The public key of the block chain node of the secure data is signed and sent out to word;The corresponding digital signature of wherein described secure data is base It is generated in the private key of the secure data and the block chain node for sending out the secure data.Authentication module 406, for being based on Secure data described in the digital signature and the public key verifications.
In one embodiment of the invention, receiving module 405 are additionally operable to receive the corresponding institute of the secure data together State the identification information of gateway device;Memory module 407 is used for the secure data by verification and the secure data pair The identification information for the gateway device answered is preserved into corresponding block chain database.
In one embodiment of the invention, this block chain link point includes:The gateway device of Internet of things system.
In one embodiment of the invention, the gateway device of Internet of things system is at least one of following:To Internet of Things System carries out local monitoring, and procotol conversion is carried out to Internet of things system, and edge calculations are carried out to Internet of things system.
It should be noted that in device section Example each module/unit/subelement etc. embodiment, the skill of solution Art problem, the function of realization and the technique effect that reaches respectively with the implementation of each corresponding step in method section Example Mode, the technical issues of solving, the function of realization and the technique effect that reaches are same or like, and details are not described herein.
It is any number of or in which arbitrary more in module according to an embodiment of the invention, submodule, unit, subelement A at least partly function can be realized in a module.Module according to the ... of the embodiment of the present invention, submodule, unit, son are single Any one or more in member can be split into multiple modules to realize.Module according to the ... of the embodiment of the present invention, submodule, Any one or more in unit, subelement can at least be implemented partly as hardware circuit, such as field programmable gate Array (FPGA), programmable logic array (PLA), system on chip, the system on substrate, the system in encapsulation, special integrated electricity Road (ASIC), or can be by the hardware or firmware for any other rational method for circuit integrate or encapsulate come real Show, or with any one in three kinds of software, hardware and firmware realization methods or with wherein arbitrary several appropriately combined next reality It is existing.Alternatively, one or more of module according to the ... of the embodiment of the present invention, submodule, unit, subelement can be at least by parts Ground is embodied as computer program module, when the computer program module is run, can execute corresponding function.
For example, any number of in sending module 401, security module 402, encrypting module 403 and signature blocks 404 can be with Merging is realized in a module or any one module therein can be split into multiple modules.Alternatively, these modules One or more of at least partly function of module can be combined at least partly function of other modules, and in a mould It is realized in block.According to an embodiment of the invention, sending module 401, security module 402, encrypting module 403 and signature blocks 404 At least one of can at least be implemented partly as hardware circuit, such as it is field programmable gate array (FPGA), programmable Logic array (PLA), system on chip, the system on substrate, the system in encapsulation, application-specific integrated circuit (ASIC), or can lead to Cross and the hardware such as any other rational method that is integrated or encapsulating or firmware carried out to realize to circuit, or with software, hardware with And it any one in three kinds of realization methods of firmware or several appropriately combined is realized with wherein arbitrary.Alternatively, sending module 401, at least one of security module 402, encrypting module 403 and signature blocks 404 can at least be implemented partly as counting Calculation machine program module can execute corresponding function when the computer program module is run.
For another example any number of in receiving module 405, authentication module 406 and memory module 407 may be incorporated in one It is realized in module or any one module therein can be split into multiple modules.Alternatively, these moulds it is in the block one or At least partly function of multiple modules can be combined at least partly function of other modules, and be realized in a module. According to an embodiment of the invention, at least one of receiving module 405, authentication module 406 and memory module 407 can at least by Be implemented partly as hardware circuit, for example, field programmable gate array (FPGA), programmable logic array (PLA), system on chip, The system in system, encapsulation, application-specific integrated circuit (ASIC) on substrate, or can be by carrying out integrated to circuit or encapsulating The hardware such as any other rational method or firmware realize, or with arbitrary in three kinds of software, hardware and firmware realization methods It is a kind of or several appropriately combined realized with wherein arbitrary.Alternatively, receiving module 405, authentication module 406 and memory module At least one of 407 can at least be implemented partly as computer program module, when the computer program module is run When, corresponding function can be executed.
Fig. 5 diagrammatically illustrates the computer according to the ... of the embodiment of the present invention for being adapted for carrying out the method for block chain node System block diagram in equipment.Computer system shown in Fig. 5 is only an example, should not be to the function of the embodiment of the present invention Any restrictions are brought with use scope.
As shown in figure 5, computer system 500 according to the ... of the embodiment of the present invention includes processor 501, it can be according to storage Program in read-only memory (ROM) 502 is loaded into from storage section 508 in random access storage device (RAM) 503 Program and execute various actions appropriate and processing.Processor 501 for example may include general purpose microprocessor (such as CPU), refer to Enable set processor and/or related chip group and/or special microprocessor (for example, application-specific integrated circuit (ASIC)), etc..Processing Device 501 can also include the onboard storage device for caching purposes.Processor 501 may include for executing according to of the invention real Apply single treatment unit either multiple processing units of the different actions of the method flow of example.
In RAM 503, it is stored with system 500 and operates required various programs and data.Processor 501, ROM 502 with And RAM 503 is connected with each other by bus 504.Processor 501 is held by executing the program in ROM 502 and/or RAM 503 The various operations of capable flow according to the method for the embodiment of the present invention.It is noted that described program can also be stored in except ROM 502 In one or more memories other than RAM 503.Processor 501 can also be stored in one or more of by execution Program in memory executes the various operations of flow according to the method for the embodiment of the present invention.
