CN109167665B - Robot competition rule management system - Google Patents

Robot competition rule management system Download PDF

Info

Publication number
CN109167665B
CN109167665B CN201810731687.4A CN201810731687A CN109167665B CN 109167665 B CN109167665 B CN 109167665B CN 201810731687 A CN201810731687 A CN 201810731687A CN 109167665 B CN109167665 B CN 109167665B
Authority
CN
China
Prior art keywords
server
voting
competition
user
management module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810731687.4A
Other languages
Chinese (zh)
Other versions
CN109167665A (en
Inventor
李春华
丁立星
冯宝库
傅瑞锦
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing kaisibo Technology Co.,Ltd.
Original Assignee
Beijing Kaisibo Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Kaisibo Technology Co ltd filed Critical Beijing Kaisibo Technology Co ltd
Priority to CN201810731687.4A priority Critical patent/CN109167665B/en
Publication of CN109167665A publication Critical patent/CN109167665A/en
Application granted granted Critical
Publication of CN109167665B publication Critical patent/CN109167665B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C13/00Voting apparatus
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3234Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/46Secure multiparty computation, e.g. millionaire problem
    • H04L2209/463Electronic voting

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses a robot competition rule management system, which comprises a plurality of evaluation nodes representing different competition participants, wherein each evaluation node has independent voting qualification, the hardware part of each evaluation node comprises an interface layer with a man-machine interaction function, a service layer for service logic processing and a data acquisition layer for collecting robot competition data in real time, one end of the service layer is connected with the data acquisition layer, the other end of the service layer is connected with the interface layer, the interface layer comprises a data visualization module and a system management module, the service layer comprises an identity management module, a consensus management module and an intelligent contract module, the data acquisition layer comprises a plurality of data acquisition modules, a fair and fair competition environment is provided for robot competition, the competition information is guaranteed to be public and transparent, the data information cannot be tampered, and the accuracy and reliability of the robot competition are greatly improved.

Description

Robot competition rule management system
Technical Field
The invention relates to the technical field of robot competition, in particular to a robot competition rule management system.
Background
The robot competition reflects the level of basic research and high-tech development in the field of national information and automation, and aims to promote researchers to research various related technologies and obtain better solutions, so that the development of the technology is promoted.
Traditionally, the judgment of the rules of the competition is mainly carried out manually, and judges whether a competition team scores or not, makes a penalty or not, obtains a competition victory or not and the like according to the rules and the actual conditions of the competition field.
In recent years, some automatic rule evaluation management systems have appeared, which can automatically collect data generated by a competition and evaluate the competition process according to preset rules, thereby greatly improving the efficiency and accuracy of the competition.
The existing automatic rule management system is basically a system provided by a competition organization party, and the system provided by a single organization party brings about a plurality of problems:
1. neutrality, how to ensure that the system provided by the competition organizer is neutral, without favoring some of the participants of the competition;
2. the transparency ensures that the system provided by the competition organization party is transparent, so that people can see how the system runs, whether the system runs is judged according to a preset rule strictly or not, and whether the system runs wrongly or not;
3. the method can trace back, when the competition participants have disagreement, how to trace back the data and rule judgment process generated in the competition process can ensure that the competition participants can fully verify the process generated by the result;
4. data cannot be tampered, and how to ensure that all data generated in the competition process cannot be tampered ensures the fairness of the system.
Disclosure of Invention
In order to overcome the defects of the prior art, the invention provides a robot competition rule management system, which provides a fair and fair competition environment for robot competition, ensures the public and transparent competition information, and can effectively solve the problems in the background art.
The technical scheme adopted by the invention for solving the technical problems is as follows:
a robot competition rule management system comprises a plurality of evaluation nodes representing different competition participants, each evaluation node has an independent voting qualification, a hardware part of each evaluation node comprises an interface layer with a man-machine interaction function, a service layer used for service logic processing and a data acquisition layer used for collecting competition data of a robot in real time, one end of the service layer is connected with the data acquisition layer, the other end of the service layer is connected with the interface layer, the interface layer comprises a data visualization module and a system management module, the service layer comprises an identity management module, a consensus management module and an intelligent contract module, and the data acquisition layer comprises a plurality of data acquisition modules.
Furthermore, the identity management module is responsible for identifying whether each judgment node of the system is legal or not, and the authenticity of the user identity is ensured through an X.509 certificate mechanism.
Further, the consensus management module is responsible for voting decision, and each evaluation node has only one vote.
Further, the intelligent contract module is responsible for executing specific evaluation rules.
Further, the judging method of the management system comprises the following steps:
step 100, a competition participant corresponding to each evaluation node deploys and configures a respective server, wherein the respective server comprises three modules of a service layer;
200, a data acquisition module of each judgment node starts to acquire robot competition data and judges the robot competition according to the acquired robot competition data and judgment rules executed by an intelligent contract module;
300, each judging node signs the collected robot competition data and the judging result obtained according to the judging rule by using a respective independent certificate, and then broadcasts the signed combined data to a network;
step 400, the consensus management module of each evaluation node verifies the validity of the combined data signature after receiving the broadcast;
500, voting by all the evaluation nodes according to the combined data with legal signatures to obtain a final evaluation result;
and step 600, all the evaluation nodes store the evaluation results selected by the respective votes into a local database.
Further, in step 200, the intelligent contract module processes and analyzes the robot competition data acquired by the data acquisition module through a multi-sensor information fusion technology, and the multi-sensor information fusion technology adopts a hybrid architecture.
Further, the data acquisition module comprises a position sensor arranged on the robot and used for acquiring the position information of the robot, a speed sensor used for acquiring the speed information of the robot and an angle sensor used for acquiring the direction information of the robot.
Furthermore, an online voting system for realizing voting decision is arranged in the consensus management module, the online voting system comprises a foreground voting part and a background management part, the foreground voting part comprises a referee identity verification management module, a voting module after the referee identity is confirmed, an IP (Internet protocol) for limiting or not limiting referees, a voting management module for allowing repeated voting within a specified time and a voting result viewing module, the background management part comprises a manager identity information management module, a voting title management module and a voting item management module for each voting title, and the voting mode setting and the voting time limitation are included when the voting title is added in the voting title management module.
Further, the specific workflow of the identity management module for ensuring the authenticity of the user identity includes the following steps:
s101, certificate making and issuing:
(1) the user applies for, the server verifies the application submitted by the user, and issues an X.509 certificate to the user who passes the verification, and the CA authentication center generates a digital certificate, wherein the digital certificate comprises user identity information and a public key of a certificate holder;
(2) the user submits ID and password PW to the server, the server records hardware PIN code of user USB Key, i.e. serial number, the individual server generates random number r, obtains current system time T, calculates
Figure BDA0001721042830000041
Computing
Figure BDA0001721042830000042
Wherein
Figure BDA0001721042830000043
Initializing a USB Key by using R, N, Hk (), R and T, storing a digital certificate and a user private Key in the USB Key by a server and issuing the digital certificate and the user private Key to a user to generate the USB Key held by the final user;
s102, login of a server for identity verification:
(1) a user logs in a server and then inserts USB Key equipment, the server automatically detects whether a hardware PIN code of the inserted equipment is legal or not, if not, error information is prompted, and the server is quitted; if the PIN passes the verification, the next step is carried out;
(2) the server obtains the ID and PW input by the user, r and T stored in the USB Key, and calculates
Figure BDA0001721042830000044
Then pass through
Figure BDA0001721042830000045
To obtain
Figure BDA0001721042830000046
Computing with a hash function with a secret key K
Figure BDA0001721042830000047
Comparing with N, if not, refusing the login, alarming and recording to the server by the server, and quitting the server; if the authentication request is equal to the authentication request sent by the USB Key, the server agrees to send the authentication request to the USB Key, and then the next step is carried out;
s103, the server verifies the identity process:
(1) USB Key generates a random number R2And uses the user private key P stored in the internal part to carry out the authentication request message (R)2,TCAnd d) signing, generating a signature message: m ═ R2,TCD }, wherein TCThe authentication request information M is sent to the server by the USB Key when the current time is marked and d is identity data information;
(2) After the server receives the authentication request, checking whether the server is a message receiver, if so, acquiring the certificate of the user, verifying the validity of the certificate, and acquiring the current time mark TSCalculating T as TS-TCIf T isSIs equal to TCOr Δ T1>Delta T, refusing the login request, Delta T1An effective time interval representing a time delay;
(3) extracting public key 0 from user's certificate to verify user's digital signature, i.e. decrypting identity authentication request M, d is 0(P { R ═ 0)2,TCD), so as to obtain the identity information of the USB Key user, if an error occurs in the process or the USB Key is pulled out, the identity management module immediately alarms, records on the server and quits the verification system.
Further, in step 400, the validity of the combined data signature after the broadcast is received by the consensus management module is verified by adopting
Figure BDA0001721042830000051
In the digital signature format of (1).
Compared with the prior art, the invention has the beneficial effects that:
the invention establishes a set of solution for realizing competition rule judgment in a distributed environment, each robot competition party can independently store competition data and execute competition rules, when the execution results are inconsistent, the final results can be judged in a voting decision mode, the whole competition process is equal, the data information generated by the competition is public and transparent and is subjected to digital signature, the data can not be tampered, and the fairness of the robot competition is improved.
Drawings
FIG. 1 is a block diagram of the system of the present invention;
fig. 2 is a business process diagram of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
As shown in fig. 1 and 2, the present invention provides a robot competition rule management system, which includes a plurality of evaluation nodes representing different competition participants, each evaluation node has an independent voting qualification, a hardware portion of each evaluation node includes an interface layer having a human-computer interaction function, a service layer for service logic processing, and a data acquisition layer for collecting competition data of a robot in real time, one end of the service layer is connected to the data acquisition layer, the other end of the service layer is connected to the interface layer, the interface layer includes a data visualization module and a system management module, the service layer includes an identity management module, a consensus management module and an intelligent contract module, and the data acquisition layer includes a plurality of data acquisition modules.
The identity management module is responsible for identifying whether each evaluation node of the system is legal or not, the authenticity of the user identity is ensured through an X.509 certificate mechanism (the X.509 certificate is a public key certificate which is issued by a credible third party authority CA and conforms to an X.509 standard, the certificate comprises user identity information, public key information, identity information of the CA issuing the certificate and signature information of the CA on the certificate, the user identity and a secret key pair are bound through the X.509 certificate, and the credibility of the certificate is ensured through the CA signature), data generated in the competition process of the robot is prevented from being tampered, and the fairness of the competition of the robot is ensured.
The consensus management module is responsible for voting decision-making, and each evaluation node only has one vote.
The intelligent contract module is responsible for executing specific judgment rules (the judgment rules are established according to the scoring standards and methods of a certain competition project (such as football, basketball and the like) in which the robot participates), the intelligent contract is a computer protocol which aims to propagate, verify or execute the contract in an information-based mode, and the intelligent contract allows credible transactions to be conducted without a third party, and the transactions can be tracked and can not be reversed.
The judging method of the management system comprises the following steps:
step 100, a competition participant corresponding to each evaluation node deploys and configures a respective server, wherein the respective server comprises three modules of a service layer;
200, a data acquisition module of each judgment node starts to acquire robot competition data and judges the robot competition according to the acquired robot competition data and judgment rules executed by an intelligent contract module;
step 300, each evaluation node signs the collected robot competition data and the evaluation result obtained according to the evaluation rule with respective independent certificates (the purpose is to attach some data on the data unit or perform password transformation on the data unit, the data and transformation allow a receiver of the data unit to confirm the integrity of the data unit source and the data ternary, protect the data and prevent other people (such as a receiver) from forging), and then broadcasts the signed combined data to a network, so that people can watch the data in real time through intelligent terminal equipment (a mobile phone, a computer, a network television and the like), and the openness and the transparency of the information are ensured;
step 400, the consensus management module of each evaluation node verifies the validity of the combined data signature after receiving the broadcast;
500, voting by all the evaluation nodes according to the combined data with legal signatures to obtain a final evaluation result;
and step 600, all the evaluation nodes store the evaluation results selected by the respective votes into a local database, so that the playback and tracing of the subsequent competition process are facilitated.
It is further explained that, in step 300, the basic flow of digital signature is: a signature process and a verification signature process.
(1) The signature implementation process comprises the following steps: inputting: original text and private key; and (3) outputting: signature value
1. HASH (HASH House hariers) is made of the original text, generally translated as "HASH", and also directly translated as "HASH", that is, an input (also called pre-mapped pre-image) with an arbitrary length is converted into an output with a fixed length through a HASH algorithm, that is, a HASH value, and the conversion is a compression mapping, that is, the space of the HASH value is usually smaller than that of the input, and different inputs may be hashed into the same output, so that it is impossible to determine a unique input value from the HASH value, and simply speaking, a function of compressing a message with an arbitrary length into a message digest with a fixed length;
2. HASH is encrypted with the private key, resulting in a signature value.
(2) The implementation process of the verification signature comprises the following steps: inputting: signature value, original text, public key; and (3) outputting: whether or not to verify passing
1. Preparing a HASH1 from the original text;
2. decrypting the signature value by using a public key to obtain HASH 2;
3. comparing the HASH1 of step 1 with the HASH2 of step 2, the two HASH are verified to pass the same, otherwise, the two HASH do not pass the same.
In step 200, the intelligent contract module processes and analyzes the robot competition data acquired by the data acquisition module by using a multi-sensor information fusion technology (i.e., a computer technology is used to automatically analyze and synthesize information and data from multiple sensors or multiple sources under a certain criterion to complete an information processing process required for decision and estimation), the multi-sensor information fusion technology adopts a hybrid architecture, and the architecture of the multi-sensor information fusion technology has three mechanisms: the hybrid type integrates the advantages of the former two types, and is more used, for example, the obstacle avoidance problem in robot football competition is that ultrasonic and vision are combined, so that the vision centralized information integration is realized, and the vision and the ultrasonic are in distributed fusion.
The data acquisition module comprises a position sensor, a speed sensor and an angle sensor, wherein the position sensor is arranged on the robot and used for acquiring the position information of the robot, the speed sensor is used for acquiring the speed information of the robot, and the angle sensor is used for acquiring the direction information of the robot, so that the position, the state and the speed of the robot can be monitored in real time in the robot competition process, and the stability and the reliability of the robot competition process are ensured.
The consensus management module is internally provided with an online voting system for realizing voting decision, the online voting system comprises a foreground voting part and a background management part, the foreground voting part comprises a referee (referee node) identity verification management module, a voting module after the referee identity is confirmed, an IP (Internet protocol) for limiting or not limiting the referee, a voting management module for allowing repeated voting within a specified time and a voting result viewing module, and the background management part comprises a manager identity information management module, a voting title management module and a voting item management module aiming at each voting title, wherein the voting title management module also comprises the setting of a voting mode and the limitation of voting time when the voting title is added, so that repeated voting by the referee is prevented, and the referee is unfair.
The online voting system pays attention to how to enable the voting referee to conveniently and quickly vote while realizing the functions, is simple and easy to understand, and realizes and strengthens the operability of the referee on the system; for referee voting, the referee operates in the background by an administrator, and false behavior of repeated voting is prevented in a limited IP mode, so that the accuracy of investigation is greatly improved; the voting results can be checked before and after the referee votes, the number of votes voted for each item can be seen in detail on the voting result page, and the votes voted for each item are displayed in a digital mode and a graphical mode, so that the referee and the feedback of information obtained by people are more clear.
The specific workflow of the identity management module for ensuring the authenticity of the user identity comprises the following steps:
s101, certificate making and issuing:
(1) the user applies for, the server verifies the application submitted by the user, and issues an X.509 certificate to the user who passes the verification, and the CA authentication center generates a digital certificate, wherein the digital certificate comprises user identity information and a public key of a certificate holder;
(2) user submits ID and password PW to server, serviceThe device records the hardware PIN code of the USB Key of the user, namely the serial number, the individual server generates a random number r, obtains the current system time T, and calculates
Figure BDA0001721042830000091
Computing
Figure BDA0001721042830000092
Wherein
Figure BDA0001721042830000093
Initializing a USB Key by using R, N, Hk (), R and T, storing a digital certificate and a user private Key in the USB Key by a server and issuing the digital certificate and the user private Key to a user to generate the USB Key held by the final user;
s102, login of a server for identity verification:
(1) a user logs in a server and then inserts USB Key equipment, the server automatically detects whether a hardware PIN code of the inserted equipment is legal or not, if not, error information is prompted, and the server is quitted; if the PIN passes the verification, the next step is carried out;
(2) the server obtains the ID and PW input by the user, r and T stored in the USB Key, and calculates
Figure BDA0001721042830000094
Then pass through
Figure BDA0001721042830000095
To obtain
Figure BDA0001721042830000096
Computing with a hash function with a secret key K
Figure BDA0001721042830000101
Comparing with N, if not, refusing the login, alarming and recording to the server by the server, and quitting the server; if the authentication request is equal to the authentication request sent by the USB Key, the server agrees to send the authentication request to the USB Key, and then the next step is carried out;
s103, the server verifies the identity process:
(1) USB Key generates a random numberR2And uses the user private key P stored in the internal part to carry out the authentication request message (R)2,TCAnd d) signing, generating a signature message: m ═ R2,TCD }, wherein TCThe authentication request information M is sent to a server by the USB Key, wherein the current time is marked, d is identity data information;
(2) after the server receives the authentication request, checking whether the server is a message receiver, if so, acquiring the certificate of the user, verifying the validity of the certificate, and acquiring the current time mark TSCalculating T as TS-TCIf T isSIs equal to TCOr Δ T1>Delta T, refusing the login request, Delta T1An effective time interval representing a time delay;
(3) extracting public key 0 from user's certificate to verify user's digital signature, i.e. decrypting identity authentication request M, d is 0(P { R ═ 0)2,TCD), so as to obtain the identity information of the USB Key user, if an error occurs in the process or the USB Key is pulled out, the identity management module immediately alarms, records on the server and quits the verification system.
The supplementary explanation is that the USB Key of the electronic Key is developed by the smart card technology, and combines the modern cryptology technology, the smart card technology and the USB technology, the chip and the chip operation of the USB Key can provide the functions of private Key generation, safe storage, public Key cryptographic algorithm and the like, because the USB Key has independent data processing capacity and good safety, the USB Key becomes a safe carrier of a digital certificate and a signature private Key, when the digital signature is carried out, the private Key used for signature can be generated and stored in the USB Key, and can not be read out under any condition, the signature process is also completed in the USB Key, and the USB Key is safer and more reliable than the host end downloading in the traditional mode.
In step 400, the validity of the combined data signature is verified by the consensus management module after the broadcast is received
Figure BDA0001721042830000102
The digital signature format of (a) to achieve self-verification,
Figure BDA0001721042830000103
the authentication code is a digital signature format which can be used for verifying the source and integrity of binary software, and the authentication code signs data based on public key encryption standard (PKCS) #7 and uses an X.509 certificate to bind the digitally signed binary program with the identity of an information issuer thereof, and the signature can ensure the source of the information and the unmodified information.
It will be evident to those skilled in the art that the invention is not limited to the details of the foregoing illustrative embodiments, and that the present invention may be embodied in other specific forms without departing from the spirit or essential attributes thereof. The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the invention being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference sign in a claim should not be construed as limiting the claim concerned.

Claims (8)

1. A robot competition rule management system is characterized in that: the robot competition system comprises a plurality of evaluation nodes representing different competition participants, each evaluation node has independent voting qualification, the hardware part of each evaluation node comprises an interface layer with a man-machine interaction function, a service layer for service logic processing and a data acquisition layer for collecting robot competition data in real time, one end of the service layer is connected with the data acquisition layer, the other end of the service layer is connected with the interface layer, the interface layer comprises a data visualization module and a system management module, the service layer comprises an identity management module, a consensus management module and an intelligent contract module, and the data acquisition layer comprises a plurality of data acquisition modules;
the identity management module is responsible for identifying whether each judgment node of the system is legal or not, and the authenticity of the user identity is ensured through an X.509 certificate mechanism;
the judging method of the management system comprises the following steps:
step 100, a competition participant corresponding to each evaluation node deploys and configures a respective server, wherein the respective server comprises three modules of a service layer;
200, a data acquisition module of each judgment node starts to acquire robot competition data and judges the robot competition according to the acquired robot competition data and judgment rules executed by an intelligent contract module;
300, each judging node signs the collected robot competition data and the judging result obtained according to the judging rule by using a respective independent certificate, and then broadcasts the signed combined data to a network;
step 400, the consensus management module of each evaluation node verifies the validity of the combined data signature after receiving the broadcast;
500, voting by all the evaluation nodes according to the combined data with legal signatures to obtain a final evaluation result;
and step 600, all the evaluation nodes store the evaluation results selected by the respective votes into a local database.
2. A robotic competition rules management system according to claim 1, wherein: the consensus management module is responsible for voting decision-making, and each evaluation node only has one vote.
3. A robotic competition rules management system according to claim 1, wherein: the intelligent contract module is responsible for executing specific judgment rules.
4. A robotic competition rules management system according to claim 1, wherein: in the step 200, the intelligent contract module processes and analyzes the robot competition data acquired by the data acquisition module through a multi-sensing information fusion technology, and the multi-sensing information fusion technology adopts a hybrid architecture.
5. A robotic competition rules management system according to claim 4, wherein: the data acquisition module comprises a position sensor, a speed measurement sensor and an angle sensor, wherein the position sensor is arranged on the robot and used for acquiring the position information of the robot, the speed measurement sensor is used for acquiring the speed information of the robot, and the angle sensor is used for acquiring the direction information of the robot.
6. A robotic competition rules management system according to claim 2, wherein: the consensus management module is internally provided with an online voting system for realizing voting decision, the online voting system comprises a foreground voting part and a background management part, the foreground voting part comprises a referee identity verification management module, a voting module after the referee identity is confirmed, an IP (Internet protocol) for limiting or not limiting referees, a voting management module for allowing repeated voting within a specified time and a voting result viewing module, the background management part comprises a manager identity information management module, a voting title management module and a voting item management module aiming at each voting title, and the voting mode setting and the voting time limitation are also included when the voting title is added in the voting title management module.
7. A robotic competition rules management system according to claim 1, wherein: the specific workflow of the identity management module for ensuring the authenticity of the user identity comprises the following steps:
s101, certificate making and issuing:
(1) the user applies for, the server verifies the application submitted by the user, and issues an X.509 certificate to the user who passes the verification, and the CA authentication center generates a digital certificate, wherein the digital certificate comprises user identity information and a public key of a certificate holder;
(2) the user submits ID and password PW to the server, the server records hardware PIN code of user USB Key, i.e. serial number, the individual server generates random number r, obtains current system time T, calculates
Figure FDA0002916107040000031
Computing
Figure FDA0002916107040000032
Wherein
Figure FDA0002916107040000033
Initializing a USB Key by using R, N, Hk (), R and T, storing a digital certificate and a user private Key in the USB Key by a server and issuing the digital certificate and the user private Key to a user to generate the USB Key held by the final user;
s102, login of a server for identity verification:
(1) a user logs in a server and then inserts USB Key equipment, the server automatically detects whether a hardware PIN code of the inserted equipment is legal or not, if not, error information is prompted, and the server is quitted; if the PIN passes the verification, the next step is carried out;
(2) the server obtains the ID and PW input by the user, r and T stored in the USB Key, and calculates
Figure FDA0002916107040000034
Then pass through
Figure FDA0002916107040000035
To obtain
Figure FDA0002916107040000036
Computing with a hash function with a secret key K
Figure FDA0002916107040000037
Comparing with N, if not, refusing the login, alarming and recording to the server by the server, and quitting the server; if the authentication request is equal to the authentication request sent by the USB Key, the server agrees to send the authentication request to the USB Key, and then the next step is carried out;
s103, the server verifies the identity process:
(1) USB Key generates a random number R2And uses the user private key P stored in the internal part to carry out the authentication request message (R)2,TCAnd d) signing, generating a signature message: m ═ R2,TCD }, wherein TCThe authentication request information M is sent to a server by the USB Key, wherein the current time is marked, d is identity data information;
(2) after the server receives the authentication request, checking whether the server is a message receiver, if so, acquiring the certificate of the user, verifying the validity of the certificate, and acquiring the current time mark TSCalculating Δ T ═ TS-TCIf T isSIs equal to TCOr Δ T1>Delta T, refusing the login request, Delta T1An effective time interval representing a time delay;
(3) extracting public key 0 from user's certificate to verify user's digital signature, i.e. decrypting identity authentication request M, d is 0(P { R ═ 0)2,TCD), so as to obtain the identity information of the USB Key user, if an error occurs in the process or the USB Key is pulled out, the identity management module immediately alarms, records on the server and quits the verification system.
8. A robotic competition rules management system according to claim 1, wherein: in step 400, the validity of the combined data signature is verified by the consensus management module after the broadcast is received
Figure FDA0002916107040000041
In the digital signature format of (1).
CN201810731687.4A 2018-07-05 2018-07-05 Robot competition rule management system Active CN109167665B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810731687.4A CN109167665B (en) 2018-07-05 2018-07-05 Robot competition rule management system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810731687.4A CN109167665B (en) 2018-07-05 2018-07-05 Robot competition rule management system

Publications (2)

Publication Number Publication Date
CN109167665A CN109167665A (en) 2019-01-08
CN109167665B true CN109167665B (en) 2021-09-14

Family

ID=64897340

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810731687.4A Active CN109167665B (en) 2018-07-05 2018-07-05 Robot competition rule management system

Country Status (1)

Country Link
CN (1) CN109167665B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111859466A (en) * 2020-07-22 2020-10-30 上海乂学教育科技有限公司 Learning competition system based on block chain
CN113793492B (en) * 2021-08-20 2024-05-03 深圳市创客工场科技有限公司 Communication method and event field control device

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1928859A (en) * 2005-09-08 2007-03-14 年代数位媒体股份有限公司 Interactive multimedia interface and display
CN103550923A (en) * 2013-10-29 2014-02-05 南京邮电大学 Wireless intelligent judgment system and method thereof for realizing intelligent judgment and scoring
CN103856791A (en) * 2012-12-07 2014-06-11 深圳谷威天地传媒科技有限公司 Television voting method and television voting system
CN104992482A (en) * 2015-04-27 2015-10-21 林晓勇 Athletic competition data processing system and method thereof
CN108198321A (en) * 2017-12-27 2018-06-22 杭州数能科技有限公司 A kind of internet voting method and relevant apparatus

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8788335B2 (en) * 2007-06-15 2014-07-22 Social Mecca, Inc. Content distribution system including cost-per-engagement based advertising
US9836908B2 (en) * 2014-07-25 2017-12-05 Blockchain Technologies Corporation System and method for securely receiving and counting votes in an election

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1928859A (en) * 2005-09-08 2007-03-14 年代数位媒体股份有限公司 Interactive multimedia interface and display
CN103856791A (en) * 2012-12-07 2014-06-11 深圳谷威天地传媒科技有限公司 Television voting method and television voting system
CN103550923A (en) * 2013-10-29 2014-02-05 南京邮电大学 Wireless intelligent judgment system and method thereof for realizing intelligent judgment and scoring
CN104992482A (en) * 2015-04-27 2015-10-21 林晓勇 Athletic competition data processing system and method thereof
CN108198321A (en) * 2017-12-27 2018-06-22 杭州数能科技有限公司 A kind of internet voting method and relevant apparatus

Also Published As

Publication number Publication date
CN109167665A (en) 2019-01-08

Similar Documents

Publication Publication Date Title
CN109639410B (en) Block chain-based data evidence storing method and device and electronic equipment
CN107682308B (en) Electronic evidence preservation system based on block chain latent channel technology
US10885207B2 (en) Method, apparatus, and electronic device for blockchain-based recordkeeping
CN110022298B (en) Evidence verification method and device based on block chain and electronic equipment
CN111464980B (en) Electronic evidence obtaining device and method based on block chain in Internet of vehicles environment
CN107506661B (en) Method for generating house historical record based on block chain
CN109660350A (en) Data based on block chain deposit card method and device, electronic equipment
TW200939063A (en) Record system and method based on one-way hash function
CN113129518B (en) Electric vehicle charging system and resource management method thereof
CN110958319B (en) Method and device for managing infringement and evidence-based block chain
CN109167665B (en) Robot competition rule management system
CN116527684B (en) Multi-chain information interaction method based on 1+1+N relay consensus committee
CN110867012A (en) Method, device and system for de-centering electronic voting based on intelligent contract and storage medium
CN114881757A (en) Letter method, system and electronic equipment
CN114020839A (en) Academic achievement publishing and right authentication system and method based on block chain
CN113779642A (en) Data processing method and device, system and electronic equipment thereof
CN114240332A (en) Aggregated signature method for electronic voting
CN116452135A (en) Distributed anonymous voting method, device, equipment and medium based on Ethernet
CN116127429A (en) Data right determining method based on symbol mapping coding and block chain
CN110910091A (en) Data processing method, device and medium
CN112116461A (en) Block chain and consensus method thereof
CN115118435B (en) Privacy data protection and authorization framework based on double-layer chain
CN113763180B (en) Transaction system based on centralized settlement and block chain deposit
CN118074916A (en) Owner voting and publicizing method and system based on voting code synchronous uploading block chain
Neumann et al. Formal treatment of distributed trust in electronic voting

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20210823

Address after: 100000 Room 201, building 4, No. 30, Hetaoyuan, guandongdian North Street, Chaoyang District, Beijing

Applicant after: Beijing kaisibo Technology Co.,Ltd.

Address before: 528100 room 2, building F5, No. 5, Xingye fifth road, Yundonghai street, Sanshui District, Foshan City, Guangdong Province

Applicant before: FOSHAN XINLITU INFORMATION TECHNOLOGY Co.,Ltd.

GR01 Patent grant
GR01 Patent grant