CN109412789A - A kind of method and device of fire fighting monitoring - Google Patents

A kind of method and device of fire fighting monitoring Download PDF

Info

Publication number
CN109412789A
CN109412789A CN201811150248.0A CN201811150248A CN109412789A CN 109412789 A CN109412789 A CN 109412789A CN 201811150248 A CN201811150248 A CN 201811150248A CN 109412789 A CN109412789 A CN 109412789A
Authority
CN
China
Prior art keywords
node
sensing
block chain
owning side
warning information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811150248.0A
Other languages
Chinese (zh)
Other versions
CN109412789B (en
Inventor
王元鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Clp Smart Security Polytron Technologies Inc
Original Assignee
Shenzhen Clp Smart Security Polytron Technologies Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Clp Smart Security Polytron Technologies Inc filed Critical Shenzhen Clp Smart Security Polytron Technologies Inc
Priority to CN201811150248.0A priority Critical patent/CN109412789B/en
Publication of CN109412789A publication Critical patent/CN109412789A/en
Application granted granted Critical
Publication of CN109412789B publication Critical patent/CN109412789B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Alarm Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The present embodiments relate to technical field of fire control, especially disclose a kind of method and device of fire fighting monitoring, and method includes: to establish connection to the sensing node for belonging to same owning side to form sensing block chain;The node index cryptographic Hash of owning side's node identification of the corresponding owning side's node of one owning side and sensing block chain is stored in a main chain block, and connects each main chain block to form main block chain;Receive the warning information that sensing block chain reports;Legitimate verification is carried out to the warning information;If being verified, to the sensing block chain corresponding owning side's node push warning information for reporting the warning information.By the above-mentioned means, the present invention realizes the fire fighting monitoring of decentralization.

Description

A kind of method and device of fire fighting monitoring
Technical field
The present embodiments relate to the technical field of fire fighting monitoring more particularly to a kind of method and devices of fire fighting monitoring
Background technique
With the development of the city, the industrial working in city, high-rise business, ground traffic above-ground equipment are also more and more, It is also higher and higher to fire-fighting work bring complexity.In order to cope with the complexity of fire-fighting work, so that fire fighter's energy first Time obtains the fire fighting problems such as fire or floods, to evacuate crowd in first time, and rescue work is unfolded, currently, occurring Each fire-fighting equipment is uniformly connected on fire-fighting central server by Internet of Things firefighting monitoring system, by fire-fighting center service Device is monitored in real time, when finding fire fighting problem, is immediately notified fire fighter, is set about handling by fire fighter.
But the present inventor is in the implementation of the present invention, discovery: currently, Internet of Things firefighting monitoring system It is that data processing is carried out by the central node of fire-fighting central server, with increasing for the sensing node for fire fighting monitoring, The load of fire-fighting central server can greatly increase.
Summary of the invention
The main purpose of the present invention is to provide a kind of method and devices of fire fighting monitoring, can be realized disappearing for decentralization Anti- monitoring.
In order to solve the above technical problems, the embodiment of the invention provides a kind of methods of fire fighting monitoring, comprising: same to belonging to The sensing node of one owning side establishes connection and forms sensing block chain;The owning side of the corresponding owning side's node of one owning side is saved The node index cryptographic Hash of point identification and sensing block chain is stored in a main chain block, and each main chain block is connected Form main block chain;Receive the warning information that sensing block chain reports;Legitimate verification is carried out to the warning information;If verifying Pass through, then to the sensing block chain corresponding owning side's node push warning information for reporting the warning information.
Optionally, warning information is the root in the sensing network when the detected value of a sensing node is more than alarm threshold According to default common recognition model, issued after reaching common understanding with other sensing nodes.
Optionally, the warning information carries the node rope of all sensing nodes in digital signature and the sensing network Draw;Described includes: to obtain node entrained by the warning information to index to warning information progress legitimate verification;From institute State the node index cryptographic Hash that the sensing block chain of report and alarm information is obtained in main block chain;It is indexed by the node got Cryptographic Hash carries out the first verifying to the index of node entrained by the warning information, and, to entrained by the warning information Digital signature carries out the second verifying;When first verifying and the second verifying pass through, determine that the warning information passes through conjunction Method verifying;Otherwise, it determines the warning information is not over legitimate verification.
Optionally, the method also includes: sales information is saved and forms chain transaction into block chain, wherein the pin Sell the node index of owning side's node identification that information includes owning side and the sensing node that the owning side is bought;When a biography When feeling node request one sensing block chain of addition, the node index and described one for extracting a sensing node senses block chain pair Owning side's node identification of the owning side answered;By the chain transaction, to the node index of a sensing node and described one The attaching relation of the corresponding owning side of sensing block chain is verified;When being verified, a sensing node is allowed to request The sensing block chain is added.
Optionally, the method also includes: when owning side's node request be added main block chain when, pass through the transaction Chain, verifies whether the owning side node is legitimate node;If so, according to owning side's node of the owning side node The node of mark and corresponding sensing block chain index cryptographic Hash generates a new main chain block and is added to main block chain.
In order to solve the above technical problems, the embodiment of the invention also provides a kind of device of fire fighting monitoring, described device packet Include: first establishes module, forms sensing block chain for establishing connection to the sensing node for belonging to same owning side;Second establishes Module, for the node of owning side's node identification of the corresponding owning side's node of an owning side and sensing block chain to be indexed Hash Value is stored in a main chain block, and connects each main chain block to form main block chain;Receiving module is passed for receiving The warning information that sensillary area block chain reports;First authentication module, for carrying out legitimate verification to the warning information;Push mould Block, for when the authentication module is verified, to the corresponding owning side's section of sensing block chain for reporting the warning information Point pushes the warning information.
Optionally, the warning information is in the sensing network when the detected value of a sensing node is more than alarm threshold When, according to default common recognition model, issued after reaching common understanding with other sensing nodes.
Optionally, the warning information carries the node rope of all sensing nodes in digital signature and the sensing network Draw;First authentication module includes: first acquisition unit, for obtaining the index of node entrained by the warning information;The Two acquiring units index cryptographic Hash for obtaining the node of sensing block chain of report and alarm information from the main block chain; Subelement is verified, the is carried out to the index of node entrained by the warning information for indexing cryptographic Hash by the node that gets One verifying, and, the second verifying is carried out to digital signature entrained by the warning information;Determination unit is tested when described first When card and the second verifying pass through, the warning information is determined by legitimate verification, otherwise, it determines the warning information does not have Pass through legitimate verification.
Optionally, described device further include: third establishes module, hands over for saving into block chain to be formed sales information Easy chain, wherein the sales information includes owning side's node identification of owning side and the sensing node that the owning side is bought Node index;Extraction module, for obtaining a sensing node when a sensing block chain is added in sensing node request Node index and described one sense the corresponding owning side of block chain owning side's node identification;Second authentication module, for leading to The chain transaction is crossed, the ownership of the node index of sensing node owning side corresponding with a sensing block chain is closed System is verified;First is added module, for allowing a sensing node to ask when second authentication module is verified It asks and the sensing block chain is added.
Optionally, described device further include: third authentication module, for main block chain to be added when owning side's node request When, by the chain transaction, verify whether the owning side node is legitimate node;Second is added module, for described When third authentication module is verified, according to owning side's node identification of the owning side node and corresponding sensing unit The node index cryptographic Hash of block chain generates a new main chain block and is added to main block chain.