According to an embodiment of the invention, system 500 can also include input/output (I/O) interface 505, input/output (I/O) interface 505 is also connected to bus 504.System 500 can also include be connected to I/O interfaces 505 with one in lower component Item is multinomial:Importation 506 including keyboard, mouse etc.;Including such as cathode-ray tube (CRT), liquid crystal display (LCD) Deng and loud speaker etc. output par, c 507;Storage section 508 including hard disk etc.;And including such as LAN card, modulatedemodulate Adjust the communications portion 509 of the network interface card of device etc..Communications portion 509 executes communication process via the network of such as internet. Driver 510 is also according to needing to be connected to I/O interfaces 505.Detachable media 511, such as disk, CD, magneto-optic disk, semiconductor Memory etc. is mounted on driver 510, as needed in order to be pacified as needed from the computer program read thereon It is packed into storage section 508.
According to an embodiment of the invention, flow may be implemented as computer software journey according to the method for the embodiment of the present invention Sequence.For example, the embodiment of the present invention includes a kind of computer program product comprising carry meter on a computer-readable medium Calculation machine program, the computer program include the program code for method shown in execution flow chart.In such embodiments, The computer program can be downloaded and installed by communications portion 509 from network, and/or be pacified from detachable media 511 Dress.When the computer program is executed by processor 501, the above-mentioned function of being limited in the system of the embodiment of the present invention is executed.Root According to the embodiment of the present invention, system as described above, unit, module, unit etc. can by computer program module come It realizes.
The present invention also provides a kind of computer-readable medium, which can be retouched in above-described embodiment Included in the equipment/device/system stated;Can also be individualism, and without be incorporated the equipment/device/system in.On It states computer-readable medium and carries one or more program, when said one or multiple programs are performed, realize:On Block chain common recognition described in each embodiment of text reaches method.
According to an embodiment of the invention, computer-readable medium can be that computer-readable signal media or computer can Storage medium either the two is read arbitrarily to combine.Computer readable storage medium for example can be --- but it is unlimited In --- electricity, system, device or the device of magnetic, optical, electromagnetic, infrared ray or semiconductor, or the arbitrary above combination.It calculates The more specific example of machine readable storage medium storing program for executing can include but is not limited to:Being electrically connected, be portable with one or more conducting wires Formula computer disk, hard disk, random access storage device (RAM), read-only memory (ROM), erasable programmable read only memory (EPROM or flash memory), optical fiber, portable compact disc read-only memory (CD-ROM), light storage device, magnetic memory device or The above-mentioned any appropriate combination of person.In the present invention, can be any include computer readable storage medium or storage program Tangible medium, the program can be commanded execution system, device either device use or it is in connection.And in this hair In bright, computer-readable signal media may include in a base band or as the data-signal that a carrier wave part is propagated, In carry computer-readable program code.Diversified forms may be used in the data-signal of this propagation, including but not limited to Electromagnetic signal, optical signal or above-mentioned any appropriate combination.Computer-readable signal media can also be computer-readable Any computer-readable medium other than storage medium, the computer-readable medium can send, propagate or transmit for by Instruction execution system, device either device use or program in connection.The journey for including on computer-readable medium Sequence code can transmit with any suitable medium, including but not limited to:Wirelessly, wired, optical cable, radiofrequency signal etc., or Above-mentioned any appropriate combination.
For example, according to an embodiment of the invention, computer-readable medium may include above-described ROM 502 and/or One or more memories other than RAM 503 and/or ROM 502 and RAM 503.
Flow chart in attached drawing and block diagram, it is illustrated that according to the system of various embodiments of the invention, method and computer journey The architecture, function and operation in the cards of sequence product.In this regard, each box in flowchart or block diagram can generation A part for a part for one module, program segment, or code of table, above-mentioned module, program segment, or code includes one or more Executable instruction for implementing the specified logical function.It should also be noted that in some implementations as replacements, institute in box The function of mark can also occur in a different order than that indicated in the drawings.For example, two boxes succeedingly indicated are practical On can be basically executed in parallel, they can also be executed in the opposite order sometimes, this is depended on the functions involved.Also it wants It is noted that the combination of each box in block diagram or flow chart and the box in block diagram or flow chart, can use and execute rule The dedicated hardware based systems of fixed functions or operations is realized, or can use the group of specialized hardware and computer instruction It closes to realize.
It will be understood by those skilled in the art that the feature described in each embodiment and/or claim of the present invention can To carry out multiple combinations or/or combination, even if such combination or combination are not expressly recited in the present invention.Particularly, exist In the case of not departing from spirit of that invention and introduction, the feature described in each embodiment of the invention and/or claim can To carry out multiple combinations and/or combination.All these combinations and/or combination each fall within the scope of the present invention.
The embodiment of the present invention is described above.But the purpose that these embodiments are merely to illustrate that, and It is not intended to limit the scope of the invention.Although respectively describing each embodiment above, but it is not intended that each reality Use cannot be advantageously combined by applying the measure in example.The scope of the present invention is defined by the appended.It does not take off From the scope of the present invention, those skilled in the art can make a variety of alternatives and modifications, these alternatives and modifications should all be fallen at this Within the scope of invention.

Claims (7)

1. a kind of includes the device of the block chain node as recipient, which is characterized in that including:
Receiving module, the secure data for receiving the Internet of things system that other block chain nodes are sent out;
Authentication module, for being verified to the secure data with other each block chain nodes;
Memory module, for will be preserved into corresponding block chain database by the secure data of verification.
2. it is according to claim 1 it is a kind of include the block chain node as recipient device, which is characterized in that its In:
The secure data of Internet of things system includes:The safety regulation and/or operation log of the gateway device of Internet of things system.
3. it is according to claim 1 it is a kind of include the block chain node as recipient device, which is characterized in that its In:
The secure data received is according to the encrypted secure data of predetermined encryption rule.
4. it is according to claim 1 it is a kind of include the block chain node as recipient device, which is characterized in that its In:
The receiving module is additionally operable to receive the corresponding digital signature of the secure data together and sends out the secure data The public key of block chain node;The corresponding digital signature of wherein described secure data is based on the secure data and to send out the peace What the private key of the block chain node of total evidence generated;
The authentication module, for based on secure data described in the digital signature and the public key verifications.
5. it is according to claim 2 it is a kind of include the block chain node as recipient device, which is characterized in that its In:
The receiving module is additionally operable to receive the identification information of the corresponding gateway device of the secure data together;
The memory module, for the mark of the secure data and the corresponding gateway device of the secure data of verification will to be passed through Know in information preservation to corresponding block chain database.
6. it is according to claim 2 it is a kind of include the block chain node as recipient device, which is characterized in that its In:
This block chain link point includes:The gateway device of Internet of things system.
7. a kind of according to claim 2 or 6 includes the device of the block chain node as recipient, which is characterized in that Wherein, the gateway device of Internet of things system is at least one of following:Local monitoring is carried out to Internet of things system, to Internet of Things system System carries out procotol conversion, and edge calculations are carried out to Internet of things system.
CN201810437378.6A 2018-05-09 2018-05-09 A kind of includes the device of the block chain node as recipient Pending CN108600262A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810437378.6A CN108600262A (en) 2018-05-09 2018-05-09 A kind of includes the device of the block chain node as recipient

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810437378.6A CN108600262A (en) 2018-05-09 2018-05-09 A kind of includes the device of the block chain node as recipient

Publications (1)

Publication Number Publication Date
CN108600262A true CN108600262A (en) 2018-09-28

Family

ID=63636539

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810437378.6A Pending CN108600262A (en) 2018-05-09 2018-05-09 A kind of includes the device of the block chain node as recipient

Country Status (1)

Country Link
CN (1) CN108600262A (en)

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109358969A (en) * 2018-10-09 2019-02-19 浙江工业大学 A kind of mobile block chain optimization calculation force distribution method under single edge calculations server scene based on linear search
CN109981682A (en) * 2019-04-10 2019-07-05 北京阿尔山区块链联盟科技有限公司 Data verification method, the apparatus and system of internet of things equipment
CN110149308A (en) * 2019-04-03 2019-08-20 特斯联(北京)科技有限公司 A kind of external equipment management method based on network data base, apparatus and system
CN110188079A (en) * 2019-04-03 2019-08-30 特斯联(北京)科技有限公司 A kind of external equipment management method based on distributed storage database
CN110336773A (en) * 2019-04-16 2019-10-15 山东工商学院 Credible safeguards system, verification method and the storage medium of IoT device data
CN110535656A (en) * 2019-07-31 2019-12-03 阿里巴巴集团控股有限公司 Medical data processing method, device, equipment and server
WO2020133148A1 (en) * 2018-12-28 2020-07-02 合肥达朴汇联科技有限公司 Data processing method and apparatus for blockchain, and blockchain system
CN111628868A (en) * 2020-05-26 2020-09-04 腾讯科技(深圳)有限公司 Digital signature generation method and device, computer equipment and storage medium
CN113542081A (en) * 2021-09-16 2021-10-22 深圳市万睿智能科技有限公司 Safe intelligent household control method and system
WO2021218345A1 (en) * 2020-04-29 2021-11-04 深圳壹账通智能科技有限公司 Blockchain-based data processing method and apparatus, and terminal and storage medium
CN113612758A (en) * 2021-07-29 2021-11-05 石家庄学院 Block chain-based Internet of things data security management system and method
CN113792103A (en) * 2021-09-17 2021-12-14 北京安天网络安全技术有限公司 Management method and device of mobile storage equipment and electronic equipment

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106796524A (en) * 2016-12-27 2017-05-31 深圳前海达闼云端智能科技有限公司 The method of records application program configuration information, device and electronic equipment
CN107592356A (en) * 2017-09-12 2018-01-16 北京众享比特科技有限公司 A kind of Internet of Things data processing method, apparatus and system
WO2018024061A1 (en) * 2016-08-02 2018-02-08 华为技术有限公司 Method, device and system for licensing shared digital content
CN107862215A (en) * 2017-09-29 2018-03-30 阿里巴巴集团控股有限公司 A kind of date storage method, data query method and device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018024061A1 (en) * 2016-08-02 2018-02-08 华为技术有限公司 Method, device and system for licensing shared digital content
CN106796524A (en) * 2016-12-27 2017-05-31 深圳前海达闼云端智能科技有限公司 The method of records application program configuration information, device and electronic equipment
CN107592356A (en) * 2017-09-12 2018-01-16 北京众享比特科技有限公司 A kind of Internet of Things data processing method, apparatus and system
CN107862215A (en) * 2017-09-29 2018-03-30 阿里巴巴集团控股有限公司 A kind of date storage method, data query method and device

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
袁勇,王飞跃: ""区块链技术发展现状与展望"", 《自动化学报》 *

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109358969B (en) * 2018-10-09 2021-11-23 浙江工业大学 Mobile block chain optimization calculation power distribution method based on linear search under single edge calculation server scene
CN109358969A (en) * 2018-10-09 2019-02-19 浙江工业大学 A kind of mobile block chain optimization calculation force distribution method under single edge calculations server scene based on linear search
US11977537B2 (en) 2018-12-28 2024-05-07 Hefei Dappworks Technology Co., Ltd. Method and device of processing data for blockchain, and blockchain system
WO2020133148A1 (en) * 2018-12-28 2020-07-02 合肥达朴汇联科技有限公司 Data processing method and apparatus for blockchain, and blockchain system
CN110149308A (en) * 2019-04-03 2019-08-20 特斯联(北京)科技有限公司 A kind of external equipment management method based on network data base, apparatus and system
CN110188079A (en) * 2019-04-03 2019-08-30 特斯联(北京)科技有限公司 A kind of external equipment management method based on distributed storage database
CN109981682A (en) * 2019-04-10 2019-07-05 北京阿尔山区块链联盟科技有限公司 Data verification method, the apparatus and system of internet of things equipment
CN109981682B (en) * 2019-04-10 2022-07-01 北京阿尔山区块链联盟科技有限公司 Data verification method, device and system for Internet of things equipment
CN110336773A (en) * 2019-04-16 2019-10-15 山东工商学院 Credible safeguards system, verification method and the storage medium of IoT device data
CN110336773B (en) * 2019-04-16 2021-09-03 山东工商学院 Credibility guaranteeing system, verification method and storage medium of IoT (Internet of things) equipment data
CN110535656A (en) * 2019-07-31 2019-12-03 阿里巴巴集团控股有限公司 Medical data processing method, device, equipment and server
WO2021218345A1 (en) * 2020-04-29 2021-11-04 深圳壹账通智能科技有限公司 Blockchain-based data processing method and apparatus, and terminal and storage medium
CN111628868A (en) * 2020-05-26 2020-09-04 腾讯科技(深圳)有限公司 Digital signature generation method and device, computer equipment and storage medium
CN113612758A (en) * 2021-07-29 2021-11-05 石家庄学院 Block chain-based Internet of things data security management system and method
CN113542081A (en) * 2021-09-16 2021-10-22 深圳市万睿智能科技有限公司 Safe intelligent household control method and system
CN113792103A (en) * 2021-09-17 2021-12-14 北京安天网络安全技术有限公司 Management method and device of mobile storage equipment and electronic equipment

Similar Documents

Publication Publication Date Title
CN108600262A (en) A kind of includes the device of the block chain node as recipient
CN108737107A (en) A kind of computer equipment including block chain node
CN108632019A (en) A method of the block chain node as recipient
CN108632018A (en) A kind of includes the device of the block chain node as sender
CN108737108A (en) A kind of computer-readable medium including block chain node
Levi et al. Advanced analytics for connected car cybersecurity
US9773112B1 (en) Exploit detection of malware and malware families
US10027689B1 (en) Interactive infection visualization for improved exploit detection and signature generation for malware and malware families
CN106687980B (en) Management program and virtual machine protection
JP6188785B2 (en) Network intrusion detection using decoy encryption key
US11799630B2 (en) Method and device for blockchain nodes
CN108712282A (en) A method of the block chain node as sender
CN107547198A (en) Protect the data in storage device
CN111200575B (en) Machine learning-based identification method for malicious behaviors of information system
CN107612698A (en) A kind of commercial cipher detection method, device and system
US20230370439A1 (en) Network action classification and analysis using widely distributed honeypot sensor nodes
US11715366B2 (en) Systems and methods for alarm processing
CN109308421A (en) A kind of information tamper resistant method, device, server and computer storage medium
US20230362142A1 (en) Network action classification and analysis using widely distributed and selectively attributed sensor nodes and cloud-based processing
Gan et al. Social engineering in the internet of everything
CN112153044A (en) Flow data detection method and related equipment
Ahmed et al. Privacy-preserving deep reinforcement learning in vehicle ad hoc networks
CN114595761A (en) Network data intelligent distribution service system
CN114124453A (en) Network security information processing method and device, electronic equipment and storage medium
US11457020B2 (en) Method for integrity protection in a computer network

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20180928