CN114117553B - Block chain-based control method and system for Internet of things terminal - Google Patents

Block chain-based control method and system for Internet of things terminal Download PDF

Info

Publication number
CN114117553B
CN114117553B CN202210103688.0A CN202210103688A CN114117553B CN 114117553 B CN114117553 B CN 114117553B CN 202210103688 A CN202210103688 A CN 202210103688A CN 114117553 B CN114117553 B CN 114117553B
Authority
CN
China
Prior art keywords
intelligent contract
instruction information
internet
control instruction
block chain
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210103688.0A
Other languages
Chinese (zh)
Other versions
CN114117553A (en
Inventor
戴聪棋
彭洪宝
杨耀威
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Haoersai Smart Metro Technology Co ltd
Original Assignee
Beijing Haoersai Smart Metro Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Haoersai Smart Metro Technology Co ltd filed Critical Beijing Haoersai Smart Metro Technology Co ltd
Priority to CN202210103688.0A priority Critical patent/CN114117553B/en
Publication of CN114117553A publication Critical patent/CN114117553A/en
Application granted granted Critical
Publication of CN114117553B publication Critical patent/CN114117553B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16YINFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
    • G16Y30/00IoT infrastructure
    • G16Y30/10Security thereof
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16YINFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
    • G16Y40/00IoT characterised by the purpose of the information processing
    • G16Y40/50Safety; Security of things, users, data or systems

Abstract

The application discloses a control method and system of an Internet of things terminal based on a block chain. The control method comprises the following steps: the first block chain link point writes first control instruction information for controlling the Internet of things terminal into a first intelligent contract and broadcasts the first intelligent contract; performing double check on the first intelligent contract and the first block chain node by the second block chain node point receiving the first intelligent contract; and when the double verification is passed, the second block chain node links the first intelligent contract and sends first control instruction information to the Internet of things terminal. The technical problems that the control instruction information is easy to be attacked by hackers and the device instruction data is unsafe can be solved by carrying out hash value verification and intelligent contract consensus verification on the control instruction information.

