CN109547219A - Information collection and the method and apparatus for being submitted to block chain network - Google Patents

Information collection and the method and apparatus for being submitted to block chain network Download PDF

Info

Publication number
CN109547219A
CN109547219A CN201910048147.0A CN201910048147A CN109547219A CN 109547219 A CN109547219 A CN 109547219A CN 201910048147 A CN201910048147 A CN 201910048147A CN 109547219 A CN109547219 A CN 109547219A
Authority
CN
China
Prior art keywords
block chain
submitted
information collection
chain network
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910048147.0A
Other languages
Chinese (zh)
Inventor
王晓亮
卢缃梅
王博
钱靖
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Rivtower Technology Co Ltd
Original Assignee
Cryptape Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Cryptape Co ltd filed Critical Cryptape Co ltd
Priority to CN201910048147.0A priority Critical patent/CN109547219A/en
Publication of CN109547219A publication Critical patent/CN109547219A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Abstract

The invention discloses a kind of information collection and the method and apparatus that are submitted to block chain network, wherein embodiment of the method is the following steps are included: under original state, generate key pair, the public key of cipher key pair is uploaded to ca authentication and is centrally generated digital certificate, and the digital certificate is saved in certificate management module;External signal is acquired, transaction data to be signed is formed after the signal collected is handled;First time signature is carried out to the transaction data to be signed with the private key of cipher key pair, second is carried out with digital certificate and signs;Transaction data after signing twice is sent to block chain cochain server, the external signal of acquisition is intercepted after cochain server authentication digital certificate validity and trading signature data is stored on block chain.

Description

Information collection and the method and apparatus for being submitted to block chain network
Technical field
The invention belongs to block chain technical fields, and in particular to a kind of information collection and the method for being submitted to block chain network With device.
Background technique
Currently, block chain due to its anti-tamper characteristic, is studied by people more and more and is applied to data and deposit card Field, such as it is anti-fake trace to the source, agricultural product are traced to the source, the monitoring of production procedure, the tracking of weather index.
On the one hand, in the cochain such as to chicken farm temperature and humidity environmental data, to record and prove that cultivation process meets certain Kind standard.But all there is loophole at present in the preservation cochain of these data, because not can guarantee the accuracy of information source.Assuming that number According to being collected by sensor first, then this data can be uploaded to a server first, by certain fortune After calculation processing, then by sending transaction to block chain by server after a certain private key signature, finally save the data on block chain. In this process, it does not ensure that before transaction is submitted, data will not be by malicious modification.For example, grasping server access The administrator of permission can modify the data of sensor upload, can also modify to the process and result of data processing, very Extremely, server is when signing to transaction using private key, if data are read by other malicious process in the processor, Private key is leaked, and the user for stealing private key can also upload false data with the private key.
On the other hand, in conjunction with artificial intelligence field, artificial intelligence chip is widely used in the process of data processing, than In face recognition, weather forecasting, industrial equipment control, collect related data and simultaneously handled, to be predicted, be judged and Decision.But preservation cochains of these data crossed by artificial intelligence chip processing be all at present it is leaky, there are safety Hidden danger.Because the algorithmic code that not can guarantee the execution of these artificial intelligence chips is really the algorithmic code set and parameter, The confidence level of result after not can guarantee data processing.Assuming that the data itself for AI processing are acquired by believable sensor And it is coming or being provided by believable third party, then this data can be input into an AI chip and be handled, then will Processing result is exported, and finally processing data are stored on block chain.In this process, it does not ensure that in AI chip The algorithm and parameter of the inside will not be by malicious modifications;Cannot guarantee that AI chip output data before reaching block chain not by It distorts.For example, the administrator for grasping AI chip access authority can modify algorithm and parameter set on chip, it can also be right The process and result of data processing are modified.AI chip is when signing to transaction using private key, if data exist It is read in processor by other malicious process, private key is leaked, and the user for stealing private key can also upload falseness with the private key Data.
Summary of the invention
The technical problem to be solved in the present invention is to provide a kind of information collection and it is submitted to the method and dress of block chain network Set, for by collected external signal in without third-party situation directly by being handled inside this unit, then It is signed by the safety zone of this unit, server is only responsible for signature result to be uploaded to block chain, ensure that the outer of acquisition The confidence level of portion's signal.
In order to solve the above technical problems, the present invention adopts the following technical scheme that:
In a first aspect, a kind of method that the embodiment of the present application provides information collection and is submitted to block chain network, including it is following Step:
Under original state, key pair is generated, the public key of cipher key pair is uploaded to ca authentication and is centrally generated digital certificate, the number Word certificate is saved in certificate management module;
External signal is acquired, transaction data to be signed is formed after the signal collected is handled;
First time signature is carried out to the transaction data to be signed with the private key of cipher key pair, is carried out second with digital certificate Signature;
Transaction data after signing twice is sent to block chain cochain server, cochain server authentication digital certificate has The external signal of acquisition is intercepted after effect property and trading signature data are stored on block chain.
Preferably, it detects under attack if further including steps of, empties private key automatically.
Preferably, the attack include uncap, ultraviolet lighting or electromagnetic interference.
Preferably, the private key of the key pair is non-readable, and public key can export.
Preferably, the external signal is acquired by sensor module.
Preferably, the external signal is acquired by AI chip module.
Preferably, the algorithm of the first time signature is asymmetric signature algorithm.
Second aspect, the embodiment of the present application provide a kind of information collection and are submitted to the device of block chain network, including Information acquisition module, processor module, safety zone module and certificate management module,
For the safety zone module in the initial state, generating key pair, the public key of cipher key pair is uploaded to ca authentication It is centrally generated digital certificate;
The certificate management module is for saving digital certificate;
The information acquisition module is for acquiring external signal;
The processor module is for forming transaction data to be signed after being handled the data-signal collected;Safety The private key of regions module cipher key pair carries out first time signature, certificate management module number to the transaction data to be signed Word certificate carries out second and signs;Transaction data after signing twice is sent to block chain cochain server, cochain clothes The external data signal of acquisition is intercepted after business device verifying digital certificate validity and trading signature data are stored on block chain.
Preferably, further comprise preventing cracking protective module, if under attack for detecting, empty private key automatically.
Preferably, the attack include uncap, ultraviolet lighting or electromagnetic interference.
Preferably, the information collection and the device of block chain network is submitted to by overall package into a hardware cell.
Preferably, the private key of the key pair is non-readable, and public key can export.
Preferably, the external signal is acquired by sensor module.
Preferably, the external signal is acquired by AI chip module.
Preferably, the algorithm of the first time signature is asymmetric signature algorithm.
Using the present invention have it is following the utility model has the advantages that external signal data acquired by acquisition unit after without by third Side, but directly by being handled inside the present apparatus, while being signed again by the safety zone SE of the present apparatus, server is only born Signature result is uploaded to block chain by duty, ensure that device will not be by from acquisition external data to this process of uploading onto the server It kidnaps, will not be modified.Key can prevent bogus attack through the center CA signature authentication in device, ensure that the external letter of acquisition Number confidence level.
Detailed description of the invention
Fig. 1 be the embodiment of the present invention information collection and be submitted to block chain network method step flow chart;
Fig. 2 be the embodiment of the present invention information collection and be submitted to block chain network device structural schematic diagram.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are some of the embodiments of the present invention, instead of all the embodiments.Based on this hair Embodiment in bright, every other implementation obtained by those of ordinary skill in the art without making creative efforts Example, shall fall within the protection scope of the present invention.
Referring to Fig. 1, the invention discloses a kind of information collection and be submitted to block chain network method step flow chart, The following steps are included:
S10 under original state, generates key pair, and the public key of cipher key pair is uploaded to ca authentication and is centrally generated digital certificate, number Word certificate is saved in certificate management module.
The public key of cipher key pair can export herein, and private key is non-readable.In security context (such as before device factory), The public key of generation is uploaded to CA authentication center, and ca authentication center is that the public key issues digital certificate, to prevent other countless The chip spurious information of word certificate.Ca authentication center is also known as ca authentication mechanism, i.e. certificate authority (Certificate Authority) or certification authority agent undertakes in Public Key Infrastructure as third party trusted in e-commerce transaction The responsibility that the legitimacy of public key is examined.Ca authentication center can have many families, and equipment uniquely needs to concern it using producer The device of buying has met ca authentication standard, and the centralization problem for the device production being arranged in the above manner is eliminated with this.
S20 is acquired external signal, and number of deals to be signed is formed after the signal collected is handled According to.
External signal is acquired above, use can be sensor module or AI chip module.
It will be appreciated by persons skilled in the art that sensor module (transducer/sensor) is a kind of detection dress Set, can experience and collect measured information, and collected information can be for conversion into according to certain rules electric signal or its The information output of form needed for him is required with transmission, processing, storage, display, record and the control etc. that meet information.Sensor The characteristics of include micromation, digitlization, intelligence, multifunction, systematization and networking, be to realize automatic detection and control automatically The primary link of system.It is divided into temperature-sensitive element, light-sensitive element, gas sensor, power generally according to the basic perceptional function of sensor module Ten major class such as quick element, magneto sensor, dew cell, acoustic sensor, radioactive ray sensing element, color sensor and the quick element of taste.
AI chip module, i.e. artificial intelligence chip, Artificial Intelligence Chips, also referred to as AI add Fast device calculates card, i.e. the chip module dedicated for a large amount of calculating tasks in processing artificial intelligence application, passes through AI chip The setting of module may make the present invention to combine block chain technical application in various artificial intelligence scenes.
S30 carries out first time signature to the transaction data to be signed with the private key of cipher key pair, with digital certificate into Second of signature of row.
The optional asymmetric signature algorithm of signature algorithm in signature for the first time, concretely ECC (Elliptic Curves Cryptography, elliptic curve cryptography), RSA(Rivest-Shamir-Adleman) or BLS(Boneh-Lynn- Shacham) etc..
Transaction data after signing twice is sent to block chain cochain server, cochain server authentication number by S40 The external signal and trading signature data that acquisition is intercepted after word certificate validity are stored on block chain.
With continued reference to Fig. 1, on the basis of above method embodiment, in order to further ensure the safety of data, this hair Bright embodiment further provides a kind of information collection and the step flow chart of the method that is submitted to block chain network, including following Step:
S10 under original state, generates key pair, and the public key of cipher key pair is uploaded to ca authentication and is centrally generated digital certificate, number Word certificate is saved in certificate management module.
S20 is acquired external signal, and number of deals to be signed is formed after the signal collected is handled According to.
S30 carries out first time signature to the transaction data to be signed with the private key of cipher key pair, with digital certificate into Second of signature of row.
Transaction data after signing twice is sent to block chain cochain server, cochain server authentication number by S40 The external signal and trading signature data that acquisition is intercepted after word certificate validity are stored on block chain.
S50 empties private key if detecting under attack automatically.
Herein under attack include whether to be uncapped, ultraviolet lighting, electromagnetic interference etc., should when encountering above-mentioned attack Module empties private key automatically, to ensure data safety.
It will be appreciated by persons skilled in the art that in the present embodiment in the implementation process of S10 to S40 and a upper embodiment It is identical, details are not described herein.
It is corresponding with embodiment of the present invention method, the embodiment of the invention also provides a kind of information collection and it is submitted to block The device of chain network, including information acquisition module, processor module, safety zone module and certificate management module, wherein safety For in the initial state, generating key pair, the public key of cipher key pair is uploaded to ca authentication and is centrally generated number regions module Certificate;Certificate management module is for saving digital certificate;Information acquisition module is for acquiring external signal;Processor module is used for Transaction data to be signed is formed after the data-signal collected is handled;The private of safety zone module cipher key pair Key carries out first time signature to the transaction data to be signed, and certificate management module carries out second with digital certificate and signs; Transaction data after signing twice is sent to block chain cochain server, cochain server authentication digital certificate validity The external data signal and trading signature data for intercepting acquisition afterwards are stored on block chain.
In each module of above embodiments, the public key of cipher key pair can be exported herein, and private key is non-readable.In security context In (such as before device factory), the public key of generation is uploaded to CA authentication center, and ca authentication center is that the public key issues number Certificate, to prevent the chip spurious information of other nil certificates.Ca authentication center is also known as ca authentication mechanism, i.e., in certificate granting The heart (Certificate Authority) or certification authority agent, as third party trusted in e-commerce transaction, Undertake the responsibility that the legitimacy of public key in Public Key Infrastructure is examined.Ca authentication center can have many families, and equipment is unique using producer It needs to concern that the device of its buying has met ca authentication standard, the device production being arranged in the above manner is eliminated with this Centralization problem.Safety zone module is responsible for the functions such as generation, keeping, data encrypting and deciphering, the trading signature of private key.Safety zone The transaction data that processor module processing generates is signed and is exported with private key by domain module, guarantees that private key cannot be read forever Out.
Safety zone module is referred to as safety chip/chip safety zone/security enclave/ safety Fort: a chip-scale safety zone is an independent safe space, is the black box that an outside can not access.It is exactly credible To appoint module, is the device that can independently carry out key generation, encryption and decryption, inside possesses independent processor and storage unit, Key and characteristic can be stored, encryption and Security Authentication Service are provided.It is encrypted with safety chip, private key is in random number What portion generated, it cannot be read forever, to protect business privacy and data safety.
External signal is acquired by information acquisition module, use can be sensor module or AI chip dies Block.
It will be appreciated by persons skilled in the art that sensor module (transducer/sensor) is a kind of detection dress Set, can experience and collect measured information, and collected information can be for conversion into according to certain rules electric signal or its The information output of form needed for him is required with transmission, processing, storage, display, record and the control etc. that meet information.Sensor The characteristics of include micromation, digitlization, intelligence, multifunction, systematization and networking, be to realize automatic detection and control automatically The primary link of system.It is divided into temperature-sensitive element, light-sensitive element, gas sensor, power generally according to the basic perceptional function of sensor module Ten major class such as quick element, magneto sensor, dew cell, acoustic sensor, radioactive ray sensing element, color sensor and the quick element of taste.
AI chip module, i.e. artificial intelligence chip, Artificial Intelligence Chips, also referred to as AI add Fast device calculates card, i.e. the chip module dedicated for a large amount of calculating tasks in processing artificial intelligence application, passes through AI chip The setting of module may make the present invention to combine block chain technical application in various artificial intelligence scenes.
In order to improve the safety of device, information collection provided in an embodiment of the present invention and the dress for being submitted to block chain network It sets by overall package into a hardware cell.
With continued reference to Fig. 2, on the basis of above-mentioned apparatus embodiment, in order to further ensure the safety of data, this hair Bright embodiment further provides a kind of information collection and is submitted to the device of block chain network, including information acquisition module, place Device module, safety zone module are managed, certificate management module cracks protective module with anti-, and wherein safety zone module is used for initial Under state, key pair is generated, the public key of cipher key pair is uploaded to ca authentication and is centrally generated digital certificate;Certificate management module is used In preservation digital certificate;Information acquisition module is for acquiring external signal;Processor module is used to believe the data collected Transaction data to be signed is formed after number being handled;The private key of safety zone module cipher key pair is to the friendship to be signed Easy data carry out first time signature, and certificate management module carries out second with digital certificate and signs;It will be after signing twice Transaction data is sent to block chain cochain server, and the external number of acquisition is intercepted after cochain server authentication digital certificate validity It is believed that number and trading signature data be stored on block chain;It is anti-to crack protective module, it is automatic clear if under attack for detecting Empty private key.
Herein anti-crack protective module be responsible for monitoring this unit whether uncapped, ultraviolet lighting, electromagnetic interference etc. it is broken The module of attack is solved, when encountering above-mentioned attack, which empties the private key in the module of safety zone automatically, to ensure safety.
It will be appreciated by persons skilled in the art that information acquisition module in the present embodiment, processor module, safety zone Module and certificate management module implementation process are identical as in a upper embodiment, and details are not described herein.
It is specifically being answered in order to which those skilled in the art is better understood on method and apparatus provided in an embodiment of the present invention With the application under scene, corresponding application scenarios will be further enumerated below and are illustrated.But it should be understood that answering below The application range of protection of the embodiment of the present invention is not defined with scene.
Application scenarios one
Energy Management Contract scene.If A system, certain factory is with energy enterprise, the annual energy expenditure expense 10,000,000 in heating/refrigeration. Company B set section energy service technology enterprise, provides Energy Management Contract service.It determines after company B and factory A negotiates at this time by company B is improved and is transformed using the technology and equipment of company B to the equipment and process of factory A, but factory A does not need to prop up in advance Payment is used, and only need to be divided into certain proportion the energy consumption of saving and be given company B.As engineered, second year factory A exists Heating/refrigeration expense is down to 8,000,000, saves 2,000,000, then pays 2,000,000 yuan of half i.e. 1,000,000 yuan to company B, factory A and company B obtains two-win.The above mode is fine, but a problem is had in actual operation, is exactly the acquisition of data in work The place of factory A carries out, and company B is no power control, and data collected are easy to be played tricks by factory A, and factory A is in order to few Payment, which is divided into expense also, motivation fraud.At this point, with information collection provided in an embodiment of the present invention and being submitted to block link network The device of network is just very simple, and factory A need to only install this standard compliant reliable hardware, and assumes deliberately destroy this Equipment, then by the data that this equipment uploads to block chain be it is believable, improvement of terms that company A is obtained, cost reduce Initial data can credibly be recorded, and obtain the trust of company B, both sides, which are divided into also, believable data As foundation.
Application scenarios two
In carbon emission reduction assets, dumping right transaction in assets, carbon emission reduction, disposal of pollutants amount need to monitor some enterprise or mechanism Carbon emission, disposal of pollutants data are calculated.But as Energy Management Contract scene, discharge enterprise managing scene, Having the ability, which also has motivation to carry out data, plays tricks, never believable data acquisition modes.In this kind of situation, it can be arranged in carbon Put, include described in the key point of the outlet of disposal of pollutants and whole flow process equipment setting this patent sensor information collection And it is submitted to the device of block chain network, finally trust data is uploaded on block chain, as calculating carbon emission amount and pollution The foundation of discharge amount.
Application scenarios three
The fugitive personnel's scene of face recognition.As one family's work intelligent image processing company (hereinafter referred to as " AI company ") has oneself Face recognition processing AI chip.The result of AI chip processing needs to be registered on block chain for subsequent adjustment database or improvement Algorithm uses.Camera resource is not owned by AI company, while the requirement based on data processing instantaneity and data privacy, The owning side of camera resource requires the preposition placement of AI chip, is controlled nearby by camera resource side, and AI company has AI no longer The control of chip.In this case, how to guarantee the algorithm of AI built-in chip type and parameter is that AI company sets oneself, nothing Method is modified by camera resource side, how to guarantee that the data saved on block chain are the AI chip processing numbers without revising later According to, become problem urgently to be resolved, using the embodiment of the present invention the information collection comprising AI chip and be submitted to block link network The device of network can solve the above problems.
Application scenarios four
Credit record analyzes scene.Such as remote agricultural artificial intelligence control company (hereinafter referred to as " AI " company) trustee management Many agricultural greenhouses adjust the factors such as temperature, humidity, fertilizer in greenhouse with its special artificial intelligence software.But agriculture Equipment inside sparetime university's canopy and agricultural greenhouse is not owned by AI company, is wanted based on data processing instantaneity and data are recessive It asks, the owning side of agricultural greenhouse resource requires the preposition placement of AI chip, is controlled nearby by agricultural greenhouse resource side.AI company is no longer Possess the control of AI chip.In this case, how to guarantee the algorithm of AI built-in chip type and parameter is AI company oneself setting Alright, can not be modified by agricultural greenhouse resource side, how to guarantee the data saved on block chain be after AI chip processing not Data through revising become problem urgently to be resolved.Using the information collection comprising AI chip and submission of the embodiment of the present invention Device to block chain network can solve the above problems.
It should be appreciated that exemplary embodiment as described herein is illustrative and be not restrictive.Although being retouched in conjunction with attached drawing One or more embodiments of the invention is stated, it should be understood by one skilled in the art that not departing from through appended right In the case where the spirit and scope of the present invention defined by it is required that, the change of various forms and details can be made.

Claims (15)

1. a kind of information collection and the method for being submitted to block chain network, which comprises the following steps:
Under original state, key pair is generated, the public key of cipher key pair is uploaded to ca authentication and is centrally generated digital certificate, the number Word certificate is saved in certificate management module;
External signal is acquired, transaction data to be signed is formed after the signal collected is handled;
First time signature is carried out to the transaction data to be signed with the private key of cipher key pair, is carried out second with digital certificate Signature;
Transaction data after signing twice is sent to block chain cochain server, cochain server authentication digital certificate has The external signal of acquisition is intercepted after effect property and trading signature data are stored on block chain.
2. information collection as described in claim 1 and the method for being submitted to block chain network, which is characterized in that further comprise Following steps: if detecting under attack, private key is emptied automatically.
3. information collection as claimed in claim 2 and the method for being submitted to block chain network, which is characterized in that the attack package Include uncap, ultraviolet lighting or electromagnetic interference.
4. information collection as described in claims 1 to 3 is any and the method for being submitted to block chain network, which is characterized in that institute The private key for stating key pair is non-readable, and public key can export.
5. information collection as described in claims 1 to 3 is any and the method for being submitted to block chain network, which is characterized in that institute External signal is stated to be acquired by sensor module.
6. information collection as described in claims 1 to 3 is any and the method for being submitted to block chain network, which is characterized in that institute External signal is stated to be acquired by AI chip module.
7. information collection as described in claims 1 to 3 is any and the method for being submitted to block chain network, which is characterized in that institute The algorithm for stating signature for the first time is asymmetric signature algorithm.
8. a kind of information collection and the device for being submitted to block chain network, which is characterized in that including information acquisition module, processor Module, safety zone module and certificate management module,
For the safety zone module in the initial state, generating key pair, the public key of cipher key pair is uploaded to ca authentication It is centrally generated digital certificate;
The certificate management module is for saving digital certificate;
The information acquisition module is for acquiring external signal;
The processor module is for forming transaction data to be signed after being handled the data-signal collected;Safety The private key of regions module cipher key pair carries out first time signature, certificate management module number to the transaction data to be signed Word certificate carries out second and signs;Transaction data after signing twice is sent to block chain cochain server, cochain clothes The external data signal of acquisition is intercepted after business device verifying digital certificate validity and trading signature data are stored on block chain.
9. information collection as claimed in claim 8 and the device for being submitted to block chain network, which is characterized in that further comprise It is anti-to crack protective module, if under attack for detecting, private key is emptied automatically.
10. information collection as claimed in claim 9 and the device for being submitted to block chain network, which is characterized in that the attack Including uncapping, ultraviolet lighting or electromagnetic interference.
11. information collection as described in claim 8 to 10 is any and the device for being submitted to block chain network, which is characterized in that The information collection is simultaneously submitted to the device of block chain network by overall package into a hardware cell.
12. information collection as described in claim 8 to 10 is any and the device for being submitted to block chain network, which is characterized in that The private key of the key pair is non-readable, and public key can export.
13. information collection as described in claim 8 to 10 is any and the device for being submitted to block chain network, which is characterized in that The external signal is acquired by sensor module.
14. information collection as described in claim 8 to 10 is any and the device for being submitted to block chain network, which is characterized in that The external signal is acquired by AI chip module.
15. information collection as described in claim 8 to 10 is any and the device for being submitted to block chain network, which is characterized in that The algorithm of the first time signature is asymmetric signature algorithm.
CN201910048147.0A 2019-01-18 2019-01-18 Information collection and the method and apparatus for being submitted to block chain network Pending CN109547219A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910048147.0A CN109547219A (en) 2019-01-18 2019-01-18 Information collection and the method and apparatus for being submitted to block chain network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910048147.0A CN109547219A (en) 2019-01-18 2019-01-18 Information collection and the method and apparatus for being submitted to block chain network

Publications (1)

Publication Number Publication Date
CN109547219A true CN109547219A (en) 2019-03-29

Family

ID=65835623

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910048147.0A Pending CN109547219A (en) 2019-01-18 2019-01-18 Information collection and the method and apparatus for being submitted to block chain network

Country Status (1)

Country Link
CN (1) CN109547219A (en)

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110266711A (en) * 2019-06-27 2019-09-20 深圳市科迈爱康科技有限公司 Data cochain method, apparatus, system and the block chain node of block chain node
CN110532809A (en) * 2019-08-21 2019-12-03 杭州趣链科技有限公司 A kind of block chain multistage endorsement method based on configuration block
CN110599143A (en) * 2019-07-31 2019-12-20 腾讯科技(深圳)有限公司 Data processing method, related device and medium
CN111091380A (en) * 2019-10-25 2020-05-01 趣派(海南)信息科技有限公司 Block chain asset management method based on friend covert verification
CN111143859A (en) * 2020-01-07 2020-05-12 杭州宇链科技有限公司 Module for collecting credible data and data transmission method
CN111369731A (en) * 2020-02-25 2020-07-03 上海桔品网络科技有限公司 Intelligent lottery self-service sale system
CN112150148A (en) * 2020-09-24 2020-12-29 普华云创科技(北京)有限公司 Enterprise asset protection method and system based on block chain technology
CN112381648A (en) * 2020-11-11 2021-02-19 杭州甘道智能科技有限公司 Module intelligent start-stop control method based on block chain
CN112487467A (en) * 2020-12-16 2021-03-12 广东电网有限责任公司 Key and method for using key
CN112738244A (en) * 2020-12-29 2021-04-30 合肥达朴汇联科技有限公司 Block chain audit traceability system
CN112991060A (en) * 2021-03-05 2021-06-18 苏州迈兰德节能环保科技有限公司 Block chain-based carbon trace data tracking method and device and storage medium
CN113852674A (en) * 2021-09-10 2021-12-28 杭州宇链科技有限公司 Safe production AI inspection method based on credible data
CN114743287A (en) * 2021-03-29 2022-07-12 万加合一数字科技集团有限公司 Block chain attendance checking device and method thereof
CN114978521A (en) * 2021-03-29 2022-08-30 姚从洲 Credible attendance checking method

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170201385A1 (en) * 2010-04-30 2017-07-13 T-Central, Inc. System and method for internet of things (iot) security and management
CN106972931A (en) * 2017-02-22 2017-07-21 中国科学院数据与通信保护研究教育中心 A kind of method of certificate transparence in PKI
CN107094155A (en) * 2017-06-14 2017-08-25 广东工业大学 A kind of secure storage method of data and device based on alliance's block chain
CN107294963A (en) * 2017-06-14 2017-10-24 广东工业大学 A kind of safe encryption method and device of the data based on alliance's block chain
CN107896150A (en) * 2017-12-21 2018-04-10 善林(上海)金融信息服务有限公司 Link block chain network and the system of Internet of Things
CN108696514A (en) * 2018-04-27 2018-10-23 腾讯科技(深圳)有限公司 Resource collects task management method, device, storage medium and system
CN109118223A (en) * 2018-08-21 2019-01-01 上海点融信息科技有限责任公司 For managing the method, apparatus and medium of electronic data in block chain

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170201385A1 (en) * 2010-04-30 2017-07-13 T-Central, Inc. System and method for internet of things (iot) security and management
CN106972931A (en) * 2017-02-22 2017-07-21 中国科学院数据与通信保护研究教育中心 A kind of method of certificate transparence in PKI
CN107094155A (en) * 2017-06-14 2017-08-25 广东工业大学 A kind of secure storage method of data and device based on alliance's block chain
CN107294963A (en) * 2017-06-14 2017-10-24 广东工业大学 A kind of safe encryption method and device of the data based on alliance's block chain
CN107896150A (en) * 2017-12-21 2018-04-10 善林(上海)金融信息服务有限公司 Link block chain network and the system of Internet of Things
CN108696514A (en) * 2018-04-27 2018-10-23 腾讯科技(深圳)有限公司 Resource collects task management method, device, storage medium and system
CN109118223A (en) * 2018-08-21 2019-01-01 上海点融信息科技有限责任公司 For managing the method, apparatus and medium of electronic data in block chain

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
KONSTANTINOS CHRISTIDIS: ""Blockchains and Smart Contracts for the Internet of Things"", 《 IEEE ACCESS ( VOLUME: 4)》 *
宋鹏程; 沈寓实; 李昂达: ""基于区块链技术的可信任设备及其在物联网中的应用"", 《中国科技信息》 *

Cited By (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110266711B (en) * 2019-06-27 2022-02-18 深圳市科迈爱康科技有限公司 Data uplink method, device and system of block chain node and block chain node
CN110266711A (en) * 2019-06-27 2019-09-20 深圳市科迈爱康科技有限公司 Data cochain method, apparatus, system and the block chain node of block chain node
CN110599143A (en) * 2019-07-31 2019-12-20 腾讯科技(深圳)有限公司 Data processing method, related device and medium
CN110532809A (en) * 2019-08-21 2019-12-03 杭州趣链科技有限公司 A kind of block chain multistage endorsement method based on configuration block
CN111091380A (en) * 2019-10-25 2020-05-01 趣派(海南)信息科技有限公司 Block chain asset management method based on friend covert verification
CN111091380B (en) * 2019-10-25 2023-05-09 趣派(海南)信息科技有限公司 Block chain asset management method based on friend hidden verification
CN111143859A (en) * 2020-01-07 2020-05-12 杭州宇链科技有限公司 Module for collecting credible data and data transmission method
CN111369731A (en) * 2020-02-25 2020-07-03 上海桔品网络科技有限公司 Intelligent lottery self-service sale system
CN112150148A (en) * 2020-09-24 2020-12-29 普华云创科技(北京)有限公司 Enterprise asset protection method and system based on block chain technology
CN112381648A (en) * 2020-11-11 2021-02-19 杭州甘道智能科技有限公司 Module intelligent start-stop control method based on block chain
CN112381648B (en) * 2020-11-11 2024-04-05 杭州甘道智能科技有限公司 Block chain-based module intelligent start-stop control method
CN112487467A (en) * 2020-12-16 2021-03-12 广东电网有限责任公司 Key and method for using key
CN112738244A (en) * 2020-12-29 2021-04-30 合肥达朴汇联科技有限公司 Block chain audit traceability system
CN112991060A (en) * 2021-03-05 2021-06-18 苏州迈兰德节能环保科技有限公司 Block chain-based carbon trace data tracking method and device and storage medium
CN114743287A (en) * 2021-03-29 2022-07-12 万加合一数字科技集团有限公司 Block chain attendance checking device and method thereof
CN114978521A (en) * 2021-03-29 2022-08-30 姚从洲 Credible attendance checking method
CN114743287B (en) * 2021-03-29 2024-02-02 万加合一数字科技集团有限公司 Block chain attendance checking device and method thereof
CN114978521B (en) * 2021-03-29 2024-02-02 姚从洲 Trusted attendance checking method
CN113852674A (en) * 2021-09-10 2021-12-28 杭州宇链科技有限公司 Safe production AI inspection method based on credible data

Similar Documents

Publication Publication Date Title
CN109547219A (en) Information collection and the method and apparatus for being submitted to block chain network
CN108681966B (en) Information supervision method and device based on block chain
Sookhak et al. Security and privacy of smart cities: a survey, research issues and challenges
Si et al. IoT information sharing security mechanism based on blockchain technology
Liu et al. A blockchain-based decentralized, fair and authenticated information sharing scheme in zero trust internet-of-things
Li et al. Research on the architecture of trusted security system based on the internet of things
CN109302405A (en) Industrial data detection block chain network framework and detection method based on edge calculations
CN113495920B (en) Content auditing system, method and device based on blockchain and storage medium
CN113254947B (en) Vehicle data protection method, system, equipment and storage medium
Pulkkis et al. Blockchain‐Based Security Solutions for IoT Systems
CN106789972A (en) Secret protection and secure access implementation based on distributed heterogeneous mass data
Gong et al. A data privacy protection scheme for Internet of things based on blockchain
Jin et al. Toward secure, privacy-preserving, and interoperable medical data sharing via blockchain
Zakaret et al. Blockchain and secure element, a hybrid approach for secure energy smart meter gateways
CN109714169B (en) Data credible circulation platform based on strict authorization and circulation method thereof
Kiruthika et al. Fusion of IoT, blockchain and artificial intelligence for developing smart cities
Akbarfam et al. Dlacb: Deep learning based access control using blockchain
CN115643573A (en) Privileged account authentication method and system based on dynamic security environment
CN113536372B (en) Data processing method and device and electronic equipment
CN112883425B (en) Block chain-based data processing method and block chain link point
CN114024957A (en) Method for carrying out risk judgment on user behavior in zero trust architecture
Mukhopadhyay et al. Blockchain for IOT
Ismail et al. Blockchain-Based Zero Trust Supply Chain Security Integrated with Deep Reinforcement Learning
Parihar et al. Innovative smart grid solutions for fostering data security and effective privacy preservation
CN116910826B (en) Purchasing data storage and sharing system for electric power equipment bidding

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20200323

Address after: No. 1001, 10 / F, block a, Huaxing Times Square, No. 478, Wensan Road, Xihu District, Hangzhou, Zhejiang Province

Applicant after: Hangzhou Xita Technology Co.,Ltd.

Address before: 310000 Floor 1301, 1302, Block A, Huaxing Times Square, 478 Wensan Road, Xihu District, Hangzhou City, Zhejiang Province

Applicant before: CRYPTAPE Co.,Ltd.

TA01 Transfer of patent application right
RJ01 Rejection of invention patent application after publication

Application publication date: 20190329

RJ01 Rejection of invention patent application after publication