In embodiments of the present invention, connection is established to the sensing node for belonging to same owning side and forms sensing block chain, it will Owning side's node identification of the corresponding owning side's node of one owning side and the node index cryptographic Hash of sensing block chain are stored in one In main chain block, and connect each main chain block to form main block chain, it can be with fire-fighting between main block chain and sensing block chain Communication, and main block chain and sensing block chain all go to center, so that the fire fighting monitoring of decentralization is realized, in addition, sensing Block chain is the complexity for being divided according to owning side, and can reducing sensing block chain, furthermore, sensing block chain is reported Warning information execute legitimate verification, improve the safety of fire fighting monitoring.
Detailed description of the invention
One or more embodiments are illustrated by the picture in corresponding attached drawing, these exemplary theorys The bright restriction not constituted to embodiment, the element in attached drawing with same reference numbers label are expressed as similar element, remove Non- to have special statement, composition does not limit the figure in attached drawing.
Fig. 1 is the schematic diagram of the system embodiment of fire fighting monitoring of the present invention;
Fig. 2 is the flow chart of the method first embodiment of fire fighting monitoring of the present invention;
Fig. 3 is the flow chart that warning information is verified in the method first embodiment of fire fighting monitoring of the present invention;
Fig. 4 is the flow chart of the method second embodiment of fire fighting monitoring of the present invention;
Fig. 5 is the schematic diagram of the Installation practice of fire fighting monitoring of the present invention.
Specific embodiment
In order to make the object, technical scheme and advantages of the embodiment of the invention clearer, below in conjunction with the embodiment of the present invention In attached drawing, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is A part of the embodiment of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art Every other embodiment obtained without creative efforts, shall fall within the protection scope of the present invention.
In addition, as long as technical characteristic involved in the various embodiments of the present invention described below is each other not Constituting conflict can be combined with each other.
Referring to Fig. 1, Fig. 1 is the schematic diagram of firefighting monitoring system of the present invention.Firefighting monitoring system 10 includes sensing block Chain 11, main block chain 12 and chain transaction 13.Wherein, sensing block chain 11 is made of sensing node, senses the number of block chain 11 Amount be it is a plurality of, the sensing node that each senses block chain 11 belongs to same owning side, i.e., owning side and sensing block chain 11 it Between correspond.Main block chain 12 is made of several main blocks, and each main block includes that the owning side of an owning side saves The node of point identification and corresponding sensing block chain 11 indexes cryptographic Hash.Chain transaction 13 saves sales information, sales information The node for the sensing node that owning side's node identification and owning side including owning side are bought indexes, and therefore, passes through chain transaction 13 can verify whether sensing node and owning side's node are legal purchase.Wherein, block chain 11,12 and of main block chain are sensed It is communicated between transaction block chain by across chain agreement.
Referring to Fig. 2, Fig. 2 is the flow chart of the method first embodiment of fire fighting monitoring of the present invention, this method is applied to upper The firefighting monitoring system stated, specifically, method includes:
Step 201: connection being established to the sensing node for belonging to same owning side and forms sensing block chain;
Sensing node is used to obtain the inductors of fire-fighting data, such as: smoke inductor, temperature inductor, optical inductor, Gas sensor, video sensor etc..It should be understood that the sensing node in same sensing block chain can not be same The inductor of seed type, but a plurality of types of inductors.
It is worth noting that: owning side described herein can for individual, or legal person or it is other can be with boundary Determine the owning side of ownership.
Step 202: by the node of owning side's node identification of the corresponding owning side's node of an owning side and sensing block chain Index cryptographic Hash is stored in a main chain block, and connects each main chain block to form main block chain;
The node index cryptographic Hash of each sensing block chain is the node index according to each sensing node in sensing block chain It is calculated, when node index changes in a sensing block chain, node index cryptographic Hash can also change, when one Increase by a sensing node in sensing block chain or reduces by a sensing node, when node index being caused to change, node rope Drawing cryptographic Hash can also change.Whenever increasing or reducing sensing node, need to recalculate node index cryptographic Hash, and It saves it in the main chain block of main block chain.
Node index is the mark of sensing node, and with uniqueness, i.e., different sensing nodes have different node ropes Draw.Node indexes the public key that can be the cipher key pair obtained by rivest, shamir, adelman.The private key of the cipher key pair can be used It is digitally signed in message, and the public key (node index i.e. here) of cipher key pair can be used for carrying out digital signature Verifying.Merkle Tree (Mei Keer tree) algorithm be can use according to the node rope of all sensing nodes in sensing block chain Draw and calculate Mei Keer tree root cryptographic Hash, the node of the i.e. sensing block chain of the cryptographic Hash of tree root indexes cryptographic Hash.
Step 203: receiving the warning information that sensing block chain reports;
Warning information is the information of triggering alarm when the detected value that sensing node detects exceeds alarm threshold.Work as detected value When beyond alarm threshold, then explanation there are hidden fire-fighting danger or is sending out fire fighting problem, and warning information, which is used to indicate user, sets about Check hidden fire-fighting danger or the occurent fire fighting problem of processing.
Wherein, warning information, which can be, directly reports when the detected value that sensing node detects is beyond alarm threshold; It is and other according to default common recognition model or in sensing network when the detected value of a sensing node is more than alarm threshold What sensing node issued after reaching common understanding.
Specifically, when the detected value of a sensing node is more than alarm threshold, other neighbouring sections into sensing block chain Broadcast message of the point broadcast comprising common recognition request and testing result.Testing result can be divided into two types, when detected value is more than When alarm threshold, it is abnormal that sensor node, which will test result queue,;When testing result is less than alarm threshold, sensor section It is normal that point, which will test result queue,.After other sensor nodes receive common recognition request, according to itself current detected value and announcement Alert threshold calculations testing result, then the broadcast message containing the testing result is broadcasted to other sensing nodes.Each sensing node pair The broadcast message comprising various types of testing results received is counted respectively, is then counted and is tied to other node broadcasts again Fruit.When the count results unanimously (testing result is that the quantity of abnormal broadcast message is identical), and detection knot of most sensing nodes When fruit is that the quantity of abnormal broadcast message is more than a preset fire alarm threshold, that is, think to reach common understanding, sensing node is being reached Warning information is generated after common recognition.In some embodiments, fire alarm threshold can be set to be greater than or equal to 2, this mean that Alarm information can be just generated after needing two sensing nodes to be simultaneously emitted by the broadcast message that testing result is exception less, to avoid Occur because environmental factor interference leads to the situation of single sensing node false alarm, thus such arrangement can be improved sensing unit The anti-interference ability of block chain.Relative to single sensing node, multiple sensing nodes, which participate in common recognition, can be improved the detectability of fire, Such as when there is smoldering fire, heat radiation is less, and simple temperature sensor is difficult to detect smoldering fire, but carbon monoxide transducer, cigarette Mist sensor then can effectively detect smoldering fire.For another example, the smog that many materials are issued when open fire burns is less, therefore cigarette Mist sensor is difficult to effectively alert, and temperature sensor, optical sensor can effective early warning, so present invention introduces multiple and different The sensing node of type is known together, and sensing network entirety fire detection ability can be improved.It should be noted that same sensing Multiple sensing nodes in block chain should be in the same space, and setting close to each other.
Step 204: legitimate verification being carried out to warning information and holds step 205 if being verified, is otherwise issued abnormal Warning information prompt.
In some embodiments, warning information carries the node of all sensing nodes in digital signature and the sensing network Index is to be verified by digital signature and node index when verifying to warning information, then, as shown in figure 3, step 204 include:
Step 2041: obtaining the index of node entrained by warning information;
Step 2042: the node that the sensing block chain of report and alarm information is obtained from main block chain indexes cryptographic Hash;
Step 2043: cryptographic Hash being indexed by the node got, first is carried out to the index of node entrained by warning information Verifying, and, the second verifying is carried out to digital signature entrained by warning information;
Cryptographic Hash is indexed by node to verify primarily to verifying whether the sensing node senses node index Sensing node in block chain avoids the sensing node outside chain from uploading warning information to verify the authenticity of sensing node.Number Signature is also the authenticity for verifying sensing node, and in some embodiments, node index can be to be calculated by asymmetric encryption The public key for the cipher key pair that method obtains.The private key of the cipher key pair can be used for being digitally signed message, and cipher key pair Public key (node index) i.e. here can be used for verifying digital signature.
It is to be understood that in further embodiments, it can also be using a progress in the first verifying and the second verifying Verifying, rather than the two carries out simultaneously.But the two verifies the difficulty that personation sensing node can be improved simultaneously.
Step 2044: when the first verifying and the second verifying pass through, determining that the warning information passes through legitimate verification;
Step 2045: otherwise, it determines warning information is not over legitimate verification.
It is to be understood that the mode that verifying is also not necessarily limited to foregoing description is carried out for warning information, and such as: warning information In include the sensing network in all sensing nodes node straw line, detect whether the node straw line is that legal node draws Rope is specifically exactly to detect whether node index in chain transaction have record.
Step 205: pushing warning information to the corresponding owning side's node of sensing block chain of report and alarm information.
Owning side's node can be the equipment for receiving information, such as: tablet computer, wearable device, server etc., this Place no longer repeats one by one.
It is worth noting that: above-mentioned steps 204 and step 205 can write main block chain in a manner of Intelligent Service contract On, when main block chain receives warning information by across chain agreement, triggering executes the Intelligent Service contract.
In embodiments of the present invention, connection is established to the sensing node for belonging to same owning side and forms sensing block chain, it will Owning side's node identification of the corresponding owning side's node of one owning side and the node index cryptographic Hash of sensing block chain are stored in one In main chain block, and connect each main chain block to form main block chain, it can be with fire-fighting between main block chain and sensing block chain Communication, and main block chain and sensing block chain all go to center, so that the fire fighting monitoring of decentralization is realized, in addition, sensing Block chain is the complexity for being divided according to owning side, and can reducing sensing block chain, furthermore, sensing block chain is reported Warning information execute legitimate verification, improve the safety of fire fighting monitoring.
Referring to Fig. 4, Fig. 4 is the flow chart of the method second embodiment of fire fighting monitoring of the present invention, the present embodiment with it is other Embodiment the difference is that, method further include:
Step 206: sales information being saved and forms chain transaction into block chain, wherein sales information includes owning side's The node for the sensing node that owning side's node identification and owning side are bought indexes;
Owning side's node identification is the identity marks of owning side.Owning side's node identification also has corresponding with owning side's node Relationship, the corresponding owning side's node of usually owning side's node identification.
Step 207: when a sensing block chain is added in sensing node request, extracting the node index of a sensing node Owning side's node identification of owning side corresponding with a sensing block chain;When a sensing block chain is added in sensing node request, Solicited message can be sent to the sensing block chain, include the node index of itself in solicited message, the sensing block chain After receiving solicited message, the node index cryptographic Hash of the sensing block chain is added in solicited message, then by solicited message It is forwarded to main block chain.Main block chain can index cryptographic Hash according to the node in the solicited message and inquire to obtain a sensing unit Owning side's node identification of owning side belonging to block chain.
Step 208: by chain transaction, to the node index of a sensing node and a sensing, block chain is corresponding possesses The attaching relation of side is verified, and when being verified, executes step 209, otherwise, sensing node request is not allowed to be added The one sensing block chain.
Step 209: allowing sensing node request that the sensing block chain is added.
Due to recording sales information in chain transaction, sales information includes the node index of sensing node, when a sensing section When point request plus a sensing block chain, the sensing node is identified whether in chain transaction, if not existing, illustrates the sensing node simultaneously It is not legitimate sales, is refitted vehicles or other sensing nodes illegally sold, forbids illegal sensing node to access and pass Sensillary area block chain, advantageously ensures that the safety of sensing unit chain.
Further, main block chain is added in the owning side's node developed or installed after also can permit, when owning side's node When main block chain is added in request, legitimacy certification can also be carried out to owning side's node, illegal owning side's node is avoided to be added Onto main block chain, specific authentication method include: when owning side's node requests that main block chain is added, by chain transaction, Verify whether the owning side node is legitimate node, if so, according to owning side's node identification of the owning side node and The node index cryptographic Hash of corresponding sensing block chain generates a new main chain block and is added to main block chain, does not otherwise allow Main block chain is added in owning side's node.
Since the sales information recorded in chain transaction includes owning side's node identification of owning side's node, as an owning side When node request plus a main block chain, owning side's node is identified whether in chain transaction, if not existing, illustrates that the owning side saves Point is not legitimate sales, is refitted vehicles or other owning side's nodes illegally sold, illegal owning side is forbidden to save Point access main block chain is also beneficial to guarantee the safety of main block chain.
In embodiments of the present invention, when sensing node requests that sensing block chain is added, alternatively, the request of owning side's node is added When main block chain, sensing node or owning side's node are verified by the sale recorded in chain transaction, and is testing Card by when just allow to be added corresponding block chain, realizing only allows legal sensing node or legal owning side's node to enter Chain is conducive to the safety for improving each block chain.
The present invention provides the Installation practice of fire fighting monitoring again.As shown in figure 5, the device 40 of fire fighting monitoring is built including first Formwork erection block 41, second establish module 42, receiving module 43, the first authentication module 44 and pushing module 45.
First establishes module 41, forms sensing block chain for establishing connection to the sensing node for belonging to same owning side. Second establishes module 42, for by owning side's node identification of the corresponding owning side's node of an owning side and sensing block chain section Point index cryptographic Hash is stored in a main chain block, and connects each main chain block to form main block chain.Receiving module 43, the warning information reported for receiving sensing block chain.First authentication module 44 is tested for carrying out legitimacy to warning information Card.Pushing module 45, for when authentication module is verified, to the corresponding owning side of sensing block chain of report and alarm information Node pushes warning information.
In some embodiments, warning information is in the sensing network when the detected value of a sensing node is more than alarm threshold When value, according to default common recognition model, issued after reaching common understanding with other sensing nodes.Warning information carries digital signature and institute State all sensing nodes in sensing network node index, specifically, the first authentication module 44 include first acquisition unit 441, Second acquisition unit 442, verifying subelement 443 and determination unit 444.
First acquisition unit 441 is for obtaining the index of node entrained by the warning information.Second acquisition unit 442, Node for obtaining the sensing block chain of report and alarm information from the main block chain indexes cryptographic Hash.Verify subelement 443, cryptographic Hash is indexed for the node by getting, and the first verifying is carried out to the index of node entrained by the warning information, And the second verifying is carried out to digital signature entrained by the warning information.Determination unit 444, when the first verifying and second When verifying passes through, warning information is determined by legitimate verification, otherwise, it determines the warning information is tested not over legitimacy Card.
It is to be understood that carrying out the mode that verifying is also not necessarily limited to foregoing description to warning information, can also use other Mode, such as: it include the node straw line of all sensing nodes in the sensing network in warning information, detecting the node straw line is No is legal node straw line, is specifically exactly to detect whether node index in chain transaction have record.
Further, the device 40 of fire fighting monitoring further includes that third establishes module 46, extraction module 47, second verifies mould Module 49 is added in block 48, first, module 51 is added in third authentication module 50 and second.
Third establishes module 46, forms chain transaction into block chain for saving sales information, wherein the sales letter The node index for the sensing node that owning side node identification and the owning side of the breath including owning side are bought.Extraction module 47, for when a sensing block chain is added in sensing node request, the node index and one for obtaining a sensing node to be passed Owning side's node identification of the corresponding owning side of sensillary area block chain.Second authentication module 48, for being passed to one by the chain transaction The attaching relation of the node index of sense node owning side corresponding with a sensing block chain is verified.First is added module 49, For when second authentication module 48 is verified, allowing a sensing node to request that sensing block chain is added.
Due to recording sales information in chain transaction, when sensing node request plus a sensing block chain, the sensing is identified Whether node is in chain transaction, if not existing, illustrates that the sensing node is not legitimate sales, is refitted vehicles, Huo Zheqi The sensing node that it illegally sells forbids illegal sensing node to access sensing block chain, advantageously ensures that the peace of sensing unit chain Quan Xing.
Third authentication module 50, for passing through chain transaction, verifying one when owning side's node requests that main block chain is added Whether owning side's node is legitimate node.Second is added module 51, for when third authentication module 50 is verified, according to one The node index cryptographic Hash of owning side's node identification of owning side's node and corresponding sensing block chain generates a new main chain Block is added to main block chain.
Since the sales information recorded in chain transaction includes owning side's node identification of owning side's node, as an owning side When node request plus a main block chain, owning side's node is identified whether in chain transaction, if not existing, illustrates that the owning side saves Point is not legitimate sales, is refitted vehicles or other owning side's nodes illegally sold, illegal owning side is forbidden to save Point access main block chain is also beneficial to guarantee the safety of main block chain.
In embodiments of the present invention, connection is established to the sensing node for belonging to same owning side and forms sensing block chain, it will Owning side's node identification of the corresponding owning side's node of one owning side and the node index cryptographic Hash of sensing block chain are stored in one In main chain block, and connect each main chain block to form main block chain, it can be with fire-fighting between main block chain and sensing block chain Communication, and main block chain and sensing block chain all go to center, so that the fire fighting monitoring of decentralization is realized, in addition, sensing Block chain is the complexity for being divided according to owning side, and can reducing sensing block chain, furthermore, sensing block chain is reported Warning information execute legitimate verification, improve the safety of fire fighting monitoring.
It should be noted that the apparatus embodiments described above are merely exemplary, wherein described be used as separation unit The module that part illustrates may or may not be physically separated, and the component shown as module can be or can also Not to be physical module, it can it is in one place, or may be distributed on multiple network modules.It can be according to reality Need that some or all of the modules therein is selected to achieve the purpose of the solution of this embodiment.
By the description of above embodiment, those of ordinary skill in the art can be understood that each embodiment can borrow Help software that the mode of general hardware platform is added to realize, naturally it is also possible to pass through hardware.Those of ordinary skill in the art can manage All or part of the process in the solution realization embodiment method is can be by the relevant hardware of computer program instructions come complete At the program can be stored in computer-readable storage medium, and the program is when being executed, it may include such as each method Embodiment process.Wherein, the storage medium can for read-only memory (Read-Only Memory, ROM) or Random access memory (RandomAccessMemory, RAM) etc..
Finally, it should be noted that the above embodiments are merely illustrative of the technical solutions of the present invention, rather than its limitations;At this It under the thinking of invention, can also be combined between the technical characteristic in above embodiments or different embodiment, step can be with It is realized with random order, and there are many other variations of different aspect present invention as described above, for simplicity, they do not have Have and is provided in details;Although the present invention is described in detail referring to the foregoing embodiments, the ordinary skill people of this field Member is it is understood that it is still possible to modify the technical solutions described in the foregoing embodiments, or to part of skill Art feature is equivalently replaced;And these are modified or replaceed, each reality of the present invention that it does not separate the essence of the corresponding technical solution Apply the range of a technical solution.

Claims (10)

1. a kind of method of fire fighting monitoring, which is characterized in that the described method includes:
Connection is established to the sensing node for belonging to same owning side and forms sensing block chain;
The node index cryptographic Hash of the corresponding owning side's node identification of one owning side and sensing block chain is stored in a main chain area In block, and connect each main chain block to form main block chain;
Receive the warning information that sensing block chain reports;
Legitimate verification is carried out to the warning information;
If being verified, believe to reporting the corresponding owning side's node of sensing block chain of the warning information to push the alarm Breath.
2. the method according to claim 1, wherein
The warning information is in the sensing network when the detected value of a sensing node is more than alarm threshold, according to default total Know model, is issued after reaching common understanding with other sensing nodes.
3. according to the method described in claim 2, it is characterized in that, the warning information carries digital signature and the Sensor Network The node index of all sensing nodes in network;
It is described to include: to warning information progress legitimate verification
Obtain the index of node entrained by the warning information;
The node that the sensing block chain of report and alarm information is obtained from the main block chain indexes cryptographic Hash;
Cryptographic Hash is indexed by the node got, and the first verifying is carried out to the index of node entrained by the warning information, with And the second verifying is carried out to digital signature entrained by the warning information;
When first verifying and the second verifying pass through, determine that the warning information passes through legitimate verification;
Otherwise, it determines the warning information is not over legitimate verification.
4. the method according to claim 1, which is characterized in that the method also includes:
Sales information is saved and forms chain transaction into block chain, wherein the sales information includes owning side's section of owning side The node for the sensing node that point identification and the owning side are bought indexes;
When a sensing block chain is added in sensing node request, the node index and described one for extracting a sensing node is passed Owning side's node identification of the corresponding owning side of sensillary area block chain;
By the chain transaction, to the node index of sensing node owning side's corresponding with a sensing block chain Attaching relation is verified;
When being verified, a sensing node is allowed to request that the sensing block chain is added.
5. according to the method described in claim 4, it is characterized in that, the method also includes:
When owning side's node requests that main block chain is added, by the chain transaction, whether the owning side node is verified For legitimate node;
If so, according to owning side's node identification of the owning side node and the node rope of corresponding sensing block chain Draw cryptographic Hash one new main chain block of generation and is added to main block chain.
6. a kind of device of fire fighting monitoring, which is characterized in that
First establishes module, forms sensing block chain for establishing connection to the sensing node for belonging to same owning side;
Second establishes module, for by owning side's node identification of the corresponding owning side's node of an owning side and sensing block chain Node index cryptographic Hash is stored in a main chain block, and connects each main chain block to form main block chain;
Receiving module, the warning information reported for receiving sensing block chain;
First authentication module, for carrying out legitimate verification to the warning information;
Pushing module, for when the authentication module is verified, to reporting the sensing block chain of the warning information corresponding Owning side's node push the warning information.
7. device according to claim 6, which is characterized in that
The warning information is in the sensing network when the detected value of a sensing node is more than alarm threshold, according to default total Know model, is issued after reaching common understanding with other sensing nodes.
8. device according to claim 7, which is characterized in that the warning information carries digital signature and the Sensor Network The node index of all sensing nodes in network;
First authentication module includes:
First acquisition unit, for obtaining the index of node entrained by the warning information;
Second acquisition unit indexes Kazakhstan for obtaining the node of sensing block chain of report and alarm information from the main block chain Uncommon value;
Verify subelement, for by the node that gets index cryptographic Hash to node entrained by the warning information index into Row first is verified, and, the second verifying is carried out to digital signature entrained by the warning information;
Determination unit determines that the warning information passes through legitimate verification when first verifying passes through with the second verifying, Otherwise, it determines the warning information is not over legitimate verification.
9. the device according to any one of claim 6 to 8, which is characterized in that described device further include:
Third establishes module, forms chain transaction into block chain for saving sales information, wherein the sales information includes The node for the sensing node that owning side's node identification of owning side and the owning side are bought indexes;
Extraction module, for obtaining the node of a sensing node when a sensing block chain is added in sensing node request Index owning side's node identification of owning side corresponding with a sensing block chain;
Second authentication module, for being indexed and a sensing unit to the node of a sensing node by the chain transaction The attaching relation of the corresponding owning side of block chain is verified;
First is added module, for when second authentication module is verified, allowing a sensing node to request to be added The one sensing block chain.
10. device according to claim 9, which is characterized in that described device further include:
Third authentication module, for when owning side's node requests that main block chain is added, by the chain transaction, described in verifying Whether one owning side's node is legitimate node;
Second is added module, for when the third authentication module is verified, according to possessing for the owning side node The node of square node identification and corresponding sensing block chain index cryptographic Hash generates a new main chain block and is added to main block Chain.
CN201811150248.0A 2018-09-29 2018-09-29 Fire-fighting monitoring method and device Active CN109412789B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811150248.0A CN109412789B (en) 2018-09-29 2018-09-29 Fire-fighting monitoring method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811150248.0A CN109412789B (en) 2018-09-29 2018-09-29 Fire-fighting monitoring method and device

Publications (2)

Publication Number Publication Date
CN109412789A true CN109412789A (en) 2019-03-01
CN109412789B CN109412789B (en) 2020-05-19

Family

ID=65465733

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811150248.0A Active CN109412789B (en) 2018-09-29 2018-09-29 Fire-fighting monitoring method and device

Country Status (1)

Country Link
CN (1) CN109412789B (en)

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110232282A (en) * 2019-05-20 2019-09-13 深圳市中电数通智慧安全科技股份有限公司 A kind of fire-fighting checks the electronic signature method and system of table
CN111131485A (en) * 2019-12-30 2020-05-08 山东爱城市网信息技术有限公司 Remote monitoring method, equipment and medium based on block chain
CN111192184A (en) * 2019-12-28 2020-05-22 广州创想云科技有限公司 Fire fighting monitoring method based on block chain
CN111199504A (en) * 2019-12-29 2020-05-26 杭州拓深科技有限公司 Decentralized fire protection maintenance supervision method based on block chain
IT201900007707A1 (en) * 2019-06-04 2020-12-04 Lantincendio S R L Highly innovative system for the certification of fire-fighting maintenance processes
CN112995111A (en) * 2019-12-17 2021-06-18 中国移动通信集团河南有限公司 Block chain-based Internet of things security detection method, equipment, system and medium
CN113064901A (en) * 2021-04-06 2021-07-02 北京瑞卓喜投科技发展有限公司 Method and device for forming data micro-index in contract on chain and electronic equipment
CN113821404A (en) * 2021-08-30 2021-12-21 济南浪潮数据技术有限公司 Alarm processing method, system, equipment and medium
US11336451B2 (en) 2019-06-28 2022-05-17 Advanced New Technologies Co., Ltd. Cross-blockchain resource transmission
US11443394B2 (en) * 2019-03-22 2022-09-13 International Business Machines Corporation Blockchain based building action management
CN116319896A (en) * 2023-05-12 2023-06-23 广东省电信规划设计院有限公司 Block chain-based Internet of things perception key information processing method and device
CN116938433A (en) * 2023-05-08 2023-10-24 江苏优培电子科技有限公司 Cross-chain communication method based on block chain

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3941012A1 (en) * 2020-07-14 2022-01-19 Siemens Aktiengesellschaft Method for publishing process data of a industrial facility

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110084800A1 (en) * 2009-10-14 2011-04-14 Lee-Chun Ko Access Authorization Method And Apparatus For A Wireless Sensor Network
CN107249009A (en) * 2017-08-02 2017-10-13 广东工业大学 A kind of data verification method and system based on block chain
CN108053239A (en) * 2017-12-11 2018-05-18 中山大学 Sensor network sharing method based on block chain
CN108512653A (en) * 2018-04-18 2018-09-07 成都零光量子科技有限公司 A kind of electronic evidence acquisition and method of servicing based on block chain

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110084800A1 (en) * 2009-10-14 2011-04-14 Lee-Chun Ko Access Authorization Method And Apparatus For A Wireless Sensor Network
CN107249009A (en) * 2017-08-02 2017-10-13 广东工业大学 A kind of data verification method and system based on block chain
CN108053239A (en) * 2017-12-11 2018-05-18 中山大学 Sensor network sharing method based on block chain
CN108512653A (en) * 2018-04-18 2018-09-07 成都零光量子科技有限公司 A kind of electronic evidence acquisition and method of servicing based on block chain

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
苏芮等: "基于私有区块链的校园消防管理模型研究", 《现代计算机》 *

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11443394B2 (en) * 2019-03-22 2022-09-13 International Business Machines Corporation Blockchain based building action management
CN110232282A (en) * 2019-05-20 2019-09-13 深圳市中电数通智慧安全科技股份有限公司 A kind of fire-fighting checks the electronic signature method and system of table
IT201900007707A1 (en) * 2019-06-04 2020-12-04 Lantincendio S R L Highly innovative system for the certification of fire-fighting maintenance processes
US11336451B2 (en) 2019-06-28 2022-05-17 Advanced New Technologies Co., Ltd. Cross-blockchain resource transmission
CN112995111A (en) * 2019-12-17 2021-06-18 中国移动通信集团河南有限公司 Block chain-based Internet of things security detection method, equipment, system and medium
CN111192184A (en) * 2019-12-28 2020-05-22 广州创想云科技有限公司 Fire fighting monitoring method based on block chain
CN111199504A (en) * 2019-12-29 2020-05-26 杭州拓深科技有限公司 Decentralized fire protection maintenance supervision method based on block chain
CN111199504B (en) * 2019-12-29 2023-09-26 杭州拓深科技有限公司 Block chain-based decentralization fire control maintenance supervision method
CN111131485A (en) * 2019-12-30 2020-05-08 山东爱城市网信息技术有限公司 Remote monitoring method, equipment and medium based on block chain
CN113064901A (en) * 2021-04-06 2021-07-02 北京瑞卓喜投科技发展有限公司 Method and device for forming data micro-index in contract on chain and electronic equipment
CN113821404A (en) * 2021-08-30 2021-12-21 济南浪潮数据技术有限公司 Alarm processing method, system, equipment and medium
CN113821404B (en) * 2021-08-30 2023-12-26 济南浪潮数据技术有限公司 Alarm processing method, system, equipment and medium
CN116938433A (en) * 2023-05-08 2023-10-24 江苏优培电子科技有限公司 Cross-chain communication method based on block chain
CN116319896A (en) * 2023-05-12 2023-06-23 广东省电信规划设计院有限公司 Block chain-based Internet of things perception key information processing method and device

Also Published As

Publication number Publication date
CN109412789B (en) 2020-05-19

Similar Documents

Publication Publication Date Title
CN109412789A (en) A kind of method and device of fire fighting monitoring
CN108632381A (en) A kind of environment measure of supervision and system based on block chain
CN109309680A (en) Network security detection method and guard system based on neural network algorithm
CN104901971B (en) The method and apparatus that safety analysis is carried out to network behavior
CN104852894B (en) A kind of air message listening detection method, system and control server
CN109977661A (en) A kind of network safety protection method and system based on big data platform
CN105471875A (en) Computer network monitoring system
CN106330935B (en) A kind of detection method for the Wi-Fi that goes fishing
US9692779B2 (en) Device for quantifying vulnerability of system and method therefor
CN106452955B (en) A kind of detection method and system of abnormal network connection
CN107493300A (en) Network security protection system
CN108449218B (en) The network security situation sensing system of next-generation key message infrastructure
CN106162649A (en) A kind of identify the method for WAP legitimacy, terminal and system
CN108053627A (en) A kind of fire alarm method, device and equipment
CN108833415A (en) A kind of security solution method and video monitoring system of video monitoring system
CN105681274B (en) A kind of method and device of original alarm information processing
CN105306610B (en) Network identity detection method and device
KR20190078687A (en) Fire alarm system using artificial intelligence
CN108574668A (en) A kind of ddos attack peak flow prediction technique based on machine learning
CN109522166A (en) A kind of automatic assessment method and system of equal guarantors' assessment
CN106652399A (en) Security protection alarm system based on Internet of things, communication module and cloud server
CN113472547A (en) Safety monitoring system based on block chain
CN109461227A (en) The method and device of inspection device
CN110379121A (en) A kind of hazard alarm method and server
CN110059984A (en) Security risk recognition methods, device, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant