CN109615404A - Based on hard-wired block chain data encryption strengthening design - Google Patents
Based on hard-wired block chain data encryption strengthening design Download PDFInfo
- Publication number
- CN109615404A CN109615404A CN201910015838.0A CN201910015838A CN109615404A CN 109615404 A CN109615404 A CN 109615404A CN 201910015838 A CN201910015838 A CN 201910015838A CN 109615404 A CN109615404 A CN 109615404A
- Authority
- CN
- China
- Prior art keywords
- block chain
- data
- hard
- interface
- dimensional code
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/018—Certifying business or products
- G06Q30/0185—Product, service or business identity fraud
Abstract
The present invention relates to block chain information technical fields, hard-wired block chain data encryption strengthening design is based on more particularly to one kind, including two dimensional code, the two dimensional code is the interface for linking block chain, the interface is the unique identities of each vaