CN108632019A - A method of the block chain node as recipient - Google Patents
A method of the block chain node as recipient Download PDFInfo
- Publication number
- CN108632019A CN108632019A CN201810438729.5A CN201810438729A CN108632019A CN 108632019 A CN108632019 A CN 108632019A CN 201810438729 A CN201810438729 A CN 201810438729A CN 108632019 A CN108632019 A CN 108632019A
- Authority
- CN
- China
- Prior art keywords
- block chain
- secure data
- internet
- things system
- gateway device
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 44
- 238000012795 verification Methods 0.000 claims abstract description 26
- 238000004364 calculation method Methods 0.000 claims description 17
- 238000012544 monitoring process Methods 0.000 claims description 8
- 230000005540 biological transmission Effects 0.000 claims description 4
- 231100000279 safety data Toxicity 0.000 claims description 2
- 230000008901 benefit Effects 0.000 abstract description 2
- 230000006870 function Effects 0.000 description 24
- 230000015654 memory Effects 0.000 description 13
- 238000010586 diagram Methods 0.000 description 12
- 238000004590 computer program Methods 0.000 description 11
- 238000004422 calculation algorithm Methods 0.000 description 10
- 238000006243 chemical reaction Methods 0.000 description 7
- 230000006854 communication Effects 0.000 description 6
- 238000005516 engineering process Methods 0.000 description 6
- 230000006399 behavior Effects 0.000 description 5
- 238000004891 communication Methods 0.000 description 5
- 238000012545 processing Methods 0.000 description 5
- 230000000694 effects Effects 0.000 description 4
- 239000000203 mixture Substances 0.000 description 4
- 230000004048 modification Effects 0.000 description 4
- 238000012986 modification Methods 0.000 description 4
- 230000008859 change Effects 0.000 description 3
- 238000005538 encapsulation Methods 0.000 description 3
- 230000003287 optical effect Effects 0.000 description 3
- 239000000758 substrate Substances 0.000 description 3
- 241000544061 Cuculus canorus Species 0.000 description 2
- 239000000969 carrier Substances 0.000 description 2
- 230000005611 electricity Effects 0.000 description 2
- 238000012423 maintenance Methods 0.000 description 2
- 230000006855 networking Effects 0.000 description 2
- 230000008447 perception Effects 0.000 description 2
- 239000004065 semiconductor Substances 0.000 description 2
- 230000002123 temporal effect Effects 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000012217 deletion Methods 0.000 description 1
- 230000037430 deletion Effects 0.000 description 1
- 239000006185 dispersion Substances 0.000 description 1
- 230000036541 health Effects 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 239000013307 optical fiber Substances 0.000 description 1
- 230000002688 persistence Effects 0.000 description 1
- 238000004321 preservation Methods 0.000 description 1
- 230000008569 process Effects 0.000 description 1
- 230000001737 promoting effect Effects 0.000 description 1
- 230000000644 propagated effect Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0825—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Medical Informatics (AREA)
- Power Engineering (AREA)
- Computer And Data Communications (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The invention discloses a kind of methods of the block chain node as recipient, secure data including receiving the Internet of things system that other block chain nodes are sent out, the secure data is verified with other each block chain nodes, will be preserved into corresponding block chain database by the secure data of verification.The advantages of invention, is:The characteristic that can not be distorted using the data in block chain database, the secure data that Internet of things system generates is stored in block chain database, the secure data that Internet of things system generates faithfully is recorded to reflect the actual motion state of Internet of things system, corresponding secure data is obtained from block chain database when needed, the operation being consistent with the actual motion state of Internet of things system can be executed to Internet of things system based on acquired secure data.This programme realizes recalling to the practical operation situation of Internet of things system, can more effectively protect the safety of Internet of things system.
Description
Technical field
The present invention relates to Internet technical field more particularly to a kind of methods of block chain node as recipient.
Background technology
Internet of Things is by information carriers such as internet, conventional telecommunications nets, and the multiple general of standalone feature can be exercised by allowing
Logical object realizes the network to interconnect.Internet of Things is by real world digitisation, the information for the dispersion that furthers, the number of unite whole object and object
The application field of word information, Internet of Things includes:Transport and logistics field, health medical treatment field, intelligent environment (family, office, work
Factory) field, individual and social field etc., there is very wide application prospect.
During realizing present inventive concept, inventor has found that at least there are the following problems in the prior art:Internet of Things
Secure data in system is easy to be maliciously tampered so that secure data is insincere, and then can not be based on Internet of things system
Secure data operates Internet of things system accordingly.
Invention content
Present invention solves the technical problem that being the effect for the safety for promoting Internet of things system.
In order to solve the above technical problems, the present invention provides a kind of methods of the block chain node as recipient, including:
The secure data for receiving the Internet of things system that other block chain nodes are sent out, with other each block chain nodes to the secure data
It is verified, will be preserved into corresponding block chain database by the secure data of verification.
Optionally, the secure data of Internet of things system includes:The safety regulation of the gateway device of Internet of things system and/or behaviour
Make daily record.
Optionally, the secure data received is according to the encrypted secure data of predetermined encryption rule.
Optionally, the secure data for receiving the Internet of things system that other block chain nodes are sent out further includes:Receive the peace
Totally according to the public key of corresponding digital signature and the block chain node for sending out the secure data;The wherein described secure data corresponds to
Digital signature be that the private key based on the secure data and the block chain node for sending out the secure data generates.With other
Each block chain node verifies the secure data, will be preserved to corresponding area by the secure data of verification
Block chain database includes:Digital signature based on the secure data and sending out is pacified described in the public key verifications of the secure data
Total evidence will be preserved by the secure data of verification into corresponding block chain database.
Optionally, the secure data of Internet of things system for receiving the transmission of other block chain nodes further includes:Receive the peace
Totally according to the identification information of the corresponding gateway device.The secure data is verified with other each block chain nodes,
Include by being preserved to corresponding block chain database by the secure data of verification:With other each block chain nodes
The secure data is verified, will be believed by the mark of the secure data of verification gateway device corresponding with the safety equipment
Breath is preserved into corresponding block chain database.
Optionally, this block chain link point includes:The gateway device of Internet of things system.
Optionally, the gateway device of Internet of things system is at least one of following:Local monitoring is carried out to Internet of things system,
Procotol conversion is carried out to Internet of things system, edge calculations are carried out to Internet of things system.
Beneficial effects of the present invention:
(1) characteristic that can not be distorted using the data in block chain database, the secure data that Internet of things system is generated
It is stored in block chain database so that the secure data that Internet of things system generates can faithfully be recorded with reflection
The actual motion state of networked system obtains corresponding secure data from block chain database when needed, based on acquired
Secure data can execute the operation that is consistent with the actual motion state of Internet of things system to Internet of things system.This programme is realized
To recalling for the practical operation situation of Internet of things system, the safety of Internet of things system can be more effectively protected.
(2) ensureing what the secure data of Internet of things system was not tampered using the multi-party supervision characteristic of block chain database
Meanwhile also by the secure data to Internet of things system be encrypted in the way of ensure that deposit block chain database in Internet of Things
The privacy of the secure data of net system.
Description of the drawings
By referring to the drawings to the description of the embodiment of the present invention, above-mentioned and other purposes of the invention, feature and
Advantage will be apparent from, in the accompanying drawings:
Fig. 1 diagrammatically illustrates the method and apparatus according to the ... of the embodiment of the present invention that can be applied for block chain node
Exemplary system architecture;
Fig. 2 diagrammatically illustrates the flow of the method for the block chain node according to the ... of the embodiment of the present invention as sender
Figure;
Fig. 3 diagrammatically illustrates the stream of the method for the block chain node according to another embodiment of the present invention as recipient
Cheng Tu;
Fig. 4 A diagrammatically illustrate it is according to the ... of the embodiment of the present invention include the block chain node as sender device
Block diagram;
Fig. 4 B diagrammatically illustrate it is according to another embodiment of the present invention include the block chain node as sender dress
The block diagram set;
Fig. 4 C diagrammatically illustrate it is according to another embodiment of the present invention include the block chain node as recipient dress
The block diagram set;
Fig. 5 diagrammatically illustrates the computer according to the ... of the embodiment of the present invention for being adapted for carrying out the method for block chain node
System block diagram in equipment.
Specific implementation mode
Hereinafter, will be described with reference to the accompanying drawings the embodiment of the present invention.However, it should be understood that these descriptions are only exemplary
, and it is not intended to limit the scope of the present invention.In the following detailed description, it for ease of explaining, elaborates many specific thin
Section is to provide the comprehensive understanding to the embodiment of the present invention.It may be evident, however, that one or more embodiments are not having these specific thin
It can also be carried out in the case of section.In addition, in the following description, descriptions of well-known structures and technologies are omitted, to avoid
Unnecessarily obscure idea of the invention.
Term as used herein is not intended to limit the present invention just for the sake of description specific embodiment.It uses herein
The terms "include", "comprise" etc. show the presence of the feature, step, operation and/or component, but it is not excluded that in the presence of
Or other one or more features of addition, step, operation or component.
There are all terms (including technical and scientific term) as used herein those skilled in the art to be generally understood
Meaning, unless otherwise defined.It should be noted that term used herein should be interpreted that with consistent with the context of this specification
Meaning, without should by idealization or it is excessively mechanical in a manner of explain.
It, in general should be according to this using " in A, B and C etc. at least one " such statement is similar to
Field technology personnel are generally understood the meaning of the statement to make an explanation (for example, " with system at least one in A, B and C "
Should include but not limited to individually with A, individually with B, individually with C, with A and B, with A and C, with B and C, and/or
System etc. with A, B, C).Using " in A, B or C etc. at least one " such statement is similar to, it is general come
Say be generally understood the meaning of the statement to make an explanation (for example, " having in A, B or C at least according to those skilled in the art
One system " should include but not limited to individually with A, individually with B, individually with C, with A and B, with A and C, have
B and C, and/or system etc. with A, B, C).It should also be understood by those skilled in the art that substantially arbitrarily indicating two or more
The adversative conjunction and/or phrase of optional project shall be construed as either in specification, claims or attached drawing
It gives including one of these projects, the possibility of these projects either one or two projects.For example, phrase " A or B " should
It is understood to include the possibility of " A " or " B " or " A and B ".
It is understandable to enable above-mentioned purpose, feature and the advantageous effect of the present invention to become apparent, below in conjunction with the accompanying drawings to this
The specific embodiment of invention is described in detail.
Fig. 1 diagrammatically illustrates the method and apparatus according to the ... of the embodiment of the present invention that can be applied for block chain node
Exemplary system architecture.It should be noted that be only the example for the system architecture that can apply the embodiment of the present invention shown in Fig. 1,
To help skilled in the art to understand the technology contents of the present invention, but it is not meant to that the embodiment of the present invention may not be usable for it
His equipment, system, environment or scene.
As shown in Figure 1, the system architecture of the embodiment shows that an Internet of things system, Internet of things system are to pass through interconnection
The information carriers such as net, conventional telecommunications net allow the multiple common objects that can exercise standalone feature to realize the network to interconnect,
Each node therein correspond to the equipment being connected into Internet of Things, as shown in fig. 1, the equipment can be mobile terminal,
Automobile, household equipment etc. are a variety of.Machine, equipment can be managed concentratedly, controlled by Internet of things system, it can also be to family
Front yard equipment, automobile are remotely controlled and searching position, prevent erroneous judgement stolen etc., realizes similar automation control system, leads to simultaneously
Big data can be gathered by crossing the data of each node in collection Internet of things system, can be designed accordingly based on big data,
Update, prediction, control etc. realize that object is connected with object.
It should be understood that the number of the Internet of things system interior joint shown in Fig. 1 is only schematical.According to realize needs,
The embodiment of the present invention can be applied to random scale, Internet of things system with several destination nodes.
Fig. 2 diagrammatically illustrates the flow of the method for the block chain node according to the ... of the embodiment of the present invention as sender
Figure illustrates this method from the angle of the block chain node for the secure data for sending Internet of things system, can specifically include as follows
Step:
The secure data of Internet of things system is sent to other block chain nodes, so that each block chain node by step S201
The secure data of Internet of things system is preserved into corresponding block chain database.
Step S202 obtains the one or more of Internet of things system from the corresponding block chain database of this block chain link point
Secure data executes corresponding operating based on acquired secure data to Internet of things system.
As it can be seen that the characteristic that method shown in Fig. 2 can not be distorted using the data in block chain database, by Internet of things system
The secure data of generation is stored in block chain database so that the secure data that Internet of things system generates can faithfully be remembered
It records to reflect the actual motion state of Internet of things system, obtains corresponding safe number from block chain database when needed
According to based on acquired secure data the behaviour that is consistent with the actual motion state of Internet of things system can be executed to Internet of things system
Make.This programme realizes recalling to the practical operation situation of Internet of things system, can more effectively protect Internet of things system
Safety.
In one embodiment of the invention, method shown in Fig. 2 further includes:It is sent out by the secure data of Internet of things system
It send to before other block chain nodes, the secure data is encrypted according to predetermined encryption rule, obtains encryption safe number
According to.The secure data of Internet of things system is sent to other block chain nodes by step S201:Encryption safe data are sent
To other block chain nodes, so that each block chain node preserves the encryption safe data to corresponding block chain database
In.
The present embodiment can execute in the following way:For example, after Internet of things system generates secure data A, it is local to protect
There is a secure data A, secure data A is encrypted, encryption key and decryption are generated according to predetermined encryption rule
Key is encrypted secure data A using encryption key to obtain encryption safe data A, by the encryption safe data A and mark
Know information A and is sent to other block chain nodes, it is by each block chain node that the encryption safe data A and identification information A deposits is each
In self-corresponding block chain database.When needing data A safe to use, corresponded to from this block chain link point according to identification information A
Block chain database in obtain encryption safe data A, encryption safe data A is decrypted to obtain safety using decruption key
Certainly without distorting, the secure data A obtained by the decryption can be tested by data A, the secure data A which obtains
The secure data A whether the secure data A that card locally preserves is tampered and is obtained based on the decryption can be to Internet of things system
Execute corresponding operating.
Alternatively, for another example after Internet of things system generates secure data A, a secure data A is locally preserved, it is right
Secure data A is encrypted, and predetermined encryption rule is hash algorithm, such as MD5 algorithms, SHA256 algorithms, national secret algorithm, profit
The cryptographic Hash that secure data A is calculated with hash algorithm, other blocks are sent to by the cryptographic Hash of secure data A and identification information A
The cryptographic Hash of secure data A and identification information A are stored in corresponding block chain database by chain node by each block chain node
In.When needing data A safe to use, obtained from the corresponding block chain database of this block chain link point according to identification information A
Whether the cryptographic Hash of secure data A, the secure data locally preserved by the cryptographic Hash verification of acquired secure data A are usurped
Change, it, can be to Internet of Things system based on the secure data A locally preserved when determining that the secure data A locally preserved is not tampered with
System executes corresponding operation.
By above-described embodiment, in the safe number for ensureing Internet of things system using the multi-party supervision characteristic of block chain database
While according to not being tampered, also by the secure data to Internet of things system be encrypted in the way of ensure that deposit block chain number
According to the privacy of the secure data of the Internet of things system in library.
In order to further ensure the authenticity of the secure data in deposit block chain database, in the implementation of the present invention
In example, digital signature is increased in secure data by asymmetrical cryptographic method, specifically, method shown in Fig. 2 further includes:It is raw
The public key and private key of cost block chain node;Before the secure data of Internet of things system to be sent to other block chain nodes,
Based on the secure data and the private key, digital signature is generated.The secure data of Internet of things system is sent to by step S201
Other block chain nodes include:Together by the secure data, the corresponding digital signature of the secure data and the public key
Other block chain nodes are sent to, so that each block chain node is based on safe number described in the digital signature and the public key verifications
According to will be preserved into corresponding block chain database by the secure data of verification.
Specifically, above-mentioned to be based on the secure data and the private key, generating digital signature includes:To by the safe number
Hash calculation is carried out according to the character string formed with the private key, obtains digital signature;Then by digital signature, public key and safe number
It is sent to each block chain node according to correspondence, judges secure data using corresponding public key and digital signature by each block chain node
Whether source is reliable, whether midway is tampered, if out of question can just be stored into block chain database.Can also be to count
The character string of the cryptographic Hash for calculating secure data, cryptographic Hash and private key composition to secure data carries out Hash calculation again, obtains
Digital signature;Then the cryptographic Hash correspondence of digital signature, public key and secure data is sent to each block chain node, by each block
Chain node judges whether the source of the cryptographic Hash of secure data is reliable, whether midway is usurped using corresponding public key and digital signature
Change, if out of question can just be stored into block chain database.Can also be that secure data is encrypted to obtain encryption peace
Total evidence, the character string formed to encryption safe data and private key carry out Hash calculation, obtain digital signature again;Then it will count
Word signature, public key and encryption safe data correspondence are sent to each block chain node, and corresponding public key is utilized by each block chain node
Judge whether the source of encryption safe data is reliable, whether midway is tampered with digital signature, if out of question can just be deposited
Enter in block chain database.
In current Internet of things system, gateway device plays the part of very important role, the gateway as Internet of things system
Equipment, the protocol conversion between sensing network and communication network and different type sensing network may be implemented in it, both can be real
Existing wide area interconnection, can also realize Interconnected, and the gateway device of Internet of things system can also have equipment Management Function in addition,
Each perception Internet of things node that bottom can be managed by gateway device, understands the relevant information of each Internet of things node, and realize
Remote control, further, the gateway device of Internet of things system can have distinctive Internet of Things edge calculations ability, realize object
More fast and accurate data acquisition and transmission in networking.It therefore, in one embodiment of the invention, can be by Internet of Things
The gateway device of system executes above-mentioned steps S201-S202 as this block chain link point, alternatively, this block chain link point and Internet of Things
The gateway device of system interacts, and obtains the secure data of Internet of things system from the gateway device of Internet of things system and then executes
Above-mentioned steps S201-S202, then the secure data of above-mentioned Internet of things system include:The safety rule of the gateway device of Internet of things system
Then and/or operation log.The secure data of Internet of things system is sent to other block chain nodes by step S201:Work as Internet of Things
When the safety regulation of the gateway device of net system is set, the safety regulation that setting obtains is sent to other block chain nodes,
It is stored in corresponding block chain database by the safety regulation that each block chain node obtains the setting;And/or when
When generating operation log in the gateway device of Internet of things system, the operation log of generation is sent to other block chain nodes, by
The operation log is stored in corresponding block chain database by each block chain node.
Specifically, the safety regulation of the gateway device of Internet of things system refer to Internet of things system gateway device in stored
Safety regulation it is whole, safety regulation is made of one or more sub-rule.The safety of the gateway device of Internet of things system
It may include following one or more situations that rule, which is set,:Increase by one or more new cuckoo in existing safety regulation
Then, one or more sub-rule is deleted from existing safety regulation, to one or more cuckoo in existing safety regulation
Then modify.After the safety regulation of the gateway device to Internet of things system is configured, one after being arranged
Or a plurality of sub-rule, this one or more sub-rule constitute the safety regulation that setting obtains.Whenever the gateway of Internet of things system is set
When standby safety regulation changes, the safety regulation in the gateway device is just deposited into block chain data as a whole
In library.The gateway device of Internet of things system can generate corresponding operation log when executing operation, whenever the net of Internet of things system
It closes equipment and generates an operation log, just the operation log is deposited into block chain database.As it can be seen that through this embodiment,
History in the gateway device for having Internet of things system is recorded in block chain database, and obtained safety regulation and history is set every time
The operation log generated every time.
Wherein, the gateway device of Internet of things system has the function of at least one of following:Local prison is carried out to Internet of things system
The function of survey carries out Internet of things system the function of procotol conversion, and the function of edge calculations is carried out to Internet of things system.
In current Internet of things system, the Internet of things system of a local is connected to internet by gateway device.It is whole
The safety of a Internet of things system is monitored by gateway device, and common security monitoring mode is:Gateway device has been locally located
Safety regulation, gateway device locally records the corresponding operation log of operation occurred in Internet of things system, when in Internet of things system
When certain operation occurs, judge whether the operation is legal by safety regulation, if not, being reported to the operation personnel of Internet of things system
Alert, operation personnel is made corresponding by checking that operation log positions the illegal operation occurred in Internet of things system
Processing.For example, a gateway device is to running the behaviour of access device in the operation of application, Internet of things system in Internet of things system
Work etc. is monitored, and gateway device locally prestores the white list or blacklist work that the operation personnel of Internet of things system pre-defines
For safety regulation, when gateway device finds that the application not defined in white list will run in Internet of things system or not exist
When equipment defined in white list will be connected into Internet of things system, in time to operation personnel's early warning, or when gateway device discovery is black
Application defined in list to be run in Internet of things system or blacklist defined in equipment want operation or access Internet of Things
When net system, according to default rule, gateway device forbids it or is sent out alarm so that operation personnel is according to operation
The event occurred in daily record makes corresponding processing for different situations in time.Such scheme problem encountered is:Gateway is set
The standby safety regulation being locally stored can maliciously be reset, and the operation log of gateway device local record can also be disliked
Meaning ground increases, is deleted or modified, all incredible in safety regulation and/or operation rules, to the peace of Internet of things system
Full monitoring also becomes meaningless.
And scheme provided by the present invention can effectively solve the problem that the above problem, by Internet of things system in the embodiment of the present invention
Gateway device in safety regulation and operation log be stored in block chain database, and for safety regulation every time setting
It sets, the either setting of operation personnel is still maliciously arranged, and the safety regulation that setting obtains is stored in block chain data
In library, each generation for operation log, the either operation log of valid operation or the operation log of illegal operation,
The operation log of generation is stored in block chain database, spy can not be distorted due to the data in block chain database
The each safety regulation of history of property, the gateway device recorded in block chain database can reflect the institute that safety regulation is undergone
There are setting, the operation log recorded in block chain database that can reflect all operations that Internet of things system is undergone, in turn
Secure data based on the Internet of things system recorded in block chain database can make Internet of things system correct operation.
Specifically, in one embodiment of the invention, when operation personnel's initial setting up gateway device of Internet of things system
Safety regulation when, the safety regulation of the initial setting up is sent to other block chain nodes, is passed through by other block chain nodes
The safety regulation of the initial setting up is stored in corresponding block chain database by common recognition verification.Above-mentioned steps S202 is from local area
One or more secure data of the Internet of things system is obtained in the corresponding block chain database of block chain node, based on acquired
Secure data to the Internet of things system execute corresponding operating include:From the corresponding block chain database of this block chain link point
Obtain the safety regulation of the gateway device initial setting up;Judge the safety regulation of the gateway device local and acquired peace
Whether full rule is consistent;Be that the safety regulation of the determining gateway device local is not tampered with so that the gateway device according to
Corresponding operating is executed to the Internet of things system according to local safety regulation;Otherwise the local safety rule of the gateway device are determined
It is then tampered, so that the gateway device executes corresponding operating according to acquired safety regulation to the Internet of things system.
The present embodiment is suitable for Internet of things system, and the safety regulation of gateway device keeps initially setting under normal operating conditions
The constant situation of the safety regulation set under normal circumstances, the net is only recorded in block chain database for a gateway device A
The safety regulation for closing the corresponding initial setting up of device A, when the safety regulation that gateway device A is locally preserved and block chain data
When the safety regulation of the corresponding initial setting up of gateway device A recorded in library differs, illustrate the peace that gateway device A is locally preserved
Full rule is no longer the safety regulation of operation personnel's initial setting up, i.e., the safety regulation of the locals gateway device A is usurped by malice
Change, further, compares A pairs of the gateway device recorded in the safety regulation and block chain database that gateway device A is locally preserved
Difference between the safety regulation for the initial setting up answered distorts which portion specifically distorted by malice known to the difference of the two
Point, you can to show that malice distorts corresponding malicious act, these malicious acts can be forbidden and be taken precautions against.
In another embodiment of the present invention, when the gateway device of Internet of things system often generates an operation log,
Just the operation log of generation is issued into other block chain nodes so that the operation log is stored in corresponding by other block chains
In block chain database, wherein having recorded temporal information, mode of operation and operation object in every operation log.Above-mentioned steps
S202 obtains one or more secure data of the Internet of things system from the corresponding block chain database of this block chain link point,
Executing corresponding operating to the Internet of things system based on acquired secure data includes:According to the temporal information of operation log from
Operation log of the gateway device in preceding preset time period is obtained in the corresponding block chain database of this block chain link point;Sentence
Whether the operation log and acquired operation log in the preceding preset time period of the disconnected gateway device local are consistent;It is then true
Operation log in the preceding preset time period of the fixed gateway device local is not tampered with, so that the gateway device is according to local
Operation log to Internet of things system execute corresponding operating;Otherwise the behaviour before the determining gateway device local in preset time period
It is tampered as daily record, so that the gateway device executes corresponding operating according to acquired operation log to Internet of things system.
More specifically, the operation log of gateway device is:Modify, add to safety regulation, delete at least one
The operation log of item operation.Every operation log includes:Operating time, mode of operation and operation object, wherein operating time are
Refer to and operate the corresponding time, mode of operation includes modification, addition and/or deletes, and operation object refers to the corresponding safety rule of operation
Then content.When the safety regulation in gateway device is by modification, addition and/or deletes, no matter the operation is legal or dislikes
Meaning, the corresponding operation log of the operation is stored in by multiple block chain nodes in block chain database.Above-mentioned steps
S202 obtains one or more secure data of the Internet of things system from the corresponding block chain database of this block chain link point,
Executing corresponding operating to the Internet of things system based on acquired secure data includes:From the corresponding block of this block chain link point
The operation log of the gateway device is obtained in chain database;Judge the operation log of the gateway device local with it is acquired
Whether operation log is consistent;It is that the safety regulation and operation log of the determining gateway device local are not tampered with, so that institute
It states gateway device and corresponding operating is executed to Internet of things system according to local safety regulation;Otherwise determine that the gateway device is local
Safety regulation and operation log be tampered, distorted according to the difference of local operation log and acquired operation log
Preceding safety regulation, so that the gateway device executes corresponding operating according to the safety regulation before distorting to Internet of things system.
In the above embodiments, the secure data of Internet of things system is sent to other block chain nodes, so that each area
Block chain node preserves the secure data to corresponding block chain database:By the secure data and described
The identification information of gateway device is sent to other block chain nodes together, so that each block chain node is by the secure data and institute
The identification information for stating gateway device corresponds in preservation to corresponding block chain database;From the corresponding area of this block chain link point
One or more secure data of the Internet of things system is obtained in block chain database, including:According to the mark of the gateway device
Know information to search from the corresponding block chain database of this block chain link point and read corresponding one or more secure data.
Fig. 3 diagrammatically illustrates the stream of the method for the block chain node according to another embodiment of the present invention as recipient
Cheng Tu illustrates this method from the angle of the block chain node for the secure data for receiving Internet of things system, can specifically include as
Lower step:
Step S301 receives the secure data for the Internet of things system that other block chain nodes are sent out.
Step S302 verifies secure data with other each block chain nodes, will be protected by the secure data of verification
It deposits into corresponding block chain database.
Since block chain technology (blockchain) records all data using distributed account book, maximum feature is to go through
Records of the Historian record can not distort, i.e., data are once recorded on chain, by persistence.Block chain technology uses the distribution of decentralization
System.The equipment of wherein each operation block chain is an independent server, saves a independent account book.Account book
In data ensure that historical data can not be tampered using block chain structure.As it can be seen that method shown in Fig. 3 utilizes block chain number
According to the characteristic that the data in library can not distort, the secure data that Internet of things system generates is stored in block chain database, is made
Obtaining the secure data that Internet of things system generates can faithfully be recorded to reflect the actual motion state of Internet of things system,
When needed corresponding secure data is obtained from block chain database.The reality to Internet of things system is realized by this programme
Operating condition is recalled, and the safety of Internet of things system can be more effectively protected.
In current Internet of things system, gateway device plays the part of very important role, the gateway as Internet of things system
Equipment, the protocol conversion between sensing network and communication network and different type sensing network may be implemented in it, both can be real
Existing wide area interconnection, can also realize Interconnected, and the gateway device of Internet of things system can also have equipment Management Function in addition,
Each perception Internet of things node that bottom can be managed by gateway device, understands the relevant information of each Internet of things node, and realize
Remote control, further, the gateway device of Internet of things system can have distinctive Internet of Things edge calculations ability, realize object
More fast and accurate data acquisition and transmission in networking.Therefore, in one embodiment of the invention, what is received comes from
The secure data of the Internet of things system of other block chain nodes includes:The safety regulation of the gateway device of Internet of things system and/or
Operation log.When the safety regulation of the gateway device of Internet of things system is set, receive what corresponding block chain node was sent
Obtained safety regulation is set, secure data is verified with other each block chain nodes, the secure data of verification will be passed through
It preserves into corresponding block chain database;And/or when generating operation log in the gateway device of Internet of things system
When, the operation log of generation is sent to other block chain nodes, it is by each block chain node that operation log deposit is respectively right
In the block chain database answered.
As it can be seen that in the embodiment of the present invention by the gateway device of Internet of things system safety regulation and operation log store
In block chain database, and for each setting of safety regulation, the either setting of operation personnel is still maliciously arranged,
The safety regulation that setting obtains is stored in block chain database, each generation for operation log is either legal
The operation log of generation is stored in block chain database by the operation log of operation or the operation log of illegal operation
In, due to the characteristic that can not distort of the data in block chain database, gateway device recorded in block chain database is gone through
The each safety regulation of history can reflect all settings that safety regulation is undergone, the operation log recorded in block chain database
It can reflect all operations that Internet of things system is undergone, and then based on the peace of the Internet of things system recorded in block chain database
Total evidence can make Internet of things system correct operation.
In one embodiment of the invention, when the safety of the Internet of things system from other block chain nodes received
Data include:When the safety regulation and/or operation log of the gateway device of Internet of things system, above-mentioned steps S301 receives other areas
The secure data of Internet of things system that block chain node is sent further includes:Receive the corresponding gateway device of the secure data
Identification information.Above-mentioned steps S302 verifies the secure data with other each block chain nodes, will pass through the institute of verification
It states secure data and preserves to corresponding block chain database and include:With other each block chain nodes to the secure data
It is verified, will be preserved to respectively right by the identification information of the secure data of verification gateway device corresponding with the safety equipment
In the block chain database answered.It, can be according to gateway device in this way when needing to obtain secure data from block chain database
Identification information find corresponding secure data.
In one embodiment of the invention, when the safety of the Internet of things system from other block chain nodes received
Data include:When the safety regulation and/or operation log of the gateway device of Internet of things system, this block chain link point can also be object
The gateway device of networked system.That is, one or more of block chain network block chain node in the present embodiment
To be the gateway device of Internet of things system, to pass through the safety of block chain technical maintenance one or more Internet of things system.And
When multiple block chain nodes are the gateway devices of Internet of things system, it is equivalent to multiple gateway devices and maintains block link network jointly
Network, the demand of the common Internet of things system security monitoring according to gateway device and reach the common recognitions of multiple block chain nodes, altogether
With the safety for safeguarding each Internet of things system.Alternatively, when block chain node is not the gateway device of Internet of things system, can also be
The block chain node can be interacted with gateway device, can also equally utilize the peace of block chain technical maintenance Internet of things system
Entirely.
Wherein, the gateway device of Internet of things system is at least one of following:Local monitoring is carried out to Internet of things system, it is right
Internet of things system carries out procotol conversion, and edge calculations are carried out to Internet of things system.
In one embodiment of the invention, the secure data received is according to the encrypted safety of predetermined encryption rule
Data.The present embodiment can execute in the following way:For example, after Internet of things system generates secure data A, locally preserve
A secure data A, is encrypted secure data A, and encryption key and decruption key are generated according to predetermined encryption rule,
Secure data A is encrypted using encryption key to obtain encryption safe data A.Receive what corresponding block chain node was sent
Encryption safe data A and identification information A, by after knowing together and verifying, by each block chain node by the encryption safe data A and mark
Know information A to be stored in corresponding block chain database.When corresponding block chain node needs data A safe to use, root
Encryption safe data A is obtained from its corresponding block chain database according to identification information A, using decruption key to encryption safe number
It is decrypted to obtain secure data A according to A, the secure data A which obtains is certainly without distorting, by the decryption
To secure data A can verify the safe number whether the secure data A locally preserved be tampered and obtained based on the decryption
According to A corresponding operating can be executed to Internet of things system.
Alternatively, for another example after Internet of things system generates secure data A, a secure data A is locally preserved, it is right
Secure data A is encrypted, and predetermined encryption rule is hash algorithm, such as MD5 algorithms, SHA256 algorithms, national secret algorithm, profit
The cryptographic Hash of secure data A is calculated with hash algorithm.Receive the secure data A that corresponding block chain node is sent cryptographic Hash and
The cryptographic Hash of secure data A and identification information A are stored in corresponding block chain number by identification information A by each block chain node
According in library.When corresponding block chain node needs data A safe to use, according to identification information A from its corresponding block chain number
According to the cryptographic Hash for obtaining secure data A in library, the safe number locally preserved is verified by the cryptographic Hash of acquired secure data A
It, can be with based on the secure data A locally preserved when determining that the secure data A locally preserved is not tampered with according to whether being tampered
Corresponding operation is executed to Internet of things system.
By above-described embodiment, in the safe number for ensureing Internet of things system using the multi-party supervision characteristic of block chain database
While according to not being tampered, also by the secure data to Internet of things system be encrypted in the way of ensure that deposit block chain number
According to the privacy of the secure data of the Internet of things system in library.
In one embodiment of the invention, above-mentioned steps S301 receives the Internet of things system that other block chain nodes are sent out
Secure data further include:It receives the corresponding digital signature of the secure data and sends out the block chain node of the secure data
Public key;The corresponding digital signature of wherein described secure data is based on the secure data and the area for sending out the secure data
What the private key of block chain node generated.Above-mentioned steps S302 verifies the secure data with other each block chain nodes, will
It is preserved to corresponding block chain database by the secure data of verification and includes:Number based on the secure data
Word signs and sends out secure data described in the public key verifications of the secure data, will be preserved to respective by the secure data of verification
In corresponding block chain database.
Specifically, the above-mentioned process based on the secure data and private key generation digital signature can be to by described
The character string of secure data and private key composition carries out Hash calculation and obtains digital signature.It is receiving digital signature, public affairs
After key and secure data, based on corresponding public key and digital signature come judge whether the source of secure data reliable, midway whether
It is tampered, is verified if there is no problem.Can also be the cryptographic Hash for calculating secure data, to the Hash of secure data
Value and the character string of private key composition carry out Hash calculation and obtain digital signature again.Receiving digital signature, public key and safety
After the cryptographic Hash of data, based on corresponding public key and digital signature come judge whether the source of secure data reliable, midway whether
It is tampered, is verified if there is no problem..Can also be that secure data is encrypted to obtain encryption safe data, it is right
Encryption safe data and the character string of private key composition carry out Hash calculation and obtain digital signature again.Receive digital signature,
After public key and encryption safe data, based on corresponding public key and digital signature come judge whether the source of secure data reliable, in
Whether way is tampered, and is verified if there is no problem.
Fig. 4 A diagrammatically illustrate it is according to the ... of the embodiment of the present invention include the block chain node as sender device
Block diagram.
As shown in Figure 4 A, which includes:Sending module 401 and security module 402.
Sending module 401, for the secure data of Internet of things system to be sent to other block chain nodes, so that each block
Chain node preserves the secure data into corresponding block chain database.
Security module 402, for obtaining the Internet of things system from the corresponding block chain database of this block chain link point
One or more secure data, based on acquired secure data to the Internet of things system execute corresponding operating.
In one embodiment of the invention, the secure data of Internet of things system includes:The gateway device of Internet of things system
Safety regulation and/or operation log.Sending module 401, the safety regulation for the gateway device when Internet of things system are set
When setting, the safety regulation that setting obtains is sent to other block chain nodes, the safety regulation includes one or more son
Rule;And/or when generating operation log in the gateway device of Internet of things system, the operation log of generation is sent to
Other block chain nodes.
In one embodiment of the invention, security module 402 are used for from the corresponding block chain data of this block chain link point
The safety regulation of the gateway device initial setting up is obtained in library;Judge the safety regulation of the gateway device local with it is acquired
Safety regulation it is whether consistent;It is that the safety regulation of the determining gateway device local is not tampered with, so that the gateway is set
It is standby that corresponding operating is executed to the Internet of things system according to local safety regulation;Otherwise the peace of the gateway device local is determined
Full rule is tampered, so that the gateway device executes corresponding behaviour according to acquired safety regulation to the Internet of things system
Make.
In one embodiment of the invention, security module 402 are used for from the corresponding block chain data of this block chain link point
Operation log of the gateway device in preceding preset time period is obtained in library;When judging local preceding default of the gateway device
Between operation log in section and acquired operation log it is whether consistent;Be then the determining gateway device local preceding default when
Between operation log in section be not tampered with so that the gateway device executes phase according to local operation log to Internet of things system
It should operate;Otherwise the operation log before the determining gateway device local in preset time period is tampered, so that the gateway is set
It is standby that corresponding operating is executed to Internet of things system according to acquired operation log.
In one embodiment of the invention, the operation log of gateway device is:Modify, add to safety regulation,
The operation log of at least one of deletion operation.Security module 402 is used for from the corresponding block chain database of this block chain link point
The middle operation log for obtaining the gateway device;Judge the operation log of the gateway device local and acquired operation log
It is whether consistent;It is that the safety regulation and operation log of the determining gateway device local are not tampered with, so that the gateway is set
It is standby that corresponding operating is executed to Internet of things system according to local safety regulation;Otherwise the local safety rule of the gateway device are determined
It is then tampered with operation log, the safety before being distorted according to the difference of local operation log and acquired operation log
Rule, so that the gateway device executes corresponding operating according to the safety regulation before distorting to Internet of things system.
In one embodiment of the invention, sending module 401 are additionally operable to the secure data and the gateway device
Identification information be sent to other block chain nodes together so that each block chain node sets the secure data and the gateway
Standby identification information, which corresponds to, to be preserved into corresponding block chain database.Security module 402, for being set according to the gateway
Standby identification information is searched from the corresponding block chain database of this block chain link point and reads corresponding one or more safety
Data.
In one embodiment of the invention, this block chain link point includes:The gateway device of Internet of things system.
In one embodiment of the invention, the gateway device of Internet of things system is at least one of following:To Internet of Things
System carries out local monitoring, and procotol conversion is carried out to Internet of things system, and edge calculations are carried out to Internet of things system.
Fig. 4 B diagrammatically illustrate it is according to another embodiment of the present invention include the block chain node as sender dress
The block diagram set.
As shown in Figure 4 B, which includes:Sending module 401, security module 402, encryption
Module 403 and signature blocks 404.
Explanation above was carried out to sending module 401 and security module 402, the part repeated repeats no more.
Encrypting module 403 obtains encryption safe number for the secure data to be encrypted according to predetermined encryption rule
According to.
Sending module 401, for the encryption safe data to be sent to other block chain nodes, so that each block chain link
Point preserves the encryption safe data into corresponding block chain database.
Signature blocks 404, for generating public key and private key;The secure data of Internet of things system is being sent to other blocks
Before chain node, it is based on the secure data and the private key, generates digital signature.
Sending module 401 is used for the secure data, the corresponding digital signature of the secure data and the public key
It is sent to other block chain nodes together, so that each block chain node is based on pacifying described in the digital signature and the public key verifications
Total evidence will be preserved by the secure data of verification into corresponding block chain database.
In one embodiment of the invention, signature blocks 404, for the character string to being made of secure data and private key
Hash calculation is carried out, digital signature is obtained.
In other embodiments of the invention, the device for being used for block chain node can only include sending module 401, safety
Module 402 and encrypting module 403, alternatively, the device for block chain node can only include sending module 401, security module
402 and signature blocks 404, corresponding function hereinbefore by the agency of repeats no more.
Fig. 4 C diagrammatically illustrate it is according to another embodiment of the present invention include the block chain node as recipient dress
The block diagram set.As shown in Figure 4 C, which includes:It receiving module 405, authentication module 406 and deposits
Store up module 407.
Receiving module 405, the secure data for receiving the Internet of things system that other block chain nodes are sent out.
Authentication module 406, for being verified to the secure data with other each block chain nodes.
Memory module 407, for will be preserved to corresponding block chain database by the secure data of verification
In.
In one embodiment of the invention, the secure data of Internet of things system includes:The gateway device of Internet of things system
Safety regulation and/or operation log.
In one embodiment of the invention, the secure data received is according to the encrypted safety of predetermined encryption rule
Data.
In one embodiment of the invention, receiving module 405 are additionally operable to receive the corresponding number of the secure data together
The public key of the block chain node of the secure data is signed and sent out to word;The corresponding digital signature of wherein described secure data is base
It is generated in the private key of the secure data and the block chain node for sending out the secure data.Authentication module 406, for being based on
Secure data described in the digital signature and the public key verifications.
In one embodiment of the invention, receiving module 405 are additionally operable to receive the corresponding institute of the secure data together
State the identification information of gateway device;Memory module 407 is used for the secure data by verification and the secure data pair
The identification information for the gateway device answered is preserved into corresponding block chain database.
In one embodiment of the invention, this block chain link point includes:The gateway device of Internet of things system.
In one embodiment of the invention, the gateway device of Internet of things system is at least one of following:To Internet of Things
System carries out local monitoring, and procotol conversion is carried out to Internet of things system, and edge calculations are carried out to Internet of things system.
It should be noted that in device section Example each module/unit/subelement etc. embodiment, the skill of solution
Art problem, the function of realization and the technique effect that reaches respectively with the implementation of each corresponding step in method section Example
Mode, the technical issues of solving, the function of realization and the technique effect that reaches are same or like, and details are not described herein.
It is any number of or in which arbitrary more in module according to an embodiment of the invention, submodule, unit, subelement
A at least partly function can be realized in a module.Module according to the ... of the embodiment of the present invention, submodule, unit, son are single
Any one or more in member can be split into multiple modules to realize.Module according to the ... of the embodiment of the present invention, submodule,
Any one or more in unit, subelement can at least be implemented partly as hardware circuit, such as field programmable gate
Array (FPGA), programmable logic array (PLA), system on chip, the system on substrate, the system in encapsulation, special integrated electricity
Road (ASIC), or can be by the hardware or firmware for any other rational method for circuit integrate or encapsulate come real
Show, or with any one in three kinds of software, hardware and firmware realization methods or with wherein arbitrary several appropriately combined next reality
It is existing.Alternatively, one or more of module according to the ... of the embodiment of the present invention, submodule, unit, subelement can be at least by parts
Ground is embodied as computer program module, when the computer program module is run, can execute corresponding function.
For example, any number of in sending module 401, security module 402, encrypting module 403 and signature blocks 404 can be with
Merging is realized in a module or any one module therein can be split into multiple modules.Alternatively, these modules
One or more of at least partly function of module can be combined at least partly function of other modules, and in a mould
It is realized in block.According to an embodiment of the invention, sending module 401, security module 402, encrypting module 403 and signature blocks 404
At least one of can at least be implemented partly as hardware circuit, such as it is field programmable gate array (FPGA), programmable
Logic array (PLA), system on chip, the system on substrate, the system in encapsulation, application-specific integrated circuit (ASIC), or can lead to
Cross and the hardware such as any other rational method that is integrated or encapsulating or firmware carried out to realize to circuit, or with software, hardware with
And it any one in three kinds of realization methods of firmware or several appropriately combined is realized with wherein arbitrary.Alternatively, sending module
401, at least one of security module 402, encrypting module 403 and signature blocks 404 can at least be implemented partly as counting
Calculation machine program module can execute corresponding function when the computer program module is run.
For another example any number of in receiving module 405, authentication module 406 and memory module 407 may be incorporated in one
It is realized in module or any one module therein can be split into multiple modules.Alternatively, these moulds it is in the block one or
At least partly function of multiple modules can be combined at least partly function of other modules, and be realized in a module.
According to an embodiment of the invention, at least one of receiving module 405, authentication module 406 and memory module 407 can at least by
Be implemented partly as hardware circuit, for example, field programmable gate array (FPGA), programmable logic array (PLA), system on chip,
The system in system, encapsulation, application-specific integrated circuit (ASIC) on substrate, or can be by carrying out integrated to circuit or encapsulating
The hardware such as any other rational method or firmware realize, or with arbitrary in three kinds of software, hardware and firmware realization methods
It is a kind of or several appropriately combined realized with wherein arbitrary.Alternatively, receiving module 405, authentication module 406 and memory module
At least one of 407 can at least be implemented partly as computer program module, when the computer program module is run
When, corresponding function can be executed.
Fig. 5 diagrammatically illustrates the computer according to the ... of the embodiment of the present invention for being adapted for carrying out the method for block chain node
System block diagram in equipment.Computer system shown in Fig. 5 is only an example, should not be to the function of the embodiment of the present invention
Any restrictions are brought with use scope.
As shown in figure 5, computer system 500 according to the ... of the embodiment of the present invention includes processor 501, it can be according to storage
Program in read-only memory (ROM) 502 is loaded into from storage section 508 in random access storage device (RAM) 503
Program and execute various actions appropriate and processing.Processor 501 for example may include general purpose microprocessor (such as CPU), refer to
Enable set processor and/or related chip group and/or special microprocessor (for example, application-specific integrated circuit (ASIC)), etc..Processing
Device 501 can also include the onboard storage device for caching purposes.Processor 501 may include for executing according to of the invention real
Apply single treatment unit either multiple processing units of the different actions of the method flow of example.
In RAM 503, it is stored with system 500 and operates required various programs and data.Processor 501, ROM 502 with
And RAM 503 is connected with each other by bus 504.Processor 501 is held by executing the program in ROM 502 and/or RAM 503
The various operations of capable flow according to the method for the embodiment of the present invention.It is noted that described program can also be stored in except ROM 502
In one or more memories other than RAM 503.Processor 501 can also be stored in one or more of by execution
Program in memory executes the various operations of flow according to the method for the embodiment of the present invention.
According to an embodiment of the invention, system 500 can also include input/output (I/O) interface 505, input/output
(I/O) interface 505 is also connected to bus 504.System 500 can also include be connected to I/O interfaces 505 with one in lower component
Item is multinomial:Importation 506 including keyboard, mouse etc.;Including such as cathode-ray tube (CRT), liquid crystal display (LCD)
Deng and loud speaker etc. output par, c 507;Storage section 508 including hard disk etc.;And including such as LAN card, modulatedemodulate
Adjust the communications portion 509 of the network interface card of device etc..Communications portion 509 executes communication process via the network of such as internet.
Driver 510 is also according to needing to be connected to I/O interfaces 505.Detachable media 511, such as disk, CD, magneto-optic disk, semiconductor
Memory etc. is mounted on driver 510, as needed in order to be pacified as needed from the computer program read thereon
It is packed into storage section 508.
According to an embodiment of the invention, flow may be implemented as computer software journey according to the method for the embodiment of the present invention
Sequence.For example, the embodiment of the present invention includes a kind of computer program product comprising carry meter on a computer-readable medium
Calculation machine program, the computer program include the program code for method shown in execution flow chart.In such embodiments,
The computer program can be downloaded and installed by communications portion 509 from network, and/or be pacified from detachable media 511
Dress.When the computer program is executed by processor 501, the above-mentioned function of being limited in the system of the embodiment of the present invention is executed.Root
According to the embodiment of the present invention, system as described above, unit, module, unit etc. can by computer program module come
It realizes.
The present invention also provides a kind of computer-readable medium, which can be retouched in above-described embodiment
Included in the equipment/device/system stated;Can also be individualism, and without be incorporated the equipment/device/system in.On
It states computer-readable medium and carries one or more program, when said one or multiple programs are performed, realize:On
Block chain common recognition described in each embodiment of text reaches method.
According to an embodiment of the invention, computer-readable medium can be that computer-readable signal media or computer can
Storage medium either the two is read arbitrarily to combine.Computer readable storage medium for example can be --- but it is unlimited
In --- electricity, system, device or the device of magnetic, optical, electromagnetic, infrared ray or semiconductor, or the arbitrary above combination.It calculates
The more specific example of machine readable storage medium storing program for executing can include but is not limited to:Being electrically connected, be portable with one or more conducting wires
Formula computer disk, hard disk, random access storage device (RAM), read-only memory (ROM), erasable programmable read only memory
(EPROM or flash memory), optical fiber, portable compact disc read-only memory (CD-ROM), light storage device, magnetic memory device or
The above-mentioned any appropriate combination of person.In the present invention, can be any include computer readable storage medium or storage program
Tangible medium, the program can be commanded execution system, device either device use or it is in connection.And in this hair
In bright, computer-readable signal media may include in a base band or as the data-signal that a carrier wave part is propagated,
In carry computer-readable program code.Diversified forms may be used in the data-signal of this propagation, including but not limited to
Electromagnetic signal, optical signal or above-mentioned any appropriate combination.Computer-readable signal media can also be computer-readable
Any computer-readable medium other than storage medium, the computer-readable medium can send, propagate or transmit for by
Instruction execution system, device either device use or program in connection.The journey for including on computer-readable medium
Sequence code can transmit with any suitable medium, including but not limited to:Wirelessly, wired, optical cable, radiofrequency signal etc., or
Above-mentioned any appropriate combination.
For example, according to an embodiment of the invention, computer-readable medium may include above-described ROM 502 and/or
One or more memories other than RAM 503 and/or ROM 502 and RAM 503.
Flow chart in attached drawing and block diagram, it is illustrated that according to the system of various embodiments of the invention, method and computer journey
The architecture, function and operation in the cards of sequence product.In this regard, each box in flowchart or block diagram can generation
A part for a part for one module, program segment, or code of table, above-mentioned module, program segment, or code includes one or more
Executable instruction for implementing the specified logical function.It should also be noted that in some implementations as replacements, institute in box
The function of mark can also occur in a different order than that indicated in the drawings.For example, two boxes succeedingly indicated are practical
On can be basically executed in parallel, they can also be executed in the opposite order sometimes, this is depended on the functions involved.Also it wants
It is noted that the combination of each box in block diagram or flow chart and the box in block diagram or flow chart, can use and execute rule
The dedicated hardware based systems of fixed functions or operations is realized, or can use the group of specialized hardware and computer instruction
It closes to realize.
It will be understood by those skilled in the art that the feature described in each embodiment and/or claim of the present invention can
To carry out multiple combinations or/or combination, even if such combination or combination are not expressly recited in the present invention.Particularly, exist
In the case of not departing from spirit of that invention and introduction, the feature described in each embodiment of the invention and/or claim can
To carry out multiple combinations and/or combination.All these combinations and/or combination each fall within the scope of the present invention.
The embodiment of the present invention is described above.But the purpose that these embodiments are merely to illustrate that, and
It is not intended to limit the scope of the invention.Although respectively describing each embodiment above, but it is not intended that each reality
Use cannot be advantageously combined by applying the measure in example.The scope of the present invention is defined by the appended.It does not take off
From the scope of the present invention, those skilled in the art can make a variety of alternatives and modifications, these alternatives and modifications should all be fallen at this
Within the scope of invention.
Claims (7)
1. a kind of method of block chain node as recipient, which is characterized in that including:
The secure data for receiving the Internet of things system that other block chain nodes are sent out, with other each block chain nodes to the safety
Data are verified, and will be preserved into corresponding block chain database by the secure data of verification.
2. a kind of method of block chain node as recipient according to claim 1, which is characterized in that wherein:
The secure data of Internet of things system includes:The safety regulation and/or operation log of the gateway device of Internet of things system.
3. a kind of method of block chain node as recipient according to claim 1, which is characterized in that wherein:
The secure data received is according to the encrypted secure data of predetermined encryption rule.
4. a kind of method of block chain node as recipient according to claim 1, which is characterized in that wherein:
The secure data for receiving the Internet of things system that other block chain nodes are sent out further includes:It is corresponding to receive the secure data
The public key of digital signature and the block chain node for sending out the secure data;The corresponding digital signature of wherein described secure data is
What the private key based on the secure data and the block chain node for sending out the secure data generated;
The secure data is verified with other each block chain nodes, will be preserved to each by the secure data of verification
Self-corresponding block chain database includes:Digital signature based on the secure data and the public key for sending out the secure data
The secure data is verified, will be preserved into corresponding block chain database by the secure data of verification.
5. a kind of method of block chain node as recipient according to claim 2, which is characterized in that wherein:
The secure data of Internet of things system for receiving the transmission of other block chain nodes further includes:It is corresponding to receive the secure data
The identification information of the gateway device;
The secure data is verified with other each block chain nodes, will be preserved to each by the secure data of verification
Self-corresponding block chain database includes:The secure data is verified with other each block chain nodes, it will be by testing
The identification information of the secure data of card gateway device corresponding with the safety equipment is preserved to corresponding block chain database
In.
6. a kind of method of block chain node as recipient according to claim 2, which is characterized in that wherein:
This block chain link point includes:The gateway device of Internet of things system.
7. a kind of method of block chain node as recipient according to claim 2 or 6, which is characterized in that wherein,
The gateway device of Internet of things system is at least one of following:Local monitoring is carried out to Internet of things system, to Internet of things system into
Row procotol is converted, and edge calculations are carried out to Internet of things system.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810438729.5A CN108632019A (en) | 2018-05-09 | 2018-05-09 | A method of the block chain node as recipient |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810438729.5A CN108632019A (en) | 2018-05-09 | 2018-05-09 | A method of the block chain node as recipient |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108632019A true CN108632019A (en) | 2018-10-09 |
Family
ID=63692354
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810438729.5A Pending CN108632019A (en) | 2018-05-09 | 2018-05-09 | A method of the block chain node as recipient |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108632019A (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109756496A (en) * | 2018-12-29 | 2019-05-14 | 播金信息科技(上海)有限公司 | Data network transmission method for security protection and computer readable storage medium based on DNA characteristics and block chain |
CN109889522A (en) * | 2019-02-25 | 2019-06-14 | 重庆邮电大学 | A kind of Internet of Things information safety protecting method based on block chain |
CN109951488A (en) * | 2019-03-27 | 2019-06-28 | 百度在线网络技术(北京)有限公司 | Service implementing method, device, equipment and the storage medium of content distributing network |
CN111190235A (en) * | 2020-01-04 | 2020-05-22 | 张海东 | Block chain information receiving and recording platform |
CN112003691A (en) * | 2020-07-02 | 2020-11-27 | 北京交通大学 | Distributed key management system applied to urban rail transit |
CN113382073A (en) * | 2021-06-08 | 2021-09-10 | 重庆邮电大学 | Monitoring system and method for edge nodes in cloud edge-side industrial control system |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106796524A (en) * | 2016-12-27 | 2017-05-31 | 深圳前海达闼云端智能科技有限公司 | The method of records application program configuration information, device and electronic equipment |
CN107592356A (en) * | 2017-09-12 | 2018-01-16 | 北京众享比特科技有限公司 | A kind of Internet of Things data processing method, apparatus and system |
WO2018024061A1 (en) * | 2016-08-02 | 2018-02-08 | 华为技术有限公司 | Method, device and system for licensing shared digital content |
CN107862215A (en) * | 2017-09-29 | 2018-03-30 | 阿里巴巴集团控股有限公司 | A kind of date storage method, data query method and device |
-
2018
- 2018-05-09 CN CN201810438729.5A patent/CN108632019A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2018024061A1 (en) * | 2016-08-02 | 2018-02-08 | 华为技术有限公司 | Method, device and system for licensing shared digital content |
CN106796524A (en) * | 2016-12-27 | 2017-05-31 | 深圳前海达闼云端智能科技有限公司 | The method of records application program configuration information, device and electronic equipment |
CN107592356A (en) * | 2017-09-12 | 2018-01-16 | 北京众享比特科技有限公司 | A kind of Internet of Things data processing method, apparatus and system |
CN107862215A (en) * | 2017-09-29 | 2018-03-30 | 阿里巴巴集团控股有限公司 | A kind of date storage method, data query method and device |
Non-Patent Citations (1)
Title |
---|
袁勇,王飞跃: ""区块链技术发展现状与展望"", 《自动化学报》 * |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109756496A (en) * | 2018-12-29 | 2019-05-14 | 播金信息科技(上海)有限公司 | Data network transmission method for security protection and computer readable storage medium based on DNA characteristics and block chain |
CN109889522A (en) * | 2019-02-25 | 2019-06-14 | 重庆邮电大学 | A kind of Internet of Things information safety protecting method based on block chain |
CN109889522B (en) * | 2019-02-25 | 2022-02-11 | 重庆邮电大学 | Block chain-based Internet of things information security protection method |
CN109951488A (en) * | 2019-03-27 | 2019-06-28 | 百度在线网络技术(北京)有限公司 | Service implementing method, device, equipment and the storage medium of content distributing network |
CN109951488B (en) * | 2019-03-27 | 2022-01-07 | 百度在线网络技术(北京)有限公司 | Method, device, equipment and storage medium for realizing service of content distribution network |
CN111190235A (en) * | 2020-01-04 | 2020-05-22 | 张海东 | Block chain information receiving and recording platform |
CN112003691A (en) * | 2020-07-02 | 2020-11-27 | 北京交通大学 | Distributed key management system applied to urban rail transit |
CN113382073A (en) * | 2021-06-08 | 2021-09-10 | 重庆邮电大学 | Monitoring system and method for edge nodes in cloud edge-side industrial control system |
CN113382073B (en) * | 2021-06-08 | 2022-06-21 | 重庆邮电大学 | Monitoring system and method for edge nodes in cloud edge-side industrial control system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108600262A (en) | A kind of includes the device of the block chain node as recipient | |
CN108737107A (en) | A kind of computer equipment including block chain node | |
CN108632019A (en) | A method of the block chain node as recipient | |
CN108632018A (en) | A kind of includes the device of the block chain node as sender | |
CN108737108A (en) | A kind of computer-readable medium including block chain node | |
Levi et al. | Advanced analytics for connected car cybersecurity | |
US9773112B1 (en) | Exploit detection of malware and malware families | |
US10027689B1 (en) | Interactive infection visualization for improved exploit detection and signature generation for malware and malware families | |
CN106687980B (en) | Management program and virtual machine protection | |
JP6188785B2 (en) | Network intrusion detection using decoy encryption key | |
US11799630B2 (en) | Method and device for blockchain nodes | |
CN108712282A (en) | A method of the block chain node as sender | |
CN107547198A (en) | Protect the data in storage device | |
CN111200575B (en) | Machine learning-based identification method for malicious behaviors of information system | |
CN107612698A (en) | A kind of commercial cipher detection method, device and system | |
US11715366B2 (en) | Systems and methods for alarm processing | |
US20230370439A1 (en) | Network action classification and analysis using widely distributed honeypot sensor nodes | |
CN109308421A (en) | A kind of information tamper resistant method, device, server and computer storage medium | |
CN112788042A (en) | Method for determining equipment identifier of Internet of things and Internet of things equipment | |
US20230362142A1 (en) | Network action classification and analysis using widely distributed and selectively attributed sensor nodes and cloud-based processing | |
Gan et al. | Social engineering in the internet of everything | |
CN112153044A (en) | Flow data detection method and related equipment | |
Jadidi et al. | Securing manufacturing using blockchain | |
Marian et al. | Experimenting with digital signatures over a DNP3 protocol in a multitenant cloud-based SCADA architecture | |
CN114595761A (en) | Network data intelligent distribution service system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20181009 |