Description

Block chain-based control method and system for Internet of things terminal
Technical Field
The application relates to the technical field of Internet of things, in particular to a control method and a control system for an Internet of things terminal based on a block chain.
Background
The security authentication authority control in the existing Internet of things system and most software systems is realized based on an Abac mode. The security problem is easily caused by singly using an Abac mode to realize the security control of the authority. The Ddos attack, brute force to crack the database and the like have great influence on the Internet of things system.
According to Gartner's forecast, the number of internet of things devices will exceed 200 billion in 2020, and the economic impact on industry and manufacturing will reach trillion dollars. The dramatic increase in the number of devices in the internet of things poses new security risks and challenges to the internet of things system. For example, in 2018, researchers at the university of KU Leuven, belgium, found that by intercepting the signal from the fob of a tesla car, the key could be obtained to unlock the car. As another example, in 2018, the U.S. vendor Avanti was hacked into personal information such as user credit cards and biometric identification.
Generally, people divide the internet of things into three-layer architectures. Each level of the three-level architecture faces different security issues: (1) security of the sensing layer: the resources of the internet of things equipment of the sensing layer are relatively limited, complex security schemes cannot be realized, and the internet of things equipment is easily subjected to security threats such as spoofing attack, impersonation attack and copying attack. (2) And (4) security of a transmission layer: the transport layer is vulnerable to security threats such as DDos attacks, asynchronous attacks, information tampering and the like. (3) And (3) application layer security: generally, the application layer of the internet of things adopts a centralized cloud platform scheme. Although the cloud platform scheme can bring the advantage of computing power and can provide interfaces of various standards for the use of the internet of things equipment, the problems of single-point failure, resource waste and the like are also brought.
Therefore, it is necessary to provide a technical solution that can solve the technical problem of insecurity of device instruction data, which is easy to hack.
Disclosure of Invention
The embodiment of the application provides a technical scheme with high safety degree suitable for the Internet of things, and the technical scheme is used for solving the technical problems that the technical scheme is easy to attack by hackers and the device instruction data is unsafe.
The application provides a control method of an Internet of things terminal based on a block chain, which comprises the following steps:
the first block chain link point writes first control instruction information for controlling the Internet of things terminal into a first intelligent contract and broadcasts the first intelligent contract;
performing double check on the first intelligent contract and the first block chain node by the second block chain node point receiving the first intelligent contract;
and when the double verification is passed, the second block chain node links the first intelligent contract and sends first control instruction information to the Internet of things terminal.
Further, the second block link point receiving the first intelligent contract performs double check on the first intelligent contract and the first block link node, including:
carrying out hash value verification on the first intelligent contract to verify whether the first intelligent contract is tampered;
and carrying out consensus algorithm verification on the first block chain link point so as to verify the credibility of the first block chain node.
Further, the hash value check and the consensus algorithm check are executed in series, or the hash value check and the consensus algorithm check are executed in parallel.
Further, after the second blockchain node sends the first control instruction information to the internet of things terminal, a token for indicating that the instruction is successfully issued safely is returned to the internet of things server serving as a source of the first control instruction information.
Further, performing consensus algorithm check on the first block link point to verify trustable performance of the first block link node specifically includes:
verifying trustworthiness of the first blockchain node using at least one of a workload attestation PoW, a rights attestation PoS, an authorized work attestation DPoS, and a Byzantine fault tolerance algorithm.
Further, when the double check passes, the second block link point links the first intelligent contract, specifically including:
acquiring a first block which takes a first intelligent contract as transaction content and a first hash value of the first block;
writing second control instruction information for controlling the terminal of the Internet of things into a second intelligent contract;
generating a second block using the second intelligent contract as the transaction content and a second hash value using the second intelligent contract as the block of the transaction content according to the first hash value and the second intelligent contract;
broadcasting the second chunk and the second hash value.
Further, the first block further includes:
a random check number for the first control instruction information; or
And sending the user identity information of the first control instruction information.
Further, before the step of writing the first control instruction information into the first intelligent contract at the first block link point, the control method further includes:
and carrying out hash value verification on the first control instruction information to verify whether the first control instruction information is tampered.
Furthermore, the first block chain link point broadcasts the first intelligent contract in an idempotent mode, so that only one node in a plurality of nodes receiving the first intelligent contract is used as a second block chain link point to perform double check.
The application also provides a control system at thing networking terminal based on block chain, includes:
a first blockchain node comprising a first processor and a first memory storing instructions, the first processor configured to execute the instructions stored by the first memory to implement:
writing first control instruction information for controlling the terminal of the Internet of things into a first intelligent contract and broadcasting the first intelligent contract;
a second blockchain node comprising a second processor and a second memory storing instructions, the second processor configured to execute the instructions stored by the second memory to implement:
receiving a first intelligent contract and performing double check on the first intelligent contract and a first block chain node;
and when the double verification is passed, chaining the first intelligent contract and sending first control instruction information to the terminal of the Internet of things.
The embodiment provided by the application has at least the following beneficial effects:
the technical problems that the control instruction information is easy to be attacked by hackers and the device instruction data is unsafe can be solved by carrying out hash value verification and intelligent contract consensus verification on the control instruction information.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the application and together with the description serve to explain the application and not to limit the application. In the drawings:
fig. 1 is a schematic flowchart of a control method for a terminal of the internet of things based on a block chain according to an embodiment of the present application.
Fig. 2 is a schematic diagram illustrating hash value verification of instruction information in an implementation process of the control method for the internet of things terminal according to the embodiment of the present application.
Fig. 3 is a schematic diagram illustrating consensus algorithm verification performed on instruction information in an implementation process of the control method for the internet of things terminal according to the embodiment of the present application.
Fig. 4 is a schematic structural diagram of a control system of an internet of things terminal based on a block chain according to an embodiment of the present application.
Fig. 5 is a schematic diagram of an implementation process of a control method for an internet of things terminal according to an embodiment of the present application.
Fig. 6 is a schematic flowchart of instruction information in an authentication process according to an embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the technical solutions of the present application will be described in detail and completely with reference to the following specific embodiments of the present application and the accompanying drawings. It should be apparent that the described embodiments are only some of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
For convenience of description, terms referred to in the present application will be understood in the following description unless otherwise specified. The blockchain is a concatenated literal record cryptographically concatenated and protected with content. The concatenated word records are also called blocks. Each chunk contains the previous chunk cryptographic hash, timestamp and transaction data. The timestamp certifies that the transaction data was present at the time the block was issued. The block holds a batch of valid transaction data. These transaction data are hashed and encoded into a hash tree (also known as a blacktree). Hash trees are a tree-like data structure in cryptography and computer science. Each leaf node is tagged with the hash of the data block, and nodes other than the leaf node are tagged with the encrypted hashes of their child node tags. Each block contains a cryptographic hash of a previous block in the chain of blocks, linking the blocks to form the chain of blocks. In the application, the transaction data part is embodied as control instruction information for the internet of things equipment.
The internet of things is a system for interconnecting computing equipment, machinery and digital machines. Each unit in the internet of things, such as computing devices, machines, digital machines, has a universal Unique Identification (UID) and the ability to transmit data over a network.
The terminal of the internet of things is a concrete implementation form of the unit of the internet of things. The internet of things terminal usually embodies a specific computing device, a mechanical or digital machine with certain data processing functions. Specifically, for example, a lamp having an intelligent chip, an air conditioner having an intelligent chip, an automobile having an automatic driving function, a processing machine tool of an intelligent factory, and the like. In the following description, unless otherwise specified, an internet of things terminal, an internet of things device (herein or simply "device") may be considered as synonyms. In different contexts, different expressions are used only for convenience of description and conformity with the expression habits in daily life.
Referring to fig. 1, fig. 1 is a flowchart illustrating a control method for a terminal of the internet of things based on a block chain according to an embodiment of the present disclosure. The control method of the Internet of things terminal based on the block chain comprises the following steps:
s100: the first block chain link point writes first control instruction information for controlling the internet of things terminal into the first intelligent contract and broadcasts the first intelligent contract.
The first blockchain node is referred to herein as a local terminal that provides blockchain services, and may also be an internet of things server. In one embodiment, the first blockchain node is a terminal providing a blockchain service, and the first control instruction information processed by the first blockchain node is received from the internet of things server, that is, in this embodiment, the control method may further include the steps of: and the Internet of things server sends first control instruction information for controlling the Internet of things terminal to the first block chain node. The local terminal may be one of several computers. In the embodiment provided by the application, the computer receives the first control instruction information as a node in the block chain.
The control instruction can be understood as an instruction sent by a user and expecting the terminal of the internet of things to change or adjust to a certain state. The control command is usually represented as a command to perform some action directed to some end-point of the internet of things having a universally Unique Identification (UID). For example, a pointing smart light fixture with a universally Unique Identification (UID) is lit or extinguished.
The user can send out a control instruction aiming at the equipment of the Internet of things through the application program of the Internet of things. For example, a user performs operations such as triggering a button on a user interface provided by an internet of things application program through the internet of things application program running on the mobile terminal. The trigger button behavior of the user is regarded as that the user enters an instruction for expecting the terminal of the internet of things to execute a certain action to reach a certain state by the application program of the internet of things and the corresponding relation between the executable coding sequence of the computer defined by the application program of the internet of things and the behavior mode.
The internet of things application program can be understood as an interface provided by the internet of things for a user. In a typical implementation form, the internet of things application program can be understood as an APP loaded and running on the mobile terminal. In another exemplary implementation form, the internet of things application program may be understood as a webpage provided for the user to access by the internet of things. The user can register in the application program of the Internet of things and manage the personal user interface of the Internet of things according to the authority. It is easy to understand that the user can manage the internet of things through the personal identification number and the corresponding password. Here, the management may be understood as registration and deregistration management of a user account, setting and changing management of a password, management of joining and deleting of devices of the internet of things, management of an operation of a terminal of the internet of things, and the like. Furthermore, the internet of things server can receive the control instruction, and generate first control instruction information for controlling the internet of things terminal to execute corresponding operations after analyzing the control instruction. In one embodiment, the internet of things server directly generates first control instruction information for controlling the internet of things terminal.
An intelligent contract is a piece of code that can run in a blockchain. The smart contract may be deployed in a computer. The smart contracts may provide various services during execution, such as services that may be used to monitor the consumption of broadband resources in the network, authorize device access, messaging, and so forth. In the embodiment provided by the application, the intelligent contract is mainly used for controlling the Internet of things equipment or the Internet of things terminal. Of course, the intelligent contract can have other optimization or customization functions besides meeting the basic functions of the internet of things equipment or the internet of things terminal control. The smart contract may provide a call interface. The execution main body of the intelligent contract can realize the editing of the intelligent contract by calling the calling interface of the intelligent contract. For example, the writing of control command information here. The control instruction information written into the intelligent contract can be a component of the intelligent contract. As a component of the intelligent contract, the control instruction information can be plaintext or ciphertext.
In one embodiment, the control system further includes an internet of things server (not shown). The internet of things server can receive a control request which is sent by a user in an internet of things application program and aims at the internet of things terminal, encrypts first control instruction information corresponding to the control request to form encrypted first control instruction information, and sends the encrypted first control instruction information to the first block chain node. The first block chain node writes the first control command information into a first intelligent contract; the first block link point broadcasts a first smart contract.
In one embodiment, the internet of things server encrypts the first control instruction information to form encrypted first control instruction information, where the encryption may use various encryption algorithms. The encrypted first control instruction information may be decrypted before being executed. The subject application is not intended to be limited or required. In one embodiment, the first control command information is recovered by decrypting the encrypted first control command information received by the first block link node.
The first block chain node broadcasts a first intelligent contract, wherein the first intelligent contract is a specific intelligent contract in a plurality of intelligent contracts for clearly explaining the execution process of the control method of the block chain-based internet of things terminal. Here it is explicitly specified a first smart contract written with first control instruction information.
Further, in an embodiment provided by the present application, before the step of writing the first control instruction information into the first intelligent contract at the first block link point, the control method further includes:
and carrying out hash value verification on the first control instruction information to verify whether the first control instruction information is tampered.
The hash value verification is carried out on the first control instruction information, so that the first control instruction information can be prevented from being tampered. When the file recorded with the control instruction information is modified, the modified file forms a new hash value. Therefore, the hash value verification is carried out on the control instruction information, and the control instruction information can be prevented from being tampered.
In the above control method of the terminal of the internet of things based on the block chain, the block chain service and the service of the internet of things are independent of each other. The first block chain link point providing the block chain service is also used as an equipment contract admission node, and the service of writing the first control instruction information into the first intelligent contract is provided.
S200: the second block link point that receives the first intelligent contract performs a double check for the first intelligent contract and the first block chain node.
Further, in one embodiment provided herein, the first block link point broadcasts the first intelligent contract in an idempotent manner, such that only one of the plurality of nodes receiving the first intelligent contract performs double check as the second block link point.
Specifically, the first intelligent contract is broadcasted after idempotent calculation, and only one node in a plurality of nodes receiving the first intelligent contract is used as a second block link point to perform double check. That is, the second block link point may determine that one of the plurality of nodes performs the check through the associated message processing service.
Further, in one embodiment provided herein, the performing a double check on the first intelligent contract and the first blockchain node by the second block link point receiving the first intelligent contract includes: carrying out hash value verification on the first intelligent contract to verify whether the first intelligent contract is tampered; and carrying out consensus algorithm verification on the first block chain link point so as to verify the credibility of the first block chain node.
Specifically, like the first blockchain node, the second blockchain node is a specific one of the computers that support blockchain technology and provide blockchain services. Here, the receiver of the first intelligent contract of the first block-node broadcast is understood. Through the hash value check, whether the file is tampered or not can be identified. It will be appreciated that a file has a unique hash value. The hash value that characterizes the uniqueness of the file changes whenever the content of the file changes. Therefore, the authenticity of the first smart contract can be identified by the hash value check, i.e. whether the first smart contract is tampered with is verified. Meanwhile, the first block chain link point is verified through a protocol which is followed by the block chain link points together, and the trustiness of the first block chain node can be verified through a consensus algorithm. Fig. 2 is a schematic diagram illustrating hash value verification of instruction information in an implementation process of a control method for an internet of things terminal provided in an embodiment of the present application, where the schematic diagram includes: s021: the instruction information is written into the intelligent contract. S022: and checking the hash value of the instruction information. S023: and after the verification is passed, the sending block processing node carries out processing. S024: and finishing the operation after the treatment is finished. Fig. 3 is a schematic diagram illustrating consensus algorithm verification performed on instruction information in an implementation process of a control method for an internet of things terminal according to an embodiment of the present application, where the schematic diagram includes: s017: the command information enters the blockchain module. S018: and carrying out consensus algorithm verification on the instruction information. S019: and after the verification is passed, packaging and issuing the instruction information. S020: and (4) packaging the distributed data uplink.
Further, in an embodiment provided by the present application, the hash value verification and the consensus algorithm verification are performed in series, or the hash value verification and the consensus algorithm verification are performed in parallel.
It should be noted that, in the two verification methods of performing hash value verification on the first smart contract to verify whether the first smart contract is tampered, and performing consensus algorithm verification on the first block link node to verify the trustiness of the first block chain node, the two verification methods may be performed in series, or may be performed in parallel with the hash value verification and the consensus algorithm verification.
It should also be noted that since the hash value verification consumes little calculation power, the consumption of calculation power can be avoided. That is to say, when the hash value check of the first intelligent contract is not passed, the subsequent process is not performed, and the initial state is directly returned.
Further, in an embodiment provided in the present application, the performing consensus algorithm check on the first block link point to verify trustiness of the first block link node specifically includes: verifying trustworthiness of the first blockchain node using at least one of a workload attestation PoW, a rights attestation PoS, an authorized work attestation DPoS, and a Byzantine fault tolerance algorithm.
Proof of Work (PoW) is a mechanism that corresponds to service and resource abuse, or denial of service attacks. The most common technical principle of workload proof is the hash function. Since an arbitrary value of the argument n of the hash function corresponds to a result of the hash function h (n), and the argument n causes an avalanche effect only by changing one bit, it is almost impossible to reverse the argument n from h (n), so that the workload certification can be achieved by specifying and searching the characteristics of h (n) and performing a large number of exhaustive operations by the user. In such an embodiment, the first block link point provides a workload proof that the first block link point is not a malicious attacker. The credibility of the first block chain node can indirectly prove the safety of the first control instruction information loaded in the first intelligent contract.
Proof of rights (POS) is also known as stock Proof. The equity certification mode allocates the corresponding derived resources according to the amount and time of resources held by the equity parties. The resource may generally be understood as a corresponding token. Derived resources may be understood as holding the corresponding interest in the token. If the rightful party completes one verification, for example, signs one block, the resource amount of the rightful party is deducted accordingly, and the rightful party must wait for the time set by the rule for the next verification. In such an embodiment, the first block link point consumes certain resources, thereby proving that the first block link point is not a malicious attacker. The credibility of the first block chain node can indirectly prove the safety of the first control instruction information loaded in the first intelligent contract.
Proof of authorized work (DPoS), also called a certificate of authority mechanism or a trusted authority mechanism. And the intelligent contract node selects a plurality of representative nodes for block generation. If the representative node fails to generate a block when it is its turn, the representative node is removed. In this embodiment, the first block link point is selected as the representative node. The first block link point acts as a victim, so that it can be proven that the first block link point is not a malicious attacker. The credibility of the first block chain node can indirectly prove the safety of the first control instruction information loaded in the first intelligent contract.
Features of the Byzantine fault-tolerant algorithm: the information transmitted between the servers can be known by a third party, but the content of the information cannot be falsified and forged and the integrity of the information cannot be verified. In such an embodiment, when the first block link point is verified as a byzantine node by the byzantine fault tolerance algorithm, the first block link point may be proved to be not a malicious attacker. The credibility of the first block chain node can indirectly prove the safety of the first control instruction information loaded in the first intelligent contract.
In summary, the consensus algorithm check is performed on the first block link point to prove that the first block link point is not a malicious attacker. The credibility of the first block chain node can indirectly prove the safety of the first control instruction information loaded in the first intelligent contract.
S300: and when the double verification is passed, the second block chain node links the first intelligent contract and sends first control instruction information to the Internet of things terminal.
It is understood that the first intelligent contract uplink here means that the first intelligent contract which is recorded with the first control instruction is broadcast and issued in the blockchain and is widely accepted, namely, accounting is generally known.
Further, in an embodiment provided herein, when the double check passes, the second block link point links the first intelligent contract, specifically including: acquiring a first block which takes a first intelligent contract as transaction content and a first hash value of the first block; writing second control instruction information for controlling the terminal of the Internet of things into a second intelligent contract; generating a second block using the second intelligent contract as the transaction content and a second hash value using the second intelligent contract as the block of the transaction content according to the first hash value and the second intelligent contract; broadcasting the second chunk and the second hash value.
And the second control instruction information is sent by the user at the second time in the application program of the internet of things and aiming at the terminal of the internet of things. It is understood that the blockchain is a concatenated literal record cryptographically concatenated and protected from content. In the present embodiment, the concatenated text records may be understood as a first smart contract describing first control instruction information. The first intelligent contract carrying the first control instruction information and the time stamp formed by the first intelligent contract may be referred to as a block, which is the content of the concatenated text records. The concatenated literal record corresponds to a unique hash value. When the first block link point broadcasts the block with the first intelligent contract as the content and the hash value corresponding to the block outwards, the second block link point can acquire the block with the first intelligent contract as the content and the hash value corresponding to the block.
The block whose content is the timestamp formed by the first intelligent contract and the hash value corresponding to the block can be regarded as the current block and the hash value corresponding to the current block. The current chunk and the hash value corresponding to the current chunk may be part of the content of the next chunk. The content of the next chunk includes, in addition to the current chunk and the hash value corresponding to the current chunk, a second smart contract and a timestamp formed by the second smart contract. Of course, the second smart contract records the second control instruction information. And the second control instruction information is sent by the user at a second time in the application program of the internet of things aiming at the terminal of the internet of things. The formation of the second control instruction information here occurs after the timing of the first control instruction information. The second control instruction information may be another control instruction information issued by the same user after the first control instruction information is issued, or another control instruction information issued by another user after the timing of the first control instruction information.
The next block at least comprises the current block, a hash value corresponding to the current block, a second intelligent contract in which second control instruction information is recorded and a time stamp formed by the second intelligent contract. The hash value of the next chunk uniquely corresponds to the content of the next chunk.
When the first intelligent contract is not tampered and the first block link point is credible, the second block link point broadcasts the next block and the hash value corresponding to the next block. The current block, the hash value corresponding to the current block, the first intelligent contract that is a part of the current regional content, and the first control command recorded by the first intelligent contract become an unalterable part of the block chain over time, and are continuously transmitted in the block chain, that is, the uplink of the first intelligent contract is completed or the uplink of the first control command is completed. In other words, so-called billing.
Further, in an embodiment provided in the present application, the first block further includes: a random check number for the first control instruction information; or user identity information which sends out the first control instruction information.
It should be appreciated that the first control instruction writes to a first blockchain node of the first intelligent contract that is an intelligent contract admission node, which may be verified by a random check number before generating the chunk-stored hash value. By the method, the safety of the first block chain node is improved. In another embodiment, the random check number may be understood as a way to adjust the workload proof such that a subsequent node of the second blockchain node verifies that the second blockchain node belongs to a non-malicious attacker. That is, here, five-dimensional information of the current block, the hash value corresponding to the current block, the second intelligent contract in which the second control instruction information is written, the time stamp formed by the second intelligent contract, and the random check number are used as input information for generating the next block and the hash value corresponding to the next block.
And sending the user identity information of the first control instruction information. Here, the current block, the hash value corresponding to the current block, the second intelligent contract in which the second control instruction information is written, the time stamp formed by the second intelligent contract, and the user identification information from which the first control instruction information is issued are used as the five-dimensional information as the input information for generating the next block and the hash value corresponding to the next block. This may reflect the user's behavior pattern. For example, the user has never made a malicious attack, i.e., a trustworthy user. Therefore, the users can be distinguished conveniently according to the behavior patterns of the users, and the diversification of products based on the user classification is realized.
Further, in an embodiment provided by the present application, after the second blockchain node sends the first control instruction information to the internet of things terminal, a token indicating that the instruction is successfully issued safely is returned to the internet of things server serving as a source of the first control instruction information.
And the second block link point returns the first control instruction information passing the verification to the Internet of things application program or the Internet of things server. And sending the first control instruction information to the Internet of things equipment or the Internet of things terminal pointed by the first control instruction information by the Internet of things server or the Internet of things application program. Here, when the second block link node finishes processing, a token indicating that the first control instruction information is successfully and safely issued may be issued. It is obvious that the transmission or transmission of the first control instruction information is indirectly realized through the transmission or transmission of the first intelligent contract which records the first control instruction information. Certainly, if the first control instruction information is encrypted, a corresponding decryption algorithm program needs to be deployed on the second blockchain node, the internet of things server, or the internet of things device.
In the embodiment provided by the application, the hash value of the first intelligent contract is checked to verify whether the first intelligent contract is tampered, and the consensus algorithm of the first block chain node is checked to verify the trustiness of the first block chain node, so that the technical problems that the first intelligent contract is easy to be hacked and the device instruction data is unsafe can be solved.
Referring to fig. 4, the present application further provides a control system 100 for a terminal of the internet of things based on a block chain, which includes:
a first blockchain node 110 comprising a first processor 111 and a first memory 112 storing instructions, the first processor 111 being configured to execute the instructions stored by the first memory 112 to implement: writing first control instruction information for controlling the terminal of the Internet of things into a first intelligent contract and broadcasting the first intelligent contract; a second blockchain node 120 comprising a second processor 121 and a second memory 122 storing instructions, the second processor 121 being configured to execute the instructions stored by the second memory 122 to implement: receiving a first intelligent contract and performing a double check for the first intelligent contract and the first blockchain node 110; and when the double verification is passed, chaining the first intelligent contract and sending first control instruction information to the terminal of the Internet of things.
In one embodiment, the control system further includes an internet of things server (not shown). The internet of things server may receive a control request for the internet of things terminal, which is sent by a user in an internet of things application program, encrypt first control instruction information corresponding to the control request to form encrypted first control instruction information, and send the encrypted first control instruction information to the first block link node 110. The first blockchain node 110 writes the first control instruction information into the first intelligent contract; the first blockchain node 110 broadcasts a first intelligent contract.
In one embodiment, the internet of things server encrypts the first control instruction information to form encrypted first control instruction information, where the encryption may use various encryption algorithms. The encrypted first control instruction information may be decrypted before being executed. The subject application is not intended to be limited or required. After the first blockchain node 110 receives the encrypted first control instruction information, it decrypts the first control instruction information, thereby recovering the first control instruction information.
The first block chain node 110 broadcasts a first intelligent contract, where the first intelligent contract is a specific intelligent contract among a plurality of intelligent contracts for clearly explaining the execution process of the control method of the terminal of the internet of things based on the block chain. Here it is explicitly specified a first smart contract written with first control instruction information.
In a typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, a network interface, and memory. The first processor 111 and the first memory 112 storing instructions, and the first processor 111 and the first memory 112 storing instructions are devices having the same or similar functions as a computer device.
Further, in an embodiment provided in the present application, before the step of writing the first control instruction information into the first intelligent contract by the first blockchain node 110, the control method further includes:
and carrying out hash value verification on the first control instruction information to verify whether the first control instruction information is tampered.
The hash value verification is carried out on the first control instruction information, so that the first control instruction information can be prevented from being tampered. When the file recorded with the control instruction information is modified, the modified file forms a new hash value. Therefore, the hash value verification is carried out on the control instruction information, and the control instruction information can be prevented from being tampered.
In the above control method of the terminal of the internet of things based on the block chain, the block chain service and the service of the internet of things are independent of each other. The first blockchain node 110 providing blockchain services doubles as a device contract admission node providing a service of writing the first control instruction information into the first intelligent contract.
The second blockchain node 120 that receives the first intelligent contract performs a double check against the first intelligent contract and the first blockchain node 110.
Further, in one embodiment provided herein, the first blockchain node 110 broadcasts the first intelligent contract in an idempotent manner, such that only one of the plurality of nodes receiving the first intelligent contract performs double check as the second blockchain node 120.
Specifically, the first intelligent contract is broadcasted after idempotent calculation, so that only one point of the plurality of nodes receiving the first intelligent contract is used as the second block chain node 120 to perform double check. That is, the second blockchain node 120 may determine that it needs to perform a check through an associated message processing service.
Further, in one embodiment provided herein, the second blockchain node 120 that receives the first intelligent contract performs double checking for the first intelligent contract and the first blockchain node 110, including: carrying out hash value verification on the first intelligent contract to verify whether the first intelligent contract is tampered; the consensus algorithm check is performed on the first blockchain node 110 to verify the trustworthiness of the first blockchain node 110.
Specifically, like the first blockchain node 110, the second blockchain node 120 is a specific one of the computers supporting blockchain technology and providing blockchain services. Which may be understood here as the recipient of the first intelligent contract broadcast by the first blockchain node 110. Through the hash value check, whether the file is tampered or not can be identified. It will be appreciated that a file has a unique hash value. The hash value that characterizes the uniqueness of the file changes whenever the content of the file changes. Therefore, the authenticity of the first smart contract can be identified by the hash value check, i.e. whether the first smart contract is tampered with is verified. Meanwhile, in addition to checking the first blockchain node 110 through a protocol followed by the blockchain nodes together, the checking may also be performed through a consensus algorithm to verify the trustness of the first blockchain node 110. Fig. 2 is a schematic diagram illustrating hash value verification of instruction information in an implementation process of a control method for an internet of things terminal provided in an embodiment of the present application, where the schematic diagram includes: s021: the instruction information is written into the intelligent contract. S022: and checking the hash value of the instruction information. S023: and after the verification is passed, the sending block processing node carries out processing. S024: and finishing the operation after the treatment is finished. Fig. 3 is a schematic diagram illustrating consensus algorithm verification performed on instruction information in an implementation process of a control method for an internet of things terminal according to an embodiment of the present application, where the schematic diagram includes: s017: the command information enters the blockchain module. S018: and carrying out consensus algorithm verification on the instruction information. S019: and after the verification is passed, packaging and issuing the instruction information. S020: and (4) packaging the distributed data uplink.
Further, in an embodiment provided by the present application, the hash value verification and the consensus algorithm verification are performed in series, or the hash value verification and the consensus algorithm verification are performed in parallel.
It should be noted that, in the two verification methods of performing hash value verification on the first intelligent contract to verify whether the first intelligent contract is tampered with and performing consensus algorithm verification on the first blockchain node 110 to verify the trustiness of the first blockchain node 110, the two verification methods may be performed in series or performed in parallel.
It should also be noted that since the hash value verification consumes little calculation power, the consumption of calculation power can be avoided. That is to say, when the hash value check of the first intelligent contract is not passed, the subsequent process is not performed, and the initial state is directly returned.
Further, in an embodiment provided in the present application, the performing consensus algorithm check on the first blockchain node 110 to verify the trustiness of the first blockchain node 110 specifically includes: the trustworthiness of the first blockchain node 110 is verified using at least one of a workload proof PoW, a rights proof PoS, an authorized work proof DPoS, a byzantine fault tolerance algorithm.
