CN116208517A - Bluetooth-based data acquisition method and system - Google Patents

Bluetooth-based data acquisition method and system Download PDF

Info

Publication number
CN116208517A
CN116208517A CN202310215312.3A CN202310215312A CN116208517A CN 116208517 A CN116208517 A CN 116208517A CN 202310215312 A CN202310215312 A CN 202310215312A CN 116208517 A CN116208517 A CN 116208517A
Authority
CN
China
Prior art keywords
data
trusted
bluetooth module
bluetooth
processing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310215312.3A
Other languages
Chinese (zh)
Inventor
苟晓东
何健超
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ant Blockchain Technology Shanghai Co Ltd
Original Assignee
Ant Blockchain Technology Shanghai Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ant Blockchain Technology Shanghai Co Ltd filed Critical Ant Blockchain Technology Shanghai Co Ltd
Priority to CN202310215312.3A priority Critical patent/CN116208517A/en
Publication of CN116208517A publication Critical patent/CN116208517A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/02Capturing of monitoring data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0863Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Abstract

The embodiment of the specification provides a Bluetooth-based data acquisition method and system, wherein the method comprises the following steps: acquiring device data of the target device by a Bluetooth module connected with the target device; performing trusted processing on the equipment data based on the Bluetooth module private key to obtain trusted equipment data; and transmitting the trusted device data and the blockchain uplink identifier of the Bluetooth module to other processing devices through Bluetooth communication with the other processing devices, and providing the trusted device data and the blockchain uplink identifier for a data service platform by the other processing devices to realize the processing of the trusted device data in the blockchain.

Description

Bluetooth-based data acquisition method and system
Technical Field
The application relates to the field of Internet of things, in particular to a data acquisition method and system based on Bluetooth.
Background
The internet of things (The Internet of Things, IOT) is an operation mechanism for establishing connection between an object and a network and realizing sharing/collecting of object information through the network. The intelligent perception, identification, management and other business applications of the object can be realized through the IOT related technology.
In IOT related technology, object data acquisition is one of the important links, and in some cases, it is desirable to enable trusted device data acquisition. In some scenarios, the device to be collected has no network connection function, and how to implement trusted device data collection for such devices is a technical problem to be solved by those skilled in the art.
Therefore, the present specification is expected to provide a data collection method and system based on bluetooth, so as to implement trusted device data collection for devices without network connection function.
Disclosure of Invention
One aspect of the present specification provides a bluetooth-based data acquisition method performed by a bluetooth module connected to a target device, the method comprising: acquiring device data of target devices; performing trusted processing on the equipment data based on the Bluetooth module private key to obtain trusted equipment data; and transmitting the trusted device data and the blockchain uplink identifier of the Bluetooth module to other processing devices through Bluetooth communication with the other processing devices, so that the other processing devices can provide the trusted device data and the blockchain uplink identifier for a data service platform to realize the processing of the trusted device data in the blockchain.
Another aspect of the present specification provides a bluetooth-based data acquisition system deployed on a bluetooth module connected to a target device, the system comprising: the device data acquisition module is used for acquiring device data of the target device; the trusted processing module is used for performing trusted processing on the equipment data based on the Bluetooth module private key to obtain trusted equipment data; and the data output module is used for transmitting the trusted device data and the blockchain uplink identifier of the Bluetooth module to other processing devices through Bluetooth communication with the other processing devices so that the other processing devices can provide the trusted device data and the blockchain uplink identifier for a data service platform to realize the processing of the trusted device data in the blockchain.
Another aspect of the present disclosure provides a bluetooth-based data acquisition device, including a bluetooth module, where the bluetooth module includes at least one service application, and the at least one service application is configured to implement the foregoing bluetooth-based data acquisition method.
Another aspect of the present specification provides another bluetooth-based data acquisition method, the method comprising: is executed by a processing device having a Bluetooth communication function: the method comprises the steps of carrying out Bluetooth communication with a Bluetooth module connected with target equipment, and acquiring trusted equipment data of the target equipment and a blockchain uplink identifier of the Bluetooth module from the Bluetooth module; by interacting with a data service platform: providing the trusted device data and the blockchain uplink identifier so that the data service platform can perform blockchain storage processing of the trusted device data; the store blockchain processing includes: data checking, based on a result of the data checking, whether to store the trusted device data into a blockchain based on the blockchain uplink identification; the data verification includes a first trusted verification of the trusted device data based on a bluetooth module public key, the bluetooth module public key being obtained and provided by the processing device from the bluetooth module.
Another aspect of the present description provides another bluetooth-based data acquisition system, the system comprising: the Bluetooth data acquisition module is used for acquiring the trusted device data of the target device and the blockchain uplink identifier of the Bluetooth module from the Bluetooth module through Bluetooth communication with the Bluetooth module connected with the target device; the service platform interaction module is used for realizing interaction with the data service platform: providing the trusted device data and the blockchain uplink identifier so that the data service platform can perform blockchain storage processing of the trusted device data; the store blockchain processing includes: data checking, based on a result of the data checking, whether to store the trusted device data into a blockchain based on the blockchain uplink identification; the data verification includes a first trusted verification of the trusted device data based on a bluetooth module public key, the bluetooth module public key being obtained and provided by the processing device from the bluetooth module.
Another aspect of the present description provides another bluetooth-based data acquisition device comprising at least one storage medium for storing computer instructions and at least one processor; the at least one processor is configured to execute the computer instructions to implement the aforementioned another bluetooth-based data acquisition method.
Drawings
The present specification will be further elucidated by way of example embodiments, which will be described in detail by means of the accompanying drawings. The embodiments are not limiting, in which like numerals represent like structures, wherein:
fig. 1-1 is a schematic diagram of an application scenario of a bluetooth-based data acquisition system according to some embodiments of the present disclosure;
FIGS. 1-2 are schematic diagrams of application scenarios of another Bluetooth-based data acquisition system according to some embodiments of the present disclosure;
FIG. 2 is an exemplary interaction flow diagram of a Bluetooth-based data collection method according to some embodiments of the present description;
fig. 3 is an exemplary interaction flow diagram of a bluetooth module identity registration method according to some embodiments of the present description.
Detailed Description
In order to more clearly illustrate the technical solutions of the embodiments of the present specification, the drawings that are required to be used in the description of the embodiments will be briefly described below. It is apparent that the drawings in the following description are only some examples or embodiments of the present specification, and it is possible for those of ordinary skill in the art to apply the present specification to other similar situations according to the drawings without inventive effort. Unless otherwise apparent from the context of the language or otherwise specified, like reference numerals in the figures refer to like structures or operations.
It should be appreciated that "system," "apparatus," "unit," and/or "module" as used in this specification is a method for distinguishing between different components, elements, parts, portions, or assemblies at different levels. However, if other words can achieve the same purpose, the words can be replaced by other expressions.
As used in this specification and the claims, the terms "a," "an," "the," and/or "the" are not specific to a singular, but may include a plurality, unless the context clearly dictates otherwise. In general, the terms "comprises" and "comprising" merely indicate that the steps and elements are explicitly identified, and they do not constitute an exclusive list, as other steps or elements may be included in a method or apparatus.
A flowchart is used in this specification to describe the operations performed by the system according to embodiments of the present specification. It should be appreciated that the preceding or following operations are not necessarily performed in order precisely. Rather, the steps may be processed in reverse order or simultaneously. Also, other operations may be added to or removed from these processes.
In IOT related technology, object data acquisition is one of the important links. In some embodiments, it may be desirable to enable trusted device data collection to secure data, e.g., collecting device data and writing it to a blockchain for trusted preservation, trusted processing. In some scenarios, the device to collect device data does not itself have a network connection function, such as electric bicycles, garbage collection devices, sewage treatment devices, and the like. For this type of device, if device data acquisition is to be implemented, proprietary hardware (e.g., proprietary hardware including control chips, network modules) may be provided on the device in some embodiments, through which acquisition of device data and networking of the acquired device data to a data service platform for storage into a blockchain by the data service platform for storage or further processing. However, setting the proprietary hardware on the device requires increasing costs associated with production, installation, etc. of the proprietary hardware, and the application range of the proprietary hardware is limited, and the adaptation degree with various devices may not be high.
Fig. 1-1 is a schematic diagram of an application scenario of a bluetooth-based data acquisition system according to some embodiments of the present disclosure.
The bluetooth-based data acquisition system provided by some embodiments of the present disclosure may be applicable to various application scenarios in which device data is acquired by a device and transmitted to a data service platform, so that the data service platform may perform trusted storage or further processing of the device data.
As shown in fig. 1-1, a target device 110 and a data service platform 140 may be included in an application scenario 100 of a bluetooth-based data acquisition system.
The target device 110 may be any device that needs to collect device data, such as an electric bicycle, a garbage collection device, a sewage treatment device, etc. The target device 110 itself may not have networking communication capabilities.
Data services platform 140 may be a services platform (which may be referred to as an IOT platform) that is deployed on a processing device (e.g., various processing devices such as a computer, cloud platform, etc.). The data service platform 140 may be used as a service platform for interfacing with a blockchain for providing a store blockchain processing service for data, and the data service platform 140 may also provide data processing functions to enable further processing of the collected device data.
A blockchain may be made up of a plurality of blockchain link points. In some embodiments, the blockchain node may be a variety of computing devices, such as a laptop computer, a desktop computer, a server, and the like. More generally, in a blockchain, a blockchain node may receive a transaction uploaded (or broadcast) to the chain, invoke a corresponding smart contract to complete execution of the transaction, and write the transaction and the results of the transaction execution into blockchain data. In some embodiments, the data service platform 140 may initiate a data logging transaction request to the blockchain network to write data into the blockchain for storage.
The consensus mechanism is a necessary component for the normal operation of the blockchain network and is used for ensuring that the blockchain data stored by each node is kept consistent. Multiple nodes may agree on operations to receive (input of corresponding code), generate (output of corresponding code or intermediate result) data and/or perform by running a consensus protocol, and nodes participating in the consensus may be referred to as consensus nodes. For example, for a plurality of transactions involving a new block, each consensus node may agree on the order of execution of the plurality of transactions by running a consensus protocol.
Blockchain data (also referred to as on-chain data) may include blockchain data and state data (also referred to as global state or world state) that are commonly known, and the writing of blockchain data is also referred to as the uplink. The block data comprises blocks which are continuously generated and are linked in time sequence, and each consensus node can uplink the new block by running a consensus protocol. Consensus passing means that each consensus node can write the same new block to the blockchain data. For example only, in some embodiments, the condition for consensus passing includes consensus nodes exceeding a preset ratio (e.g., 2/3) agreeing to uplink the new block. The status data may include status variables associated with each account, such as a balance of an individual, organization controlled external account, and, for example, a contract status of a contract account.
In some embodiments, as shown in fig. 1-2, based on the application scenario 100 (including the target device 110 and the data service platform 140), the bluetooth-based data acquisition system according to some embodiments of the present disclosure may further include a bluetooth module 120 and a terminal 130.
In some embodiments, a bluetooth module 120 connected to the target device 110 may be installed on the target device 110. The bluetooth module may be an integrated module including an antenna, a bluetooth chip, a memory unit, other functional circuits, and the like, and may implement a bluetooth function, wherein the bluetooth function mainly includes a function of performing data transmission through short-range wireless communication (may be referred to as a bluetooth communication function). The bluetooth module 120 may employ various types of bluetooth modules according to the need.
In some embodiments, the Bluetooth module 120 may be connected to a control chip or other device component of the target device 110 that may generate device data via a connection so that the Bluetooth module 120 may obtain the device data of the target device 110 via the connection.
The bluetooth module 120 may be embedded with a service application (a software development kit SDK may include or be represented as at least one instruction set, and may implement a corresponding function when a processing chip of hardware such as the bluetooth module executes the at least one instruction set), and may implement an identity registration-related processing procedure of the bluetooth module 120 and a device data trusted acquisition-related processing procedure of the target device 110 related to the bluetooth module 120 through the service application. The details of the identity registration related process procedure of the bluetooth module 120 may be referred to fig. 3 and the related description thereof, and the details of the device data trusted acquisition related process procedure of the target device 110 may be referred to fig. 2 and the related description thereof.
In some embodiments, bluetooth module 120 may also include a trusted execution environment in which the aforementioned business applications may be placed for execution. The trusted execution environment (Trusted Execution Environment, TEE) is a secure area on the processor of the device that ensures the security, confidentiality and integrity of code and data loaded into the environment, thereby ensuring the trustworthiness of the results obtained after execution of the code program in the module/device with the trusted execution environment. Exemplary trusted execution environments may include trusted execution environments based on Software Guard Extensions (SGX), secure Encrypted Virtualization, or trust zone technologies, among others. Taking SGX as an example, when a program is executed in a trusted execution environment, the program is protected by enclaspe, and the outside world cannot tamper with data located in the enclaspe or affect the execution process of the program.
The terminal 130 may include one or more terminals, and may be various types of terminals, for example, mobile terminals such as a mobile phone, and may also be a Gateway (Gateway), and the like. The terminal 130 may have a bluetooth communication function and a networking communication function. In some embodiments, terminal 130 may include components such as bluetooth modules, network modules (which may be used to implement networking communications), processors, memory units, and the like. In some embodiments, terminal 130 may also include a trusted execution environment similar to bluetooth module 120 described previously. The terminal 130 may be provided here by way of example only, and may be other processing devices having similar functionality.
In some embodiments, bluetooth module 120 may perform bluetooth communication with terminal 130 (e.g., terminal 130 may search for a bluetooth module via bluetooth functionality and may establish bluetooth communication with a bluetooth module via bluetooth pairing), and terminal 130 may interact with data service platform 140 via networking, such that bluetooth module 120, terminal 130, data service platform 140 may participate in implementing an identity registration-related process of bluetooth module 120, a device data trusted acquisition-related process of target device 110. The details of the identity registration related process procedure of the bluetooth module 120 may be referred to fig. 3 and the related description thereof, and the details of the device data trusted acquisition related process procedure of the target device 110 may be referred to fig. 2 and the related description thereof.
Fig. 2 is an exemplary interaction flow diagram of a bluetooth-based data collection method according to some embodiments of the present description.
As shown in fig. 2, an interaction flow of a bluetooth module (e.g., bluetooth module 120), a processing device (e.g., terminal 130), and a data service platform (e.g., data service platform 140) is shown.
In some embodiments, the processing device may be a device or system for bluetooth communication with a bluetooth module and interaction with a data server, and the processing device may have bluetooth communication functions and networking communication functions. The processing device may comprise a processing device or a system of processing devices. By way of example, the processing device may be various types of terminals (e.g., cell phones, tablets, gateways, etc.), computing devices (e.g., laptop computers, desktop computers, servers, etc.), and the like. In some embodiments, the processing device may include components such as bluetooth modules, network modules (which may be used to implement networking communications), processors, memory units, and the like. The bluetooth module may perform bluetooth communication with the processing device, and the processing device may interact with the data service platform in a networking manner, so that the bluetooth module, the processing device, and the data service platform may participate in a relevant processing procedure for implementing the bluetooth-based data acquisition method in some embodiments of the present disclosure, so that trusted device data acquisition of the target device 110 may be implemented.
For convenience of explanation, the steps in the flowchart 200 of the present specification are mainly described by taking bluetooth module execution (e.g., steps 210, 220, 230) and processing device execution (e.g., step 240) as examples.
The bluetooth-based data acquisition method 200 may include:
step 210, obtaining device data of a target device.
In some embodiments, step 210 may be performed by a device data acquisition module.
The device data of the target device may include various data related to the target device. Taking an electric bicycle available for lease as an example, the device data may include a device identifier (for example, identifier information indicating a device identity such as a device ID) of the electric bicycle, a timestamp of the data, a single mileage of the lease, a total mileage of the lease, an electric quantity, an electric current, a voltage, a battery state of charge (SOC) and a battery state of health (SOH) of the electric bicycle.
In some embodiments, the bluetooth module may obtain various device data of the target device based on the data acquisition request, and as an example, the processing device may send the data acquisition request to the bluetooth module by performing bluetooth communication with the bluetooth module, and the bluetooth module may obtain various device data of the target device based on the data acquisition request. In some embodiments, the bluetooth module may also periodically acquire or otherwise automatically acquire various device data of the target device at a preset acquisition period.
In some embodiments, the bluetooth module may further obtain a data model, where the data model may include data content to be obtained, for example, may include a type of data to be obtained (such as a device identifier, a timestamp, a single mileage rented, a total mileage rented, etc.), and may further include a data format specification of various data, such as a data value type, a data value range, etc. In some embodiments, the data model may be agreed upon by the data services platform and pre-saved to the bluetooth module. In some embodiments, the data model may also be sent by the data service platform to the processing device and sent by the processing device to the bluetooth module via bluetooth communication.
In some embodiments, the bluetooth module may obtain device data of the target device based on the data model, such that one or more data specified in the data model may be obtained (in some embodiments, data values of the one or more data may also conform to the data format specification specified in the data model).
In some embodiments, after the bluetooth module obtains the device data, data inspection, cleaning, arrangement, combination, and other data arrangement may be performed on the device data.
And 220, performing trusted processing on the device data based on the Bluetooth module private key to obtain trusted device data.
In some embodiments, step 220 may be performed by a trusted processing module.
For the information security protection of the device data, the bluetooth module may correspond to a public key (referred to as a bluetooth module public key) and a private key (referred to as a bluetooth module private key). The public key of the Bluetooth module and the private key of the Bluetooth module are a key pair, the public key of the Bluetooth module can be issued outwards, for example, the public key of the Bluetooth module is held by a data service platform, and the private key of the Bluetooth module is held by the Bluetooth module. The public and private keys of the bluetooth module may be generated by the bluetooth module, for example, by a key pair generation algorithm in a service application embedded in the bluetooth module.
The trusted processing refers to processing for protecting the data by information security technology, and the trusted processing can enable the data to have trusted properties, wherein the trusted properties can comprise tamper resistance of the data, authenticity of the data can be guaranteed, and the like. The information security technology may refer to information technology that may implement data tamper resistance or authenticity verification, such as encryption, signing, processing in trusted units, and store blockchain tamper resistance.
The data obtained after the trusted processing of the device data is referred to as trusted device data.
In some embodiments, the bluetooth module performing trusted processing of device data based on the bluetooth module private key may include: and signing the device data based on the Bluetooth module private key. For example, the bluetooth module may generate a digest of the device data based on a digest algorithm and encrypt the digest with a bluetooth module private key to generate a digital signature, thereby protecting the security of the device data by signing. In some embodiments, trusted processing of device data by the bluetooth module may also include other processes that may secure device data.
In some embodiments, in order to protect the bluetooth module private key by using the information security technology, the bluetooth module may store the bluetooth module private key by using a secure storage method, and further may perform trusted processing on the device data based on the bluetooth module private key stored by using the secure storage method.
The secure storage method of the bluetooth module private key may include various storage methods capable of performing information security protection on the bluetooth module private key to avoid disclosure, for example, the secure storage method may be used to store the bluetooth module private key after confusion processing, may also be used to store the bluetooth module private key by other white-box encryption methods, and may also be used to store the bluetooth module private key by secure storage methods such as files, software systems, etc.
The confusion processing performed on the private key may be processing that can make the private key obscure in the memory (for example, processing that stores the private key as hexadecimal characters or replaces characters in a key string, etc.), when the private key is stored after the confusion processing, when the bluetooth module signs or decrypts by using the private key, the corresponding anti-confusion processing is performed on the private key before performing the cryptographic operation.
White-box encryption refers to an encryption method capable of resisting white-box attacks, and can be realized through various existing cryptographic algorithms capable of realizing white-box encryption.
When the private key is stored in a file form, the security of the private key is usually protected by a password, for example, the file storing the private key is encrypted by the password, and when the private key is used for signing or decrypting, the private key file needs to be read into a memory or a cryptographic module for cryptographic operation. When the secret key is stored in a software system mode, the security of the storage and access of the secret key is managed by the software system, and the storage form and the security of the secret key can be different under different software systems.
And 230, transmitting the trusted device data and the blockchain uplink identifier of the Bluetooth module to the processing device through Bluetooth communication with the processing device.
In some embodiments, step 230 may be performed by a data output module.
In order to realize the trusted device data obtained by the Bluetooth module is trusted on the blockchain, the Bluetooth module can be provided with a corresponding blockchain uplink identifier, the blockchain uplink identifier can be used for indicating that the identity of the corresponding Bluetooth module is authenticated, and the data transmitted by the Bluetooth module can be written into the blockchain for storage. The blockchain uplink identification may be determined by the data service platform and sent to the bluetooth module via the processing device for acquisition by the bluetooth module. For more details on the bluetooth module acquiring blockchain uplink identification see fig. 3 and its associated description.
The Bluetooth module can send the acquired trusted device data and the blockchain uplink identifier of the Bluetooth module to the processing device through Bluetooth communication with the processing device, so that the processing device can provide the trusted device data and the blockchain uplink identifier for the data service platform to realize the processing of the trusted device data in the blockchain.
Step 240, by interacting with the data service platform: providing the trusted device data and the blockchain uplink identifier so that the data service platform can perform blockchain storage processing of the trusted device data.
In some embodiments, step 240 may be performed by a service platform interaction module.
In some embodiments, the processing device may interact with the data service platform in a networked manner, the processing device may send the obtained trusted device data and blockchain uplink identification to the data service platform, and the data service platform may perform the store blockchain processing of the trusted device data.
In some embodiments, the store blockchain processing by the data service platform may include: and performing data verification, and performing whether to store the trusted device data into the blockchain based on the result of the data verification. For example, if the data check passes, the trusted device data may be stored in the blockchain, and if the data check fails, the trusted device data may not be stored in the blockchain.
In some embodiments, the data verification may include a trusted verification of trusted device data based on the bluetooth module public key, the trusted verification referred to as a first trusted verification. In some embodiments, as previously described, the trusted device data may be signed based on a bluetooth module private key, and the first trusted verification may include: acquiring a digital signature of the trusted device data; the digital signature is verified based on the bluetooth module public key and trusted device data.
In some embodiments, the data verification may further include performing a device data repetition verification on the trusted device data. In some embodiments, the bluetooth module may send a plurality of pieces of trusted device data to the processing device, where there may be two or more pieces of identical duplicate data from one target device, and the device data duplicate checking may specifically refer to verifying whether the two or more pieces of data are identical duplicate data from one target device. In some embodiments, the trusted device data may include information such as a device identifier, a timestamp, etc. of the target device, where the device repetition check may be implemented by verifying whether the information such as the device identifier, the timestamp, etc. of the target device in the two or more pieces of data is the same, and if the information is the same, the same repeated data may be determined, otherwise, the repeated data is different data.
In some embodiments, the data verification may further include performing a data model verification on the trusted device data. In some embodiments, the bluetooth module may be device data acquired based on a data model agreed upon by the data service platform, which includes the data content to be acquired. Data model verification may refer to verifying the data content of trusted device data, verifying whether its data content complies with the data content specified in the data model, such as the specified data or data, and may also verify whether the data value of the data or data complies with the data format specification specified in the data model.
In some embodiments, data verification may also include numerical conversion of some parameters in the trusted device data (e.g., converting data values in decimal, 16-ary, etc. format to other types of readable data such as text), verifying whether some parameters in the trusted device data are accurate (e.g., parameters such as time stamps).
In some embodiments, the data verification may further include verifying the blockchain uplink identifier of the bluetooth module, for example, verifying whether the blockchain uplink identifier of the bluetooth module is valid, where the verification may be implemented to verify the identity validity of the bluetooth module, that is, whether the bluetooth module performs identity registration for data uplink.
In some embodiments, a data check is passed if all of the checks included in the data check are verified as passing. In some embodiments, if any of the checks included in the data check fails, the data check fails.
In some embodiments, the data service platform may implement the logging of trusted device data into the blockchain in a variety of possible ways as the data verification passes. As an example, the data service platform may send the certification transaction to the blockchain, which may include trusted device data (and may also include a trusted ID of the trusted device data, which may be an ID given by the data service platform to the trusted device data, different trusted device data having different IDs). When the authenticated transaction is transmitted to the blockchain network, nodes in the blockchain can verify the authenticated transaction based on a consensus algorithm, and the authenticated transaction containing the trusted device data is written into the blockchain. In some embodiments, for example, when the data size of the device data is large, the data service platform may further hash the trusted device data to obtain a hash value of the device data, and may write the hash value of the device data into the blockchain through the foregoing certification transaction.
In some embodiments, the blockchain may return the trusted device data to the blockchain's uplink result to the data service platform, which may also further return the uplink result to the processing device.
Through the embodiments, the trusted device data of the target device can be obtained through the bluetooth module arranged on the target device, the bluetooth module can send the trusted device data and the blockchain uplink identifier of the bluetooth module to the processing device through bluetooth communication, and the further processing device can interact with the data server to provide the trusted device data and the blockchain uplink identifier of the bluetooth module for the data server to store the trusted device data into the blockchain. Therefore, the method can realize the trusted acquisition and the blockchain trusted storage of the equipment data based on the existing or set more general Bluetooth module (such as the Bluetooth module set in the electronic car key of the rented electric bicycle) on the target equipment, and has wide application range and lower cost.
Fig. 3 is an exemplary interaction flow diagram of a bluetooth module identity registration method according to some embodiments of the present description.
As shown in fig. 3, an interaction flow of a bluetooth module (e.g., bluetooth module 120), a processing device (e.g., processing device 130), and a data service platform (e.g., data service platform 140) is shown. In some embodiments, the processing device has a bluetooth communication function, the bluetooth module may perform bluetooth communication with the processing device, and the processing device may interact with the data service platform in a networking manner, so that the bluetooth module, the processing device, and the data service platform may participate in a related processing procedure for implementing the bluetooth module identity registration method in some embodiments of the present disclosure, so that identity registration of the bluetooth module may be implemented, so as to facilitate trusted uplink of trusted device data acquired by the bluetooth module.
The steps in the flow 300 of this specification are mainly described by taking the bluetooth module identity registration related flow (for example, steps 310, 320, 330, and 360) executed by the bluetooth module, and the bluetooth module identity registration related flow (for example, steps 340 and 350) executed by the processing device as examples.
The bluetooth module identity registration method 300 may include:
step 310, a bluetooth public-private key pair is generated.
In some embodiments the bluetooth module may perform identity registration related procedures automatically or based on an initialization request. As an example, the processing device may send an initialization request to the bluetooth module by performing bluetooth communication with the bluetooth module, and the bluetooth module may perform an identity registration related procedure based on the initialization request.
In some embodiments, after receiving the initialization request, the bluetooth module may first confirm whether the public-private key pair of the present party and the blockchain uplink identifier of the present party already exist in the present storage. If the public and private key pair and/or the blockchain uplink identifier of the method exist, the Bluetooth module can be indicated to successfully register the identity, and the identity registration can not be repeated. If the public and private key pair of the user does not exist, the public and private key pair of the user is generated, and if the blockchain uplink identifier of the user does not exist, the follow-up identity registration related flow is continued.
In some embodiments, the bluetooth module may include status information in the storage for indicating the identity registration status of the bluetooth module, and checking the status information may help determine whether the bluetooth module has successfully performed identity registration. For example, a state information being initialized may indicate that the bluetooth module has successfully performed identity registration, and a state information being uninitialized may indicate that the bluetooth module has not performed identity registration.
In some embodiments, the bluetooth module may receive multiple initialization requests sent by one or more processing devices, where one of the initialization requests (e.g., the first initialization request received by the bluetooth module) may be locked, and the bluetooth module may simply perform an identity registration related procedure based on the locked initialization request, wait for other initialization requests without lock, and unlock the locked initialization request after the identity registration related procedure corresponding to the locked initialization request is finished (e.g., after a bluetooth public-private key pair is generated). At this time, since the bluetooth public-private key pair already exists, the bluetooth module may not generate the public-private key pair based on other initialization requests. In some embodiments, the bluetooth module may further perform a de-registration process (e.g., the bluetooth module may still perform a subsequent identity registration process based on other initialization requests, but the data server may verify whether the bluetooth module has completed identity registration during identity registration, and if so, may not perform re-registration.
In some embodiments, in order to protect the public and private key pair by using the information security technology, after the bluetooth module generates the public and private key pair, the public and private key pair may be saved by using a secure storage method, and a specific description of the secure storage method of the key may be found in fig. 2 and related description thereof.
And 320, performing trusted processing on the identity information of the Bluetooth module based on a pre-stored private key of the data service platform to obtain trusted identity information, wherein the identity information comprises Bluetooth module equipment information and a Bluetooth module public key.
The bluetooth module may obtain identity information of the present invention, where the identity information may include bluetooth module device information and a bluetooth module public key, and the bluetooth module device information may include bluetooth module device identification information (e.g., device ID, device address MAC, IMEI number, etc.).
The data server may correspond to a public key (referred to as a data server public key) and a private key (referred to as a data server private key). The public key and the data server private key of the Bluetooth module are also a key pair, the data server public key can be issued outwards, the data server private key is held by the Bluetooth module and can be stored in the Bluetooth module in a safe and leak-proof transmission mode such as encryption transmission and the like so as to be used when registering the identity (for example, the data server private key is embedded in the Bluetooth module in a trusted third party embedding mode).
In order to protect the information security technology of the identity data, the Bluetooth module can perform trusted processing on the identity information based on a pre-stored private key of the data service platform to obtain trusted identity information.
In some embodiments, the trusted processing of the identity information by the bluetooth module based on the data server private key may include: the identity information is signed based on the data server private key. The Bluetooth module can generate a digest of the identity information based on a digest algorithm, and encrypt the digest with a private key of a data server to generate a digital signature, so that the security of the identity information is protected by signing. In some embodiments, the trusted processing of identity information by the bluetooth module may also include other processes that may secure identity information.
The trusted processing of identity information based on the data service platform private key may be similar to the trusted processing of device data based on the bluetooth module private key described above, and more specific details may be found in fig. 2 and related description.
And step 330, transmitting the trusted identity information to the processing equipment through Bluetooth communication with the processing equipment.
The bluetooth module may send the trusted identity information to the processing device by bluetooth communication with the processing device, so that the processing device may subsequently provide the trusted identity information to the data service platform to enable identity registration of the bluetooth module for data uplink.
Step 340, by interacting with the data service platform: and providing the trusted identity information so that the data service platform can register the identity of the Bluetooth module.
In some embodiments, the processing device may interact with the data service platform in a networked manner, the processing device may send the obtained trusted identity number to the data service platform, and the data service platform may perform identity registration of the bluetooth module.
In some embodiments, the identity registration related procedure performed by the data service platform may include: and performing a trusted verification on the trusted identity information, wherein the trusted verification is called a second trusted verification, and performing identity registration of the Bluetooth module based on the trusted identity information or not based on the result of the second trusted verification. For example, if the second trusted verification passes, the identity registration of the bluetooth module may be successfully performed, and if the second trusted verification fails, the identity registration of the bluetooth module may not be performed or the identity registration fails.
In some embodiments, as previously described, the trusted identity information may be signed based on a private key of the data service platform, and the second trusted verification may include: acquiring a digital signature of the trusted identity information; the digital signature is verified based on the data service platform public key and the trusted identity information.
In some embodiments, the data service platform may employ various possible identity registration methods to perform identity registration of the bluetooth module for data uplink of the bluetooth module. As an example, the data service platform may send a contract transaction to the blockchain, which may include trusted identity information, and may also include a trusted ID for the trusted identity information (the trusted ID for the trusted identity information may be an ID given by the data service platform for the trusted identity information, different trusted identity information having different IDs). When a contract transaction is transmitted to the blockchain network, nodes in the blockchain can process the contract transaction (which can include verifying the contract transaction), after the processing is completed (e.g., the contract transaction is verified, etc.), the blockchain can return a corresponding transaction hash to the data service platform, and the data service platform can determine a blockchain uplink identification of the bluetooth module based on the hash transaction (e.g., the hash transaction is used as the blockchain uplink identification).
Step 350, obtaining the blockchain uplink identifier determined by the data service platform after the identity registration is successful.
In some embodiments, if the identity registration of the bluetooth module is successful, it may obtain the blockchain uplink identification of the bluetooth module. The data service platform may return the obtained blockchain uplink identification to the processing device to cause the processing device to obtain the blockchain uplink identification.
Step 360, obtaining the blockchain uplink identifier by bluetooth communication with a processing device.
In some embodiments, the processing device may send the blockchain uplink identifier obtained after the identity of the bluetooth module is successfully registered to the bluetooth module by performing bluetooth communication with the bluetooth module.
Through the embodiments, the bluetooth module arranged on the target device can perform trusted processing on the identity information based on the pre-stored private key of the data service platform to obtain the trusted identity information, and the bluetooth module can send the trusted identity information to the processing device through bluetooth communication, and the further processing device can interact with the data service end to realize that the trusted identity information is provided to the data service end for identity registration of the bluetooth module for data uplink. Therefore, the trusted identity registration of the Bluetooth module connected with the target equipment can be realized, and further the trusted acquisition of equipment data and the trusted storage of the blockchain based on the more general Bluetooth module (such as the Bluetooth module arranged in the electronic car key of the electric bicycle for leasing) existing or arranged on the target equipment can be realized.
It should be noted that the above descriptions of the respective flows are merely for illustration and description, and do not limit the application scope of the present specification. Various modifications and changes to the flow may be made by those skilled in the art under the guidance of this specification. However, such modifications and variations are still within the scope of the present description.
The embodiment of the specification also provides a Bluetooth-based data acquisition system which is deployed on a Bluetooth module connected with the target device. In some embodiments, the Bluetooth-based data acquisition system may include a device data acquisition module, a trusted processing module, and a data output module. In some embodiments, the bluetooth-based data acquisition system may further comprise a first identity registration module.
The device data acquisition module may be configured to acquire device data of the target device. In some embodiments, the device data may be obtained based on the data model.
The trusted processing module can be used for performing trusted processing on the equipment data based on the Bluetooth module private key to obtain trusted equipment data. In some embodiments, the bluetooth module private key is stored by a secure storage method, and the trusted processing module may be further configured to perform trusted processing on the device data based on the bluetooth module private key stored by the secure storage method.
The data output module can be used for transmitting the trusted device data and the blockchain uplink identifier of the Bluetooth module to other processing devices through Bluetooth communication with the other processing devices, so that the other processing devices can provide the trusted device data and the blockchain uplink identifier for a data service platform to realize the processing of the trusted device data in the blockchain.
The first identity registration module may be configured to: generating a Bluetooth public-private key pair, wherein the Bluetooth public-private key pair comprises a Bluetooth module public key and the Bluetooth module private key; performing trusted processing on the identity information of the Bluetooth module based on a pre-stored data service platform private key to obtain trusted identity information, wherein the identity information comprises Bluetooth module equipment information and the Bluetooth module public key; the trusted identity information is sent to other processing equipment through Bluetooth communication with the other processing equipment, so that the other processing equipment can provide the trusted identity information for the data service platform to realize the identity registration of the Bluetooth module; and acquiring the blockchain uplink identification which is determined by the data service platform after the identity registration is successful and is sent to other processing equipment through Bluetooth communication with the other processing equipment. For more related procedures of identity registration implemented by the first identity registration module, refer to fig. 3 and the related description thereof.
The present description also provides another bluetooth-based data acquisition system deployed on a processing device. In some embodiments, the other bluetooth-based data acquisition system may include a bluetooth data acquisition module, a service platform interaction module. In some embodiments, the another bluetooth-based data acquisition system may further include a second identity registration module.
The Bluetooth data acquisition module can be used for acquiring the trusted device data of the target device and the blockchain uplink identifier of the Bluetooth module from the Bluetooth module through Bluetooth communication with the Bluetooth module connected with the target device.
The service platform interaction module may be configured to implement by interacting with the data service platform: providing the trusted device data and the blockchain uplink identifier so that the data service platform can perform blockchain storage processing of the trusted device data.
The second identity registration module can be used for obtaining the trusted identity information of the Bluetooth module through Bluetooth communication with the Bluetooth module; by interacting with the data service platform: providing the trusted identity information so that the data service platform can register the identity of the Bluetooth module; and acquiring the block chain uplink identification determined by the data service platform after the identity registration is successful so as to be acquired by the Bluetooth module. For more related procedures of identity registration implemented by the second identity registration module, refer to fig. 3 and the related description thereof.
It should be appreciated that the illustrated system and its modules may be implemented in a variety of ways. For example, in some embodiments, the system and its modules may be implemented in hardware, software, or a combination of software and hardware. Wherein the hardware portion may be implemented using dedicated logic; the software portions may then be stored in a memory and executed by a suitable instruction execution system, such as a microprocessor or special purpose design hardware. Those skilled in the art will appreciate that the methods and systems described above may be implemented using computer executable instructions and/or embodied in processor control code, such as provided on a carrier medium such as a magnetic disk, CD or DVD-ROM, a programmable memory such as read only memory (firmware), or a data carrier such as an optical or electronic signal carrier. The system and its modules of the present application may be implemented not only with hardware circuitry, such as very large scale integrated circuits or gate arrays, semiconductors such as logic chips, transistors, etc., or programmable hardware devices such as field programmable gate arrays, programmable logic devices, etc., but also with software, such as executed by various types of processors, and with a combination of the above hardware circuitry and software (e.g., firmware).
It should be noted that the description of the bluetooth-based data acquisition system and its modules above is for convenience only and is not intended to limit the present description to the scope of the illustrated embodiments. It will be appreciated by those skilled in the art that, given the principles of the system, various modules may be combined arbitrarily or a subsystem may be constructed in connection with other modules without departing from such principles. For example, the first acquisition module, the data writing module, and the first data processing module may share one memory module, or each module may have a respective memory module. Such variations are within the scope of the present application.
The embodiment of the specification provides a Bluetooth-based data acquisition device, which comprises a Bluetooth module, wherein the Bluetooth module comprises at least one service application program, and the at least one service application program is used for realizing a Bluetooth-based data acquisition method. The method comprises the following steps: acquiring device data of target devices; performing trusted processing on the equipment data based on the Bluetooth module private key to obtain trusted equipment data; and transmitting the trusted device data and the blockchain uplink identifier of the Bluetooth module to other processing devices through Bluetooth communication with the other processing devices, so that the other processing devices can provide the trusted device data and the blockchain uplink identifier for a data service platform to realize the processing of the trusted device data in the blockchain.
The embodiments of the present specification also provide another bluetooth-based data acquisition device, including at least one storage medium for storing computer instructions and at least one processor; the at least one processor is configured to execute the computer instructions to implement a bluetooth-based data acquisition method, the method comprising: the method comprises the steps of carrying out Bluetooth communication with a Bluetooth module connected with target equipment, and acquiring trusted equipment data of the target equipment and a blockchain uplink identifier of the Bluetooth module from the Bluetooth module; by interacting with a data service platform: providing the trusted device data and the blockchain uplink identifier so that the data service platform can perform blockchain storage processing of the trusted device data; the store blockchain processing includes: data checking, based on a result of the data checking, whether to store the trusted device data into a blockchain based on the blockchain uplink identification; the data verification includes a first trusted verification of the trusted device data based on a bluetooth module public key, the bluetooth module public key being obtained and provided by the processing device from the bluetooth module.
Possible benefits of embodiments of the present description include, but are not limited to: (1) The Bluetooth module arranged on the target equipment can perform trusted processing on the identity information based on a pre-stored data service platform private key to obtain trusted identity information, the Bluetooth module can send the trusted identity information to the processing equipment through Bluetooth communication, and the further processing equipment can interact with the data service end to realize that the trusted identity information is provided for the data service end to perform identity registration of the Bluetooth module for data uplink. Thereby, the trusted identity registration of the Bluetooth module connected with the target equipment can be realized, and further the trusted acquisition and the blockchain trusted memory card of the equipment data can be realized based on the more general Bluetooth module existing or arranged on the target equipment; (2) The Bluetooth module arranged on the target equipment performs trusted processing on the identity information based on a pre-stored data service platform private key to obtain trusted identity information, and the Bluetooth module can send the trusted identity information to the processing equipment through Bluetooth communication, and the further processing equipment can interact with the data service end to realize that the trusted identity information is provided for the data service end to perform identity registration of the Bluetooth module for data uplink. Therefore, the trusted identity registration of the Bluetooth module connected with the target equipment can be realized, and further the trusted acquisition and the blockchain trusted memory card of the equipment data based on the more general Bluetooth module existing or arranged on the target equipment can be realized. It should be noted that, the advantages that may be generated by different embodiments may be different, and in different embodiments, the advantages that may be generated may be any one or a combination of several of the above, or any other possible advantages that may be obtained.
The foregoing describes specific embodiments of the present disclosure. Other embodiments are within the scope of the following claims. In some cases, the actions or steps recited in the claims can be performed in a different order than in the embodiments and still achieve desirable results. In addition, the processes depicted in the accompanying figures do not necessarily require the particular order shown, or sequential order, to achieve desirable results. In some embodiments, multitasking and parallel processing are also possible or may be advantageous.
While the basic concepts have been described above, it will be apparent to those skilled in the art that the foregoing detailed disclosure is by way of example only and is not intended to be limiting. Although not explicitly described herein, various modifications, improvements, and adaptations to the present disclosure may occur to one skilled in the art. Such modifications, improvements, and modifications are intended to be suggested within this specification, and therefore, such modifications, improvements, and modifications are intended to be included within the spirit and scope of the exemplary embodiments of the present invention.
Meanwhile, the specification uses specific words to describe the embodiments of the specification. Reference to "one embodiment," "an embodiment," and/or "some embodiments" means that a particular feature, structure, or characteristic is associated with at least one embodiment of the present description. Thus, it should be emphasized and should be appreciated that two or more references to "an embodiment" or "one embodiment" or "an alternative embodiment" in various positions in this specification are not necessarily referring to the same embodiment. Furthermore, certain features, structures, or characteristics of one or more embodiments of the present description may be combined as suitable.
Furthermore, those skilled in the art will appreciate that the various aspects of the specification can be illustrated and described in terms of several patentable categories or circumstances, including any novel and useful procedures, machines, products, or materials, or any novel and useful modifications thereof. Accordingly, aspects of the present description may be performed entirely by hardware, entirely by software (including firmware, resident software, micro-code, etc.), or by a combination of hardware and software. The above hardware or software may be referred to as a "data block," module, "" engine, "" unit, "" component, "or" system. Furthermore, aspects of the specification may take the form of a computer product, comprising computer-readable program code, embodied in one or more computer-readable media.
The computer storage medium may contain a propagated data signal with the computer program code embodied therein, for example, on a baseband or as part of a carrier wave. The propagated signal may take on a variety of forms, including electro-magnetic, optical, etc., or any suitable combination thereof. A computer storage medium may be any computer readable medium that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code located on a computer storage medium may be propagated through any suitable medium, including radio, cable, fiber optic cable, RF, or the like, or a combination of any of the foregoing.
The computer program code necessary for operation of portions of the present description may be written in any one or more programming languages, including an object oriented programming language such as Java, scala, smalltalk, eiffel, JADE, emerald, C ++, c#, vb net, python and the like, a conventional programming language such as C language, visual Basic, fortran2003, perl, COBOL2002, PHP, ABAP, a dynamic programming language such as Python, ruby and Groovy, or other programming languages and the like. The program code may execute entirely on the user's computer or as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or processing device. In the latter scenario, the remote computer may be connected to the user's computer through any form of network, such as a Local Area Network (LAN) or a Wide Area Network (WAN), or the connection may be made to an external computer (for example, through the Internet), or the use of services such as software as a service (SaaS) in a cloud computing environment.
Furthermore, the order in which the elements and sequences are processed, the use of numerical letters, or other designations in the description are not intended to limit the order in which the processes and methods of the description are performed unless explicitly recited in the claims. While certain presently useful inventive embodiments have been discussed in the foregoing disclosure, by way of various examples, it is to be understood that such details are merely illustrative and that the appended claims are not limited to the disclosed embodiments, but, on the contrary, are intended to cover all modifications and equivalent arrangements included within the spirit and scope of the embodiments of the present disclosure. For example, while the system components described above may be implemented by hardware devices, they may also be implemented solely by software solutions, such as installing the described system on an existing processing device or mobile device.
Likewise, it should be noted that in order to simplify the presentation disclosed in this specification and thereby aid in understanding one or more inventive embodiments, various features are sometimes grouped together in a single embodiment, figure, or description thereof. This method of disclosure, however, is not intended to imply that more features than are presented in the claims are required for the present description. Indeed, less than all of the features of a single embodiment disclosed above.
In some embodiments, numbers describing the components, number of attributes are used, it being understood that such numbers being used in the description of embodiments are modified in some examples by the modifier "about," approximately, "or" substantially. Unless otherwise indicated, "about," "approximately," or "substantially" indicate that the number allows for a 20% variation. Accordingly, in some embodiments, numerical parameters set forth in the specification and claims are approximations that may vary depending upon the desired properties sought to be obtained by the individual embodiments. In some embodiments, the numerical parameters should take into account the specified significant digits and employ a method for preserving the general number of digits. Although the numerical ranges and parameters set forth herein are approximations that may be employed in some embodiments to confirm the breadth of the range, in particular embodiments, the setting of such numerical values is as precise as possible.
Each patent, patent application publication, and other material, such as articles, books, specifications, publications, documents, etc., referred to in this specification is incorporated herein by reference in its entirety. Except for application history documents that are inconsistent or conflicting with the content of this specification, documents that are currently or later attached to this specification in which the broadest scope of the claims to this specification is limited are also. It is noted that, if the description, definition, and/or use of a term in an attached material in this specification does not conform to or conflict with what is described in this specification, the description, definition, and/or use of the term in this specification controls.
Finally, it should be understood that the embodiments described in this specification are merely illustrative of the principles of the embodiments of this specification. Other variations are possible within the scope of this description. Thus, by way of example, and not limitation, alternative configurations of embodiments of the present specification may be considered as consistent with the teachings of the present specification. Accordingly, the embodiments of the present specification are not limited to only the embodiments explicitly described and depicted in the present specification.

Claims (12)

1. A bluetooth-based data acquisition method performed by a bluetooth module connected to a target device, the method comprising:
Acquiring device data of target devices;
performing trusted processing on the equipment data based on the Bluetooth module private key to obtain trusted equipment data;
and transmitting the trusted device data and the blockchain uplink identifier of the Bluetooth module to other processing devices through Bluetooth communication with the other processing devices, so that the other processing devices can provide the trusted device data and the blockchain uplink identifier for a data service platform to realize the processing of the trusted device data in the blockchain.
2. The method of claim 1, the method further comprising:
generating a Bluetooth public-private key pair, wherein the Bluetooth public-private key pair comprises a Bluetooth module public key and the Bluetooth module private key;
performing trusted processing on the identity information of the Bluetooth module based on a pre-stored data service platform private key to obtain trusted identity information, wherein the identity information comprises Bluetooth module equipment information and the Bluetooth module public key;
the trusted identity information is sent to other processing equipment through Bluetooth communication with the other processing equipment, so that the other processing equipment can provide the trusted identity information for the data service platform to realize the identity registration of the Bluetooth module;
And acquiring the blockchain uplink identification which is determined by the data service platform after the identity registration is successful and is sent to other processing equipment through Bluetooth communication with the other processing equipment.
3. The method of claim 1, wherein the bluetooth module private key is stored by a secure storage method, and the trusted processing of the device data based on the bluetooth module private key comprises:
and carrying out trusted processing on the equipment data based on the Bluetooth module private key stored by a secure storage method.
4. The method of claim 1, further comprising:
the method comprises the steps of obtaining a data model through Bluetooth communication with other processing equipment, wherein the data model is agreed by the data service platform and comprises data contents to be obtained; the method comprises the steps of,
the device data is acquired based on the data model.
5. A bluetooth-based data acquisition system deployed on a bluetooth module connected to a target device, the system comprising:
the device data acquisition module is used for acquiring device data of the target device;
the trusted processing module is used for performing trusted processing on the equipment data based on the Bluetooth module private key to obtain trusted equipment data;
And the data output module is used for transmitting the trusted device data and the blockchain uplink identifier of the Bluetooth module to other processing devices through Bluetooth communication with the other processing devices so that the other processing devices can provide the trusted device data and the blockchain uplink identifier for a data service platform to realize the processing of the trusted device data in the blockchain.
6. A bluetooth based data acquisition device comprising a bluetooth module comprising at least one business application for implementing the method of any one of claims 1-4.
7. A bluetooth-based data acquisition method, the method comprising:
is executed by a processing device having a Bluetooth communication function:
the method comprises the steps of carrying out Bluetooth communication with a Bluetooth module connected with target equipment, and acquiring trusted equipment data of the target equipment and a blockchain uplink identifier of the Bluetooth module from the Bluetooth module;
by interacting with a data service platform: providing the trusted device data and the blockchain uplink identification,
so that the data service platform performs the processing of the store blockchain of the trusted device data;
The store blockchain processing includes: data checking, based on a result of the data checking, whether to store the trusted device data into a blockchain based on the blockchain uplink identification;
the data verification includes a first trusted verification of the trusted device data based on a bluetooth module public key, the bluetooth module public key being obtained and provided by the processing device from the bluetooth module.
8. The method of claim 7, further comprising:
is executed by a processing device having a Bluetooth communication function:
the method comprises the steps of carrying out Bluetooth communication with the Bluetooth module to obtain the trusted identity information of the Bluetooth module;
by interacting with the data service platform:
providing the trusted identity information so that the data service platform can register the identity of the Bluetooth module;
acquiring the block chain uplink identification determined by the data service platform after the identity registration is successful so as to be acquired by the Bluetooth module;
the identity registration includes: and performing second trusted verification on the trusted identity information and performing whether to perform identity registration based on the trusted identity information or not based on the result of the second trusted verification.
9. The method of claim 8, wherein,
the trusted identity information is obtained by performing trusted processing on the identity information of the Bluetooth module based on a pre-stored data service platform private key by the Bluetooth module, wherein the identity information comprises Bluetooth module equipment information and a Bluetooth module public key;
the second trust check comprises: and verifying the trusted identity information based on the public key of the data service platform.
10. The method of claim 7, the data verification further comprising one or more of:
performing repeated verification on the trusted device data;
and carrying out data model verification on the trusted device data, wherein the data model is agreed by the data service platform and comprises data contents to be acquired.
11. A bluetooth-based data acquisition system, the system comprising:
the Bluetooth data acquisition module is used for acquiring the trusted device data of the target device and the blockchain uplink identifier of the Bluetooth module from the Bluetooth module through Bluetooth communication with the Bluetooth module connected with the target device;
the service platform interaction module is used for realizing interaction with the data service platform: providing the trusted device data and the blockchain uplink identifier so that the data service platform can perform blockchain storage processing of the trusted device data;
The store blockchain processing includes: data checking, based on a result of the data checking, whether to store the trusted device data into a blockchain based on the blockchain uplink identification;
the data verification includes a first trusted verification of the trusted device data based on a bluetooth module public key, the bluetooth module public key being obtained and provided by the processing device from the bluetooth module.
12. A bluetooth based data acquisition device comprising at least one storage medium for storing computer instructions and at least one processor; the at least one processor is configured to execute the computer instructions to implement the method of any one of claims 7-10.
CN202310215312.3A 2023-03-06 2023-03-06 Bluetooth-based data acquisition method and system Pending CN116208517A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310215312.3A CN116208517A (en) 2023-03-06 2023-03-06 Bluetooth-based data acquisition method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310215312.3A CN116208517A (en) 2023-03-06 2023-03-06 Bluetooth-based data acquisition method and system

Publications (1)

Publication Number Publication Date
CN116208517A true CN116208517A (en) 2023-06-02

Family

ID=86507552

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310215312.3A Pending CN116208517A (en) 2023-03-06 2023-03-06 Bluetooth-based data acquisition method and system

Country Status (1)

Country Link
CN (1) CN116208517A (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105708430A (en) * 2016-02-24 2016-06-29 成都信汇聚源科技有限公司 Blood pressure information collecting and managing method
CN106909081A (en) * 2017-03-09 2017-06-30 广东美的制冷设备有限公司 Expansion platform and home appliance based on home appliance
CN109903041A (en) * 2018-11-30 2019-06-18 阿里巴巴集团控股有限公司 The method and system of block cochain for the transaction of block chain
CN209267613U (en) * 2019-01-15 2019-08-16 南京菲迪尔电子科技有限公司 The broadband automatic building control system of the full distributed power line of Internet of Things
CN112966044A (en) * 2021-02-26 2021-06-15 支付宝(杭州)信息技术有限公司 Data storage method and system of IOT (input/output) equipment based on block chain
CN113438628A (en) * 2021-06-23 2021-09-24 京东科技控股股份有限公司 Method and device for data interaction
CN113486407A (en) * 2021-07-05 2021-10-08 建信金融科技有限责任公司 Deposit receipt management system and method based on block chain

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105708430A (en) * 2016-02-24 2016-06-29 成都信汇聚源科技有限公司 Blood pressure information collecting and managing method
CN106909081A (en) * 2017-03-09 2017-06-30 广东美的制冷设备有限公司 Expansion platform and home appliance based on home appliance
CN109903041A (en) * 2018-11-30 2019-06-18 阿里巴巴集团控股有限公司 The method and system of block cochain for the transaction of block chain
CN209267613U (en) * 2019-01-15 2019-08-16 南京菲迪尔电子科技有限公司 The broadband automatic building control system of the full distributed power line of Internet of Things
CN112966044A (en) * 2021-02-26 2021-06-15 支付宝(杭州)信息技术有限公司 Data storage method and system of IOT (input/output) equipment based on block chain
CN113438628A (en) * 2021-06-23 2021-09-24 京东科技控股股份有限公司 Method and device for data interaction
CN113486407A (en) * 2021-07-05 2021-10-08 建信金融科技有限责任公司 Deposit receipt management system and method based on block chain

Similar Documents

Publication Publication Date Title
CN111680305B (en) Data processing method, device and equipment based on block chain
US20200145409A1 (en) Internet of things (iot) device management
US10375057B2 (en) Systems and methods for certificate chain validation of secure elements
US20190165947A1 (en) Signatures for near field communications
CN113572715B (en) Data transmission method and system based on block chain
CN108140093A (en) Secret is migrated using for the hardware root of trust of equipment
US20150163211A1 (en) Unclonable id based chip-to-chip communication
CN113014539B (en) Internet of things equipment safety protection system and method
CN102171652A (en) Method for provisioning trusted software to an electronic device
AU2019101564A4 (en) Information registration and authentication method and device
CN106936588B (en) Hosting method, device and system of hardware control lock
CN112491881A (en) Cross-platform single sign-on method, system, electronic equipment and storage medium
CN106161470B (en) A kind of authorization method, client, server and system
US20210091950A1 (en) Secure self-identification of a device
CN107040501B (en) Authentication method and device based on platform as a service
CN117397198A (en) Binding encryption key attestation
CN116015846A (en) Identity authentication method, identity authentication device, computer equipment and storage medium
Groza et al. CarINA-Car sharing with IdeNtity based Access control re-enforced by TPM
CN116208517A (en) Bluetooth-based data acquisition method and system
KR102377045B1 (en) SYSTEMS AND METHODS FOR AUTHENTICATING IoT DEVICE THROUGH CLOUD USING HARDWARE SECURITY MODULE
Kasper et al. Rights management with NFC smartphones and electronic ID cards: A proof of concept for modern car sharing
TWI673621B (en) Information registration, authentication method and device
Angelogianni Analysis and Implementation of the Fido Protocol in a Trusted Environment
Najdenova et al. Blockchain Based Approach for Preserving Car Maintenance History
Αγγελογιάννη Analysis and implementation of the FIDO protocol in a trusted environment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination