CN109547219A - Information collection and the method and apparatus for being submitted to block chain network - Google Patents
Information collection and the method and apparatus for being submitted to block chain network Download PDFInfo
- Publication number
- CN109547219A CN109547219A CN201910048147.0A CN201910048147A CN109547219A CN 109547219 A CN109547219 A CN 109547219A CN 201910048147 A CN201910048147 A CN 201910048147A CN 109547219 A CN109547219 A CN 109547219A
- Authority
- CN
- China
- Prior art keywords
- block chain
- submitted
- information collection
- chain network
- module
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
Abstract
The invention discloses a kind of information collection and the method and apparatus that are submitted to block chain network, wherein embodiment of the method is the following steps are included: under original state, generate key pair, the public key of cipher key pair is uploaded to ca authentication and is centrally generated digital certificate, and the digital certificate is saved in certificate management module;External signal is acquired, transaction data to be signed is formed after the signal collected is handled;First time signature is carried out to the transaction data to be signed with the private key of cipher key pair, second is carried out with digital certificate and signs;Transaction data after signing twice is sent to block chain cochain server, the external signal of acquisition is intercepted after cochain server authentication digital certificate validity and trading signature data is stored on block chain.
Description
Technical field
The invention belongs to block chain technical fields, and in particular to a kind of information collection and the method for being submitted to block chain network
With device.
Background technique
Currently, block chain due to its anti-tamper characteristic, is studied by people more and more and is applied to data and deposit card
Field, such as it is anti-fake trace to the source, agricultural product are traced to the source, the monitoring of production procedure, the tracking of weather index.
On the one hand, in the cochain such as to chicken farm temperature and humidity environmental data, to record and prove that cultivation process meets certain
Kind standard.But all there is loophole at present in the preservation cochain of these data, because not can guarantee the accuracy of information source.Assuming that number
According to being collected by sensor first, then this data can be uploaded to a server first, by certain fortune
After calculation processing, then by sending transaction to block chain by server after a certain private key signature, finally save the data on block chain.
In this process, it does not ensure that before transaction is submitted, data will not be by malicious modification.For example, grasping server access
The administrator of permission can modify the data of sensor upload, can also modify to the process and result of data processing, very
Extremely, server is when signing to transaction using private key, if data are read by other malicious process in the processor,
Private key is leaked, and the user for stealing private key can also upload false data with the private key.
On the other hand, in conjunction with artificial intelligence field, artificial intelligence chip is widely used in the process of data processing, than
In face recognition, weather forecasting, industrial equipment control, collect related data and simultaneously handled, to be predicted, be judged and
Decision.But preservation cochains of these data crossed by artificial intelligence chip processing be all at present it is leaky, there are safety
Hidden danger.Because the algorithmic code that not can guarantee the execution of these artificial intelligence chips is really the algorithmic code set and parameter,
The confidence level of result after not can guarantee data processing.Assuming that the data itself for AI processing are acquired by believable sensor
And it is coming or being provided by believable third party, then this data can be input into an AI chip and be handled, then will
Processing result is exported, and finally processing data are stored on block chain.In this process, it does not ensure that in AI chip
The algorithm and parameter of the inside will not be by malicious modifications;Cannot guarantee that AI chip output data before reaching block chain not by
It distorts.For example, the administrator for grasping AI chip access authority can modify algorithm and parameter set on chip, it can also be right
The process and result of data processing are modified.AI chip is when signing to transaction using private key, if data exist
It is read in processor by other malicious process, private key is leaked, and the user for stealing private key can also upload falseness with the private key
Data.
Summary of the invention
The technical problem to be solved in the present invention is to provide a kind of information collection and it is submitted to the method and dress of block chain network
Set, for by collected external signal in without third-party situation directly by being handled inside this unit, then
It is signed by the safety zone of this unit, server is only responsible for signature result to be uploaded to block chain, ensure that the outer of acquisition
The confidence level of portion's signal.
In order to solve the above technical problems, the present invention adopts the following technical scheme that:
In a first aspect, a kind of method that the embodiment of the present application provides information collection and is submitted to block chain network, including it is following
Step:
Under original state, key pair is generated, the public key of cipher key pair is uploaded to ca authentication and is centrally generated digital certificate, the number
Word certificate is saved in certificate management module;
External signal is acquired, transaction data to be signed is formed after the signal collected is handled;
First time signature is carried out to the transaction data to be signed with the private key of cipher key pair, is carried out second with digital certificate
Signature;
Transaction data after signing twice is sent to block chain cochain server, cochain server authentication digital certificate has
The external signal of acquisition is intercepted after effect property and trading signature data are stored on block chain.
Preferably, it detects under attack if further including steps of, empties private key automatically.
Preferably, the attack include uncap, ultraviolet lighting or electromagnetic interference.
Preferably, the private key of the key pair is non-readable, and public key can export.
Preferably, the external signal is acquired by sensor module.
Preferably, the external signal is acquired by AI chip module.
Preferably, the algorithm of the first time signature is asymmetric signature algorithm.
Second aspect, the embodiment of the present application provide a kind of information collection and are submitted to the device of block chain network, including
Information acquisition module, processor module, safety zone module and certificate management module,
For the safety zone module in the initial state, generating key pair, the public key of cipher key pair is uploaded to ca authentication
It is centrally generated digital certificate;
The certificate management module is for saving digital certificate;
The information acquisition module is for acquiring external signal;
The processor module is for forming transaction data to be signed after being handled the data-signal collected;Safety
The private key of regions module cipher key pair carries out first time signature, certificate management module number to the transaction data to be signed
Word certificate carries out second and signs;Transaction data after signing twice is sent to block chain cochain server, cochain clothes
The external data signal of acquisition is intercepted after business device verifying digital certificate validity and trading signature data are stored on block chain.
Preferably, further comprise preventing cracking protective module, if under attack for detecting, empty private key automatically.
Preferably, the attack include uncap, ultraviolet lighting or electromagnetic interference.
Preferably, the information collection and the device of block chain network is submitted to by overall package into a hardware cell.
Preferably, the private key of the key pair is non-readable, and public key can export.
Preferably, the external signal is acquired by sensor module.
Preferably, the external signal is acquired by AI chip module.
Preferably, the algorithm of the first time signature is asymmetric signature algorithm.
Using the present invention have it is following the utility model has the advantages that external signal data acquired by acquisition unit after without by third
Side, but directly by being handled inside the present apparatus, while being signed again by the safety zone SE of the present apparatus, server is only born
Signature result is uploaded to block chain by duty, ensure that device will not be by from acquisition external data to this process of uploading onto the server
It kidnaps, will not be modified.Key can prevent bogus attack through the center CA signature authentication in device, ensure that the external letter of acquisition
Number confidence level.
Detailed description of the invention
Fig. 1 be the embodiment of the present invention information collection and be submitted to block chain network method step flow chart;
Fig. 2 be the embodiment of the present invention information collection and be submitted to block chain network device structural schematic diagram.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiments are some of the embodiments of the present invention, instead of all the embodiments.Based on this hair
Embodiment in bright, every other implementation obtained by those of ordinary skill in the art without making creative efforts
Example, shall fall within the protection scope of the present invention.
Referring to Fig. 1, the invention discloses a kind of information collection and be submitted to block chain network method step flow chart,
The following steps are included:
S10 under original state, generates key pair, and the public key of cipher key pair is uploaded to ca authentication and is centrally generated digital certificate, number
Word certificate is saved in certificate management module.
The public key of cipher key pair can export herein, and private key is non-readable.In security context (such as before device factory),
The public key of generation is uploaded to CA authentication center, and ca authentication center is that the public key issues digital certificate, to prevent other countless
The chip spurious information of word certificate.Ca authentication center is also known as ca authentication mechanism, i.e. certificate authority (Certificate
Authority) or certification authority agent undertakes in Public Key Infrastructure as third party trusted in e-commerce transaction
The responsibility that the legitimacy of public key is examined.Ca authentication center can have many families, and equipment uniquely needs to concern it using producer
The device of buying has met ca authentication standard, and the centralization problem for the device production being arranged in the above manner is eliminated with this.
S20 is acquired external signal, and number of deals to be signed is formed after the signal collected is handled
According to.
External signal is acquired above, use can be sensor module or AI chip module.
It will be appreciated by persons skilled in the art that sensor module (transducer/sensor) is a kind of detection dress
Set, can experience and collect measured information, and collected information can be for conversion into according to certain rules electric signal or its
The information output of form needed for him is required with transmission, processing, storage, display, record and the control etc. that meet information.Sensor
The characteristics of include micromation, digitlization, intelligence, multifunction, systematization and networking, be to realize automatic detection and control automatically
The primary link of system.It is divided into temperature-sensitive element, light-sensitive element, gas sensor, power generally according to the basic perceptional function of sensor module
Ten major class such as quick element, magneto sensor, dew cell, acoustic sensor, radioactive ray sensing element, color sensor and the quick element of taste.
AI chip module, i.e. artificial intelligence chip, Artificial Intelligence Chips, also referred to as AI add
Fast device calculates card, i.e. the chip module dedicated for a large amount of calculating tasks in processing artificial intelligence application, passes through AI chip
The setting of module may make the present invention to combine block chain technical application in various artificial intelligence scenes.
S30 carries out first time signature to the transaction data to be signed with the private key of cipher key pair, with digital certificate into
Second of signature of row.
The optional asymmetric signature algorithm of signature algorithm in signature for the first time, concretely ECC (Elliptic Curves
Cryptography, elliptic curve cryptography), RSA(Rivest-Shamir-Adleman) or BLS(Boneh-Lynn-
Shacham) etc..
Transaction data after signing twice is sent to block chain cochain server, cochain server authentication number by S40
The external signal and trading signature data that acquisition is intercepted after word certificate validity are stored on block chain.
With continued reference to Fig. 1, on the basis of above method embodiment, in order to further ensure the safety of data, this hair
Bright embodiment further provides a kind of information collection and the step flow chart of the method that is submitted to block chain network, including following
Step:
S10 under original state, generates key pair, and the public key of cipher key pair is uploaded to ca authentication and is centrally generated digital certificate, number
Word certificate is saved in certificate management module.
S20 is acquired external signal, and number of deals to be signed is formed after the signal collected is handled
According to.
S30 carries out first time signature to the transaction data to be signed with the private key of cipher key pair, with digital certificate into
Second of signature of row.
Transaction data after signing twice is sent to block chain cochain server, cochain server authentication number by S40
The external signal and trading signature data that acquisition is intercepted after word certificate validity are stored on block chain.
S50 empties private key if detecting under attack automatically.
Herein under attack include whether to be uncapped, ultraviolet lighting, electromagnetic interference etc., should when encountering above-mentioned attack
Module empties private key automatically, to ensure data safety.
It will be appreciated by persons skilled in the art that in the present embodiment in the implementation process of S10 to S40 and a upper embodiment
It is identical, details are not described herein.
It is corresponding with embodiment of the present invention method, the embodiment of the invention also provides a kind of information collection and it is submitted to block
The device of chain network, including information acquisition module, processor module, safety zone module and certificate management module, wherein safety
For in the initial state, generating key pair, the public key of cipher key pair is uploaded to ca authentication and is centrally generated number regions module
Certificate;Certificate management module is for saving digital certificate;Information acquisition module is for acquiring external signal;Processor module is used for
Transaction data to be signed is formed after the data-signal collected is handled;The private of safety zone module cipher key pair
Key carries out first time signature to the transaction data to be signed, and certificate management module carries out second with digital certificate and signs;
Transaction data after signing twice is sent to block chain cochain server, cochain server authentication digital certificate validity
The external data signal and trading signature data for intercepting acquisition afterwards are stored on block chain.
In each module of above embodiments, the public key of cipher key pair can be exported herein, and private key is non-readable.In security context
In (such as before device factory), the public key of generation is uploaded to CA authentication center, and ca authentication center is that the public key issues number
Certificate, to prevent the chip spurious information of other nil certificates.Ca authentication center is also known as ca authentication mechanism, i.e., in certificate granting
The heart (Certificate Authority) or certification authority agent, as third party trusted in e-commerce transaction,
Undertake the responsibility that the legitimacy of public key in Public Key Infrastructure is examined.Ca authentication center can have many families, and equipment is unique using producer
It needs to concern that the device of its buying has met ca authentication standard, the device production being arranged in the above manner is eliminated with this
Centralization problem.Safety zone module is responsible for the functions such as generation, keeping, data encrypting and deciphering, the trading signature of private key.Safety zone
The transaction data that processor module processing generates is signed and is exported with private key by domain module, guarantees that private key cannot be read forever
Out.
Safety zone module is referred to as safety chip/chip safety zone/security enclave/ safety
Fort: a chip-scale safety zone is an independent safe space, is the black box that an outside can not access.It is exactly credible
To appoint module, is the device that can independently carry out key generation, encryption and decryption, inside possesses independent processor and storage unit,
Key and characteristic can be stored, encryption and Security Authentication Service are provided.It is encrypted with safety chip, private key is in random number
What portion generated, it cannot be read forever, to protect business privacy and data safety.
External signal is acquired by information acquisition module, use can be sensor module or AI chip dies
Block.
It will be appreciated by persons skilled in the art that sensor module (transducer/sensor) is a kind of detection dress
Set, can experience and collect measured information, and collected information can be for conversion into according to certain rules electric signal or its
The information output of form needed for him is required with transmission, processing, storage, display, record and the control etc. that meet information.Sensor
The characteristics of include micromation, digitlization, intelligence, multifunction, systematization and networking, be to realize automatic detection and control automatically
The primary link of system.It is divided into temperature-sensitive element, light-sensitive element, gas sensor, power generally according to the basic perceptional function of sensor module
Ten major class such as quick element, magneto sensor, dew cell, acoustic sensor, radioactive ray sensing element, color sensor and the quick element of taste.
AI chip module, i.e. artificial intelligence chip, Artificial Intelligence Chips, also referred to as AI add
Fast device calculates card, i.e. the chip module dedicated for a large amount of calculating tasks in processing artificial intelligence application, passes through AI chip
The setting of module may make the present invention to combine block chain technical application in various artificial intelligence scenes.
In order to improve the safety of device, information collection provided in an embodiment of the present invention and the dress for being submitted to block chain network
It sets by overall package into a hardware cell.
With continued reference to Fig. 2, on the basis of above-mentioned apparatus embodiment, in order to further ensure the safety of data, this hair
Bright embodiment further provides a kind of information collection and is submitted to the device of block chain network, including information acquisition module, place
Device module, safety zone module are managed, certificate management module cracks protective module with anti-, and wherein safety zone module is used for initial
Under state, key pair is generated, the public key of cipher key pair is uploaded to ca authentication and is centrally generated digital certificate;Certificate management module is used
In preservation digital certificate;Information acquisition module is for acquiring external signal;Processor module is used to believe the data collected
Transaction data to be signed is formed after number being handled;The private key of safety zone module cipher key pair is to the friendship to be signed
Easy data carry out first time signature, and certificate management module carries out second with digital certificate and signs;It will be after signing twice
Transaction data is sent to block chain cochain server, and the external number of acquisition is intercepted after cochain server authentication digital certificate validity
It is believed that number and trading signature data be stored on block chain;It is anti-to crack protective module, it is automatic clear if under attack for detecting
Empty private key.
Herein anti-crack protective module be responsible for monitoring this unit whether uncapped, ultraviolet lighting, electromagnetic interference etc. it is broken
The module of attack is solved, when encountering above-mentioned attack, which empties the private key in the module of safety zone automatically, to ensure safety.
It will be appreciated by persons skilled in the art that information acquisition module in the present embodiment, processor module, safety zone
Module and certificate management module implementation process are identical as in a upper embodiment, and details are not described herein.
It is specifically being answered in order to which those skilled in the art is better understood on method and apparatus provided in an embodiment of the present invention
With the application under scene, corresponding application scenarios will be further enumerated below and are illustrated.But it should be understood that answering below
The application range of protection of the embodiment of the present invention is not defined with scene.
Application scenarios one
Energy Management Contract scene.If A system, certain factory is with energy enterprise, the annual energy expenditure expense 10,000,000 in heating/refrigeration.
Company B set section energy service technology enterprise, provides Energy Management Contract service.It determines after company B and factory A negotiates at this time by company
B is improved and is transformed using the technology and equipment of company B to the equipment and process of factory A, but factory A does not need to prop up in advance
Payment is used, and only need to be divided into certain proportion the energy consumption of saving and be given company B.As engineered, second year factory A exists
Heating/refrigeration expense is down to 8,000,000, saves 2,000,000, then pays 2,000,000 yuan of half i.e. 1,000,000 yuan to company B, factory
A and company B obtains two-win.The above mode is fine, but a problem is had in actual operation, is exactly the acquisition of data in work
The place of factory A carries out, and company B is no power control, and data collected are easy to be played tricks by factory A, and factory A is in order to few
Payment, which is divided into expense also, motivation fraud.At this point, with information collection provided in an embodiment of the present invention and being submitted to block link network
The device of network is just very simple, and factory A need to only install this standard compliant reliable hardware, and assumes deliberately destroy this
Equipment, then by the data that this equipment uploads to block chain be it is believable, improvement of terms that company A is obtained, cost reduce
Initial data can credibly be recorded, and obtain the trust of company B, both sides, which are divided into also, believable data
As foundation.
Application scenarios two
In carbon emission reduction assets, dumping right transaction in assets, carbon emission reduction, disposal of pollutants amount need to monitor some enterprise or mechanism
Carbon emission, disposal of pollutants data are calculated.But as Energy Management Contract scene, discharge enterprise managing scene,
Having the ability, which also has motivation to carry out data, plays tricks, never believable data acquisition modes.In this kind of situation, it can be arranged in carbon
Put, include described in the key point of the outlet of disposal of pollutants and whole flow process equipment setting this patent sensor information collection
And it is submitted to the device of block chain network, finally trust data is uploaded on block chain, as calculating carbon emission amount and pollution
The foundation of discharge amount.
Application scenarios three
The fugitive personnel's scene of face recognition.As one family's work intelligent image processing company (hereinafter referred to as " AI company ") has oneself
Face recognition processing AI chip.The result of AI chip processing needs to be registered on block chain for subsequent adjustment database or improvement
Algorithm uses.Camera resource is not owned by AI company, while the requirement based on data processing instantaneity and data privacy,
The owning side of camera resource requires the preposition placement of AI chip, is controlled nearby by camera resource side, and AI company has AI no longer
The control of chip.In this case, how to guarantee the algorithm of AI built-in chip type and parameter is that AI company sets oneself, nothing
Method is modified by camera resource side, how to guarantee that the data saved on block chain are the AI chip processing numbers without revising later
According to, become problem urgently to be resolved, using the embodiment of the present invention the information collection comprising AI chip and be submitted to block link network
The device of network can solve the above problems.
Application scenarios four
Credit record analyzes scene.Such as remote agricultural artificial intelligence control company (hereinafter referred to as " AI " company) trustee management
Many agricultural greenhouses adjust the factors such as temperature, humidity, fertilizer in greenhouse with its special artificial intelligence software.But agriculture
Equipment inside sparetime university's canopy and agricultural greenhouse is not owned by AI company, is wanted based on data processing instantaneity and data are recessive
It asks, the owning side of agricultural greenhouse resource requires the preposition placement of AI chip, is controlled nearby by agricultural greenhouse resource side.AI company is no longer
Possess the control of AI chip.In this case, how to guarantee the algorithm of AI built-in chip type and parameter is AI company oneself setting
Alright, can not be modified by agricultural greenhouse resource side, how to guarantee the data saved on block chain be after AI chip processing not
Data through revising become problem urgently to be resolved.Using the information collection comprising AI chip and submission of the embodiment of the present invention
Device to block chain network can solve the above problems.
It should be appreciated that exemplary embodiment as described herein is illustrative and be not restrictive.Although being retouched in conjunction with attached drawing
One or more embodiments of the invention is stated, it should be understood by one skilled in the art that not departing from through appended right
In the case where the spirit and scope of the present invention defined by it is required that, the change of various forms and details can be made.
Claims (15)
1. a kind of information collection and the method for being submitted to block chain network, which comprises the following steps:
Under original state, key pair is generated, the public key of cipher key pair is uploaded to ca authentication and is centrally generated digital certificate, the number
Word certificate is saved in certificate management module;
External signal is acquired, transaction data to be signed is formed after the signal collected is handled;
First time signature is carried out to the transaction data to be signed with the private key of cipher key pair, is carried out second with digital certificate
Signature;
Transaction data after signing twice is sent to block chain cochain server, cochain server authentication digital certificate has
The external signal of acquisition is intercepted after effect property and trading signature data are stored on block chain.
2. information collection as described in claim 1 and the method for being submitted to block chain network, which is characterized in that further comprise
Following steps: if detecting under attack, private key is emptied automatically.
3. information collection as claimed in claim 2 and the method for being submitted to block chain network, which is characterized in that the attack package
Include uncap, ultraviolet lighting or electromagnetic interference.
4. information collection as described in claims 1 to 3 is any and the method for being submitted to block chain network, which is characterized in that institute
The private key for stating key pair is non-readable, and public key can export.
5. information collection as described in claims 1 to 3 is any and the method for being submitted to block chain network, which is characterized in that institute
External signal is stated to be acquired by sensor module.
6. information collection as described in claims 1 to 3 is any and the method for being submitted to block chain network, which is characterized in that institute
External signal is stated to be acquired by AI chip module.
7. information collection as described in claims 1 to 3 is any and the method for being submitted to block chain network, which is characterized in that institute
The algorithm for stating signature for the first time is asymmetric signature algorithm.
8. a kind of information collection and the device for being submitted to block chain network, which is characterized in that including information acquisition module, processor
Module, safety zone module and certificate management module,
For the safety zone module in the initial state, generating key pair, the public key of cipher key pair is uploaded to ca authentication
It is centrally generated digital certificate;
The certificate management module is for saving digital certificate;
The information acquisition module is for acquiring external signal;
The processor module is for forming transaction data to be signed after being handled the data-signal collected;Safety
The private key of regions module cipher key pair carries out first time signature, certificate management module number to the transaction data to be signed
Word certificate carries out second and signs;Transaction data after signing twice is sent to block chain cochain server, cochain clothes
The external data signal of acquisition is intercepted after business device verifying digital certificate validity and trading signature data are stored on block chain.
9. information collection as claimed in claim 8 and the device for being submitted to block chain network, which is characterized in that further comprise
It is anti-to crack protective module, if under attack for detecting, private key is emptied automatically.
10. information collection as claimed in claim 9 and the device for being submitted to block chain network, which is characterized in that the attack
Including uncapping, ultraviolet lighting or electromagnetic interference.
11. information collection as described in claim 8 to 10 is any and the device for being submitted to block chain network, which is characterized in that
The information collection is simultaneously submitted to the device of block chain network by overall package into a hardware cell.
12. information collection as described in claim 8 to 10 is any and the device for being submitted to block chain network, which is characterized in that
The private key of the key pair is non-readable, and public key can export.
13. information collection as described in claim 8 to 10 is any and the device for being submitted to block chain network, which is characterized in that
The external signal is acquired by sensor module.
14. information collection as described in claim 8 to 10 is any and the device for being submitted to block chain network, which is characterized in that
The external signal is acquired by AI chip module.
15. information collection as described in claim 8 to 10 is any and the device for being submitted to block chain network, which is characterized in that
The algorithm of the first time signature is asymmetric signature algorithm.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910048147.0A CN109547219A (en) | 2019-01-18 | 2019-01-18 | Information collection and the method and apparatus for being submitted to block chain network |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910048147.0A CN109547219A (en) | 2019-01-18 | 2019-01-18 | Information collection and the method and apparatus for being submitted to block chain network |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109547219A true CN109547219A (en) | 2019-03-29 |
Family
ID=65835623
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910048147.0A Pending CN109547219A (en) | 2019-01-18 | 2019-01-18 | Information collection and the method and apparatus for being submitted to block chain network |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109547219A (en) |
Cited By (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110266711A (en) * | 2019-06-27 | 2019-09-20 | 深圳市科迈爱康科技有限公司 | Data cochain method, apparatus, system and the block chain node of block chain node |
CN110532809A (en) * | 2019-08-21 | 2019-12-03 | 杭州趣链科技有限公司 | A kind of block chain multistage endorsement method based on configuration block |
CN110599143A (en) * | 2019-07-31 | 2019-12-20 | 腾讯科技(深圳)有限公司 | Data processing method, related device and medium |
CN111091380A (en) * | 2019-10-25 | 2020-05-01 | 趣派(海南)信息科技有限公司 | Block chain asset management method based on friend covert verification |
CN111143859A (en) * | 2020-01-07 | 2020-05-12 | 杭州宇链科技有限公司 | Module for collecting credible data and data transmission method |
CN111369731A (en) * | 2020-02-25 | 2020-07-03 | 上海桔品网络科技有限公司 | Intelligent lottery self-service sale system |
CN112150148A (en) * | 2020-09-24 | 2020-12-29 | 普华云创科技(北京)有限公司 | Enterprise asset protection method and system based on block chain technology |
CN112381648A (en) * | 2020-11-11 | 2021-02-19 | 杭州甘道智能科技有限公司 | Module intelligent start-stop control method based on block chain |
CN112487467A (en) * | 2020-12-16 | 2021-03-12 | 广东电网有限责任公司 | Key and method for using key |
CN112738244A (en) * | 2020-12-29 | 2021-04-30 | 合肥达朴汇联科技有限公司 | Block chain audit traceability system |
CN112991060A (en) * | 2021-03-05 | 2021-06-18 | 苏州迈兰德节能环保科技有限公司 | Block chain-based carbon trace data tracking method and device and storage medium |
CN113852674A (en) * | 2021-09-10 | 2021-12-28 | 杭州宇链科技有限公司 | Safe production AI inspection method based on credible data |
CN114743287A (en) * | 2021-03-29 | 2022-07-12 | 万加合一数字科技集团有限公司 | Block chain attendance checking device and method thereof |
CN114978521A (en) * | 2021-03-29 | 2022-08-30 | 姚从洲 | Credible attendance checking method |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20170201385A1 (en) * | 2010-04-30 | 2017-07-13 | T-Central, Inc. | System and method for internet of things (iot) security and management |
CN106972931A (en) * | 2017-02-22 | 2017-07-21 | 中国科学院数据与通信保护研究教育中心 | A kind of method of certificate transparence in PKI |
CN107094155A (en) * | 2017-06-14 | 2017-08-25 | 广东工业大学 | A kind of secure storage method of data and device based on alliance's block chain |
CN107294963A (en) * | 2017-06-14 | 2017-10-24 | 广东工业大学 | A kind of safe encryption method and device of the data based on alliance's block chain |
CN107896150A (en) * | 2017-12-21 | 2018-04-10 | 善林(上海)金融信息服务有限公司 | Link block chain network and the system of Internet of Things |
CN108696514A (en) * | 2018-04-27 | 2018-10-23 | 腾讯科技(深圳)有限公司 | Resource collects task management method, device, storage medium and system |
CN109118223A (en) * | 2018-08-21 | 2019-01-01 | 上海点融信息科技有限责任公司 | For managing the method, apparatus and medium of electronic data in block chain |
-
2019
- 2019-01-18 CN CN201910048147.0A patent/CN109547219A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20170201385A1 (en) * | 2010-04-30 | 2017-07-13 | T-Central, Inc. | System and method for internet of things (iot) security and management |
CN106972931A (en) * | 2017-02-22 | 2017-07-21 | 中国科学院数据与通信保护研究教育中心 | A kind of method of certificate transparence in PKI |
CN107094155A (en) * | 2017-06-14 | 2017-08-25 | 广东工业大学 | A kind of secure storage method of data and device based on alliance's block chain |
CN107294963A (en) * | 2017-06-14 | 2017-10-24 | 广东工业大学 | A kind of safe encryption method and device of the data based on alliance's block chain |
CN107896150A (en) * | 2017-12-21 | 2018-04-10 | 善林(上海)金融信息服务有限公司 | Link block chain network and the system of Internet of Things |
CN108696514A (en) * | 2018-04-27 | 2018-10-23 | 腾讯科技(深圳)有限公司 | Resource collects task management method, device, storage medium and system |
CN109118223A (en) * | 2018-08-21 | 2019-01-01 | 上海点融信息科技有限责任公司 | For managing the method, apparatus and medium of electronic data in block chain |
Non-Patent Citations (2)
Title |
---|
KONSTANTINOS CHRISTIDIS: ""Blockchains and Smart Contracts for the Internet of Things"", 《 IEEE ACCESS ( VOLUME: 4)》 * |
宋鹏程; 沈寓实; 李昂达: ""基于区块链技术的可信任设备及其在物联网中的应用"", 《中国科技信息》 * |
Cited By (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110266711B (en) * | 2019-06-27 | 2022-02-18 | 深圳市科迈爱康科技有限公司 | Data uplink method, device and system of block chain node and block chain node |
CN110266711A (en) * | 2019-06-27 | 2019-09-20 | 深圳市科迈爱康科技有限公司 | Data cochain method, apparatus, system and the block chain node of block chain node |
CN110599143A (en) * | 2019-07-31 | 2019-12-20 | 腾讯科技(深圳)有限公司 | Data processing method, related device and medium |
CN110532809A (en) * | 2019-08-21 | 2019-12-03 | 杭州趣链科技有限公司 | A kind of block chain multistage endorsement method based on configuration block |
CN111091380A (en) * | 2019-10-25 | 2020-05-01 | 趣派(海南)信息科技有限公司 | Block chain asset management method based on friend covert verification |
CN111091380B (en) * | 2019-10-25 | 2023-05-09 | 趣派(海南)信息科技有限公司 | Block chain asset management method based on friend hidden verification |
CN111143859A (en) * | 2020-01-07 | 2020-05-12 | 杭州宇链科技有限公司 | Module for collecting credible data and data transmission method |
CN111369731A (en) * | 2020-02-25 | 2020-07-03 | 上海桔品网络科技有限公司 | Intelligent lottery self-service sale system |
CN112150148A (en) * | 2020-09-24 | 2020-12-29 | 普华云创科技(北京)有限公司 | Enterprise asset protection method and system based on block chain technology |
CN112381648A (en) * | 2020-11-11 | 2021-02-19 | 杭州甘道智能科技有限公司 | Module intelligent start-stop control method based on block chain |
CN112381648B (en) * | 2020-11-11 | 2024-04-05 | 杭州甘道智能科技有限公司 | Block chain-based module intelligent start-stop control method |
CN112487467A (en) * | 2020-12-16 | 2021-03-12 | 广东电网有限责任公司 | Key and method for using key |
CN112738244A (en) * | 2020-12-29 | 2021-04-30 | 合肥达朴汇联科技有限公司 | Block chain audit traceability system |
CN112991060A (en) * | 2021-03-05 | 2021-06-18 | 苏州迈兰德节能环保科技有限公司 | Block chain-based carbon trace data tracking method and device and storage medium |
CN114743287A (en) * | 2021-03-29 | 2022-07-12 | 万加合一数字科技集团有限公司 | Block chain attendance checking device and method thereof |
CN114978521A (en) * | 2021-03-29 | 2022-08-30 | 姚从洲 | Credible attendance checking method |
CN114743287B (en) * | 2021-03-29 | 2024-02-02 | 万加合一数字科技集团有限公司 | Block chain attendance checking device and method thereof |
CN114978521B (en) * | 2021-03-29 | 2024-02-02 | 姚从洲 | Trusted attendance checking method |
CN113852674A (en) * | 2021-09-10 | 2021-12-28 | 杭州宇链科技有限公司 | Safe production AI inspection method based on credible data |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109547219A (en) | Information collection and the method and apparatus for being submitted to block chain network | |
CN108681966B (en) | Information supervision method and device based on block chain | |
Sookhak et al. | Security and privacy of smart cities: a survey, research issues and challenges | |
Si et al. | IoT information sharing security mechanism based on blockchain technology | |
Liu et al. | A blockchain-based decentralized, fair and authenticated information sharing scheme in zero trust internet-of-things | |
Li et al. | Research on the architecture of trusted security system based on the internet of things | |
CN109302405A (en) | Industrial data detection block chain network framework and detection method based on edge calculations | |
CN113495920B (en) | Content auditing system, method and device based on blockchain and storage medium | |
CN113254947B (en) | Vehicle data protection method, system, equipment and storage medium | |
Pulkkis et al. | Blockchain‐Based Security Solutions for IoT Systems | |
CN106789972A (en) | Secret protection and secure access implementation based on distributed heterogeneous mass data | |
Gong et al. | A data privacy protection scheme for Internet of things based on blockchain | |
Jin et al. | Toward secure, privacy-preserving, and interoperable medical data sharing via blockchain | |
Zakaret et al. | Blockchain and secure element, a hybrid approach for secure energy smart meter gateways | |
CN109714169B (en) | Data credible circulation platform based on strict authorization and circulation method thereof | |
Kiruthika et al. | Fusion of IoT, blockchain and artificial intelligence for developing smart cities | |
Akbarfam et al. | Dlacb: Deep learning based access control using blockchain | |
CN115643573A (en) | Privileged account authentication method and system based on dynamic security environment | |
CN113536372B (en) | Data processing method and device and electronic equipment | |
CN112883425B (en) | Block chain-based data processing method and block chain link point | |
CN114024957A (en) | Method for carrying out risk judgment on user behavior in zero trust architecture | |
Mukhopadhyay et al. | Blockchain for IOT | |
Ismail et al. | Blockchain-Based Zero Trust Supply Chain Security Integrated with Deep Reinforcement Learning | |
Parihar et al. | Innovative smart grid solutions for fostering data security and effective privacy preservation | |
CN116910826B (en) | Purchasing data storage and sharing system for electric power equipment bidding |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20200323 Address after: No. 1001, 10 / F, block a, Huaxing Times Square, No. 478, Wensan Road, Xihu District, Hangzhou, Zhejiang Province Applicant after: Hangzhou Xita Technology Co.,Ltd. Address before: 310000 Floor 1301, 1302, Block A, Huaxing Times Square, 478 Wensan Road, Xihu District, Hangzhou City, Zhejiang Province Applicant before: CRYPTAPE Co.,Ltd. |
|
TA01 | Transfer of patent application right | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190329 |
|
RJ01 | Rejection of invention patent application after publication |