The consensus algorithm check is performed on the first blockchain node 110 to prove that the first blockchain node 110 is not a malicious attacker. The trustworthiness of the first blockchain node 110 may indirectly prove the security of the first control instruction information carried in the first smart contract.
And when the double check is passed, the second block chain node 120 chains the first intelligent contract and sends first control instruction information to the internet of things terminal. It is understood that the first intelligent contract uplink here means that the first intelligent contract which is recorded with the first control instruction is broadcast and issued in the blockchain and is widely accepted, namely, accounting is generally known.
Further, in an embodiment provided in the present application, when the double check passes, the chaining of the first intelligent contract by the second blockchain node 120 specifically includes: acquiring a first block which takes a first intelligent contract as transaction content and a first hash value of the first block; writing second control instruction information for controlling the terminal of the Internet of things into a second intelligent contract; generating a second block using the second intelligent contract as the transaction content and a second hash value using the second intelligent contract as the block of the transaction content according to the first hash value and the second intelligent contract; broadcasting the second chunk and the second hash value.
And the second control instruction information is sent by the user at the second time in the application program of the internet of things and aiming at the terminal of the internet of things. It is understood that the blockchain is a concatenated literal record cryptographically concatenated and protected from content. In the present embodiment, the concatenated text records may be understood as a first smart contract describing first control instruction information. The first intelligent contract carrying the first control instruction information and the time stamp formed by the first intelligent contract may be referred to as a block, which is the content of the concatenated text records. The concatenated literal record corresponds to a unique hash value. When the first blockchain node broadcasts the block with the first intelligent contract as the content and the hash value corresponding to the block to the outside, the second blockchain node 120 may obtain the block with the first intelligent contract as the content and the hash value corresponding to the block.
The block whose content is the timestamp formed by the first intelligent contract and the hash value corresponding to the block can be regarded as the current block and the hash value corresponding to the current block. The current chunk and the hash value corresponding to the current chunk may be part of the content of the next chunk. The content of the next chunk includes, in addition to the current chunk and the hash value corresponding to the current chunk, a second smart contract and a timestamp formed by the second smart contract. Of course, the second smart contract records the second control instruction information. And the second control instruction information is sent by the user at a second time in the application program of the internet of things aiming at the terminal of the internet of things. The formation of the second control instruction information here occurs after the timing of the first control instruction information. The second control instruction information may be another control instruction information issued by the same user after the first control instruction information is issued, or another control instruction information issued by another user after the timing of the first control instruction information.
The next block at least comprises the current block, a hash value corresponding to the current block, a second intelligent contract in which second control instruction information is recorded and a time stamp formed by the second intelligent contract. The hash value of the next chunk uniquely corresponds to the content of the next chunk.
When the first smart contract is not tampered with and the first blockchain node 110 is trusted, the second blockchain node 120 broadcasts the next chunk and the hash value corresponding to the next chunk. The current block, the hash value corresponding to the current block, the first intelligent contract that is a part of the current regional content, and the first control command recorded by the first intelligent contract become an unalterable part of the block chain over time, and are continuously transmitted in the block chain, that is, the uplink of the first intelligent contract is completed or the uplink of the first control command is completed. In other words, so-called billing.
Further, in an embodiment provided in the present application, the first block further includes: a random check number for the first control instruction information; or user identity information which sends out the first control instruction information.
It should be appreciated that the first control instruction writes to the first blockchain node 110 of the first intelligent contract that is an intelligent contract admission node, which may be verified by a random check number before generating the chunk-stored hash value. This way, an increased security of the first blockchain node 110 is achieved. In another embodiment, the random check number may be understood as a way to adjust the workload proof such that the subsequent nodes of the second blockchain node 120 verify that the second blockchain node 120 belongs to a non-malicious attacker. That is, here, five-dimensional information of the current block, the hash value corresponding to the current block, the second intelligent contract in which the second control instruction information is written, the time stamp formed by the second intelligent contract, and the random check number are used as input information for generating the next block and the hash value corresponding to the next block.
And sending the user identity information of the first control instruction information. Here, the current block, the hash value corresponding to the current block, the second intelligent contract in which the second control instruction information is written, the time stamp formed by the second intelligent contract, and the user identification information from which the first control instruction information is issued are used as the five-dimensional information as the input information for generating the next block and the hash value corresponding to the next block. This may reflect the user's behavior pattern. For example, the user has never made a malicious attack, i.e., a trustworthy user. Therefore, the users can be distinguished conveniently according to the behavior patterns of the users, and the diversification of products based on the user classification is realized.
Further, in an embodiment provided in the present application, after the second blockchain node 120 sends the first control instruction information to the internet of things terminal, a token indicating that the instruction is successfully issued safely is returned to the internet of things server serving as a source of the first control instruction information.
The second blockchain node 120 returns the verified first control instruction information to the internet of things application program or the internet of things server. And sending the first control instruction information to the Internet of things equipment or the Internet of things terminal pointed by the first control instruction information by the Internet of things server or the Internet of things application program. Here, when the second blockchain node 120 finishes the processing, it may issue a token indicating that the first control instruction information is successfully and safely issued. It is obvious that the transmission or transmission of the first control instruction information is indirectly realized through the transmission or transmission of the first intelligent contract which records the first control instruction information. Of course, if the first control instruction information is already encrypted, a corresponding decryption algorithm program needs to be deployed on the second blockchain node 120, the internet of things server, or the internet of things device.
In the specific implementation manner provided by the present application, the hash value of the first intelligent contract is checked to verify whether the first intelligent contract is tampered with, and the consensus algorithm of the first blockchain node 110 is checked to verify the trustiness of the first blockchain node 110, so that the technical problems that the hacking is easy to attack and the device instruction data is not safe can be solved.
Where nothing in detail is said about the control system of the invention, reference is made to method embodiments.
Fig. 5 is a schematic view of an implementation process of a control method for an internet of things terminal according to an embodiment of the present application.
S011: and the user accesses the application of the Internet of things and sends a control request for the terminal of the Internet of things to the platform of the Internet of things (an Internet of things server).
S012: and the Internet of things platform sends the corresponding control instruction information to the block chain to perform block chain encryption and authentication service.
S013: the equipment contract admission node allows data calling and writes a control instruction into the intelligent contract.
S014: and the consensus node acquires the user identity information and verifies the equipment contract access node.
S015: and after the verification is passed, the consensus node returns the user identity information to the block chain authentication service.
S016: the block chain authentication service sends a control command to the Internet of things equipment for execution, and sends the control command to issue a successful token to the Internet of things platform.
Fig. 6 is a schematic flow chart of the instruction information in the authentication process according to the embodiment of the present application.
S025: and the Internet of things platform encrypts and transmits the instruction data.
S026: and performing authentication service on the instruction data by taking the hash value.
S027: and judging whether the node is allowed to be admitted for the equipment contract.
Authentication fails when it is not a device contract admission node.
S028: and when the node is admitted for the equipment contract, the authentication is successful, and the user information of the consensus node is obtained.
Then, step S029, step S031, and step S032 are executed in parallel.
S029: and (4) data uplink.
S031: and returning the user identity information and sending a token which represents that the instruction data is successfully sent.
S032: and sending instruction data so as to be executed by the Internet of things equipment, and feeding back an execution result to the Internet of things platform.
S030: after data is uplinked, the operation for the command data is finished.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The above description is only an example of the present application and is not intended to limit the present application. Various modifications and changes may occur to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the scope of the claims of the present application.

Claims (8)

1. A control method of an Internet of things terminal based on a block chain is characterized by comprising the following steps:
the first block chain link point writes first control instruction information for controlling the Internet of things terminal into a first intelligent contract and broadcasts the first intelligent contract;
performing double check on the first intelligent contract and the first block chain node by the second block chain node point receiving the first intelligent contract;
when the double check is passed, the second block link node links the first intelligent contract and sends first control instruction information to the Internet of things terminal;
the first block chain link point broadcasts a first intelligent contract in an idempotent mode, so that only one node in a plurality of nodes receiving the first intelligent contract is used as a second block chain link point to carry out double check;
wherein, the second block chain link point receiving the first intelligent contract carries out double check aiming at the first intelligent contract and the first block chain node, and the double check comprises the following steps: carrying out hash value verification on the first intelligent contract to verify whether the first intelligent contract is tampered; and carrying out consensus algorithm verification on the first block chain link point so as to verify the credibility of the first block chain node.
2. The control method according to claim 1, wherein the hash value check is performed in series with the consensus algorithm check, or the hash value check is performed in parallel with the consensus algorithm check.
3. The control method according to claim 1, wherein after the second blockchain node sends the first control instruction information to the internet of things terminal, a token indicating that the instruction is successfully issued safely is returned to the internet of things server serving as a source of the first control instruction information.
4. The control method according to claim 1, wherein performing consensus algorithm check on the first blockchain node to verify trustfulness of the first blockchain node comprises:
verifying trustworthiness of the first blockchain node using at least one of a workload attestation PoW, a rights attestation PoS, an authorized work attestation DPoS, and a Byzantine fault tolerance algorithm.
5. The control method of claim 1, wherein when the double check passes, the second block link point links the first intelligent contract, specifically comprising:
acquiring a first block which takes a first intelligent contract as transaction content and a first hash value of the first block;
writing second control instruction information for controlling the terminal of the Internet of things into a second intelligent contract;
generating a second block using the second intelligent contract as the transaction content and a second hash value using the second intelligent contract as the block of the transaction content according to the first hash value and the second intelligent contract;
broadcasting the second chunk and the second hash value.
6. The control method of claim 5, wherein the first block further comprises:
a random check number for the first control instruction information; or
And sending the user identity information of the first control instruction information.
7. The control method according to claim 1, wherein the control method further comprises, before the step of writing the first control instruction information to the first smart contract at the first block link point:
and carrying out hash value verification on the first control instruction information to verify whether the first control instruction information is tampered.
8. The utility model provides a control system at thing networking terminal based on block chain which characterized in that includes:
a first blockchain node comprising a first processor and a first memory storing instructions, the first processor configured to execute the instructions stored by the first memory to implement:
writing first control instruction information for controlling the terminal of the Internet of things into a first intelligent contract and broadcasting the first intelligent contract;
a second blockchain node comprising a second processor and a second memory storing instructions, the second processor configured to execute the instructions stored by the second memory to implement:
receiving a first intelligent contract and performing double check on the first intelligent contract and a first block chain node;
when the double check is passed, chaining the first intelligent contract and sending first control instruction information to the terminal of the Internet of things;
the first block chain link point broadcasts a first intelligent contract in an idempotent mode, so that only one node in a plurality of nodes receiving the first intelligent contract is used as a second block chain link point to carry out double check;
wherein, the second block chain link point receiving the first intelligent contract carries out double check aiming at the first intelligent contract and the first block chain node, and the double check comprises the following steps: carrying out hash value verification on the first intelligent contract to verify whether the first intelligent contract is tampered; and carrying out consensus algorithm verification on the first block chain link point so as to verify the credibility of the first block chain node.
CN202210103688.0A 2022-01-28 2022-01-28 Block chain-based control method and system for Internet of things terminal Active CN114117553B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210103688.0A CN114117553B (en) 2022-01-28 2022-01-28 Block chain-based control method and system for Internet of things terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210103688.0A CN114117553B (en) 2022-01-28 2022-01-28 Block chain-based control method and system for Internet of things terminal

Publications (2)

Publication Number Publication Date
CN114117553A CN114117553A (en) 2022-03-01
CN114117553B true CN114117553B (en) 2022-04-15

Family

ID=80361741

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210103688.0A Active CN114117553B (en) 2022-01-28 2022-01-28 Block chain-based control method and system for Internet of things terminal

Country Status (1)

Country Link
CN (1) CN114117553B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108632293A (en) * 2018-05-16 2018-10-09 山东建筑大学 Architectural Equipment Internet of things system based on block chain technology and method
CN110046945A (en) * 2018-12-13 2019-07-23 阿里巴巴集团控股有限公司 Invoice creation method and device, electronic equipment based on block chain
CN110163590A (en) * 2019-04-29 2019-08-23 阿里巴巴集团控股有限公司 Payment based on block chain withholds method and device, electronic equipment, storage medium

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR3076420B1 (en) * 2017-12-29 2020-02-07 Commissariat A L'energie Atomique Et Aux Energies Alternatives METHOD OF EXCHANGING KEYS BY INTELLIGENT CONTRACT DEPLOYED ON A BLOCK CHAIN
CN108648056A (en) * 2018-05-10 2018-10-12 中链科技有限公司 A kind of house lease contract processing method and system based on block chain
CN109325331B (en) * 2018-09-13 2022-05-20 北京航空航天大学 Big data acquisition transaction system based on block chain and trusted computing platform
CN109767843B (en) * 2019-01-18 2020-02-11 四川大学 Infectious disease early warning method based on intelligent contract and infectious disease data block chain system
CN110163607A (en) * 2019-05-10 2019-08-23 南京邮电大学 The personal reference method of college student number based on block chain intelligence contract
CN110569675B (en) * 2019-09-18 2021-07-09 上海海事大学 Multi-Agent transaction information protection method based on block chain technology
CN110995825B (en) * 2019-11-29 2022-08-26 腾讯科技(深圳)有限公司 Intelligent contract issuing method, intelligent node equipment and storage medium
CN111090888B (en) * 2020-03-18 2020-07-07 支付宝(杭州)信息技术有限公司 Contract verification method and device

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108632293A (en) * 2018-05-16 2018-10-09 山东建筑大学 Architectural Equipment Internet of things system based on block chain technology and method
CN110046945A (en) * 2018-12-13 2019-07-23 阿里巴巴集团控股有限公司 Invoice creation method and device, electronic equipment based on block chain
CN110163590A (en) * 2019-04-29 2019-08-23 阿里巴巴集团控股有限公司 Payment based on block chain withholds method and device, electronic equipment, storage medium

Also Published As

Publication number Publication date
CN114117553A (en) 2022-03-01

Similar Documents

Publication Publication Date Title
CN111046352B (en) Identity information security authorization system and method based on block chain
US20230224167A1 (en) Access control method based on zero-trust security, device, and storage medium
Bao et al. IoTChain: A three-tier blockchain-based IoT security architecture
CN110535648B (en) Electronic certificate generation and verification and key control method, device, system and medium
KR20190075771A (en) Authentication System Using Block Chain Through Distributed Storage after Separating Personal Information
JP2023502346A (en) Quantum secure networking
TW201215070A (en) Key Management Systems and methods for shared secret ciphers
CN111478769A (en) Distributed credible identity authentication method, system, storage medium and terminal
Zhong et al. Distributed blockchain-based authentication and authorization protocol for smart grid
WO2018017609A1 (en) Secure asynchronous communications
CN111639327A (en) Authentication method and device for open platform
CN110121159B (en) Lightweight RFID security authentication method and Internet of vehicles communication system in Internet of vehicles scene
CN111431707A (en) Service data information processing method, device, equipment and readable storage medium
CN113098697B (en) Block chain data writing and accessing method and device
US11546159B2 (en) Long-lasting refresh tokens in self-contained format
CN113259123B (en) Block chain data writing and accessing method and device
CN110572392A (en) Identity authentication method based on HyperLegger network
CN111241492A (en) Product multi-tenant secure credit granting method, system and electronic equipment
CN112035863B (en) Electronic contract evidence obtaining method and system based on intelligent contract mode
JP6533542B2 (en) Secret key replication system, terminal and secret key replication method
CN114117553B (en) Block chain-based control method and system for Internet of things terminal
CN115001707B (en) Device authentication method based on block chain and related device
CN114172923B (en) Data transmission method, communication system and communication device
CN115811412A (en) Communication method and device, SIM card, electronic equipment and terminal equipment
Chen et al. Privacy-Preserving Anomaly Detection of Encrypted Smart Contract for Blockchain-Based Data Trading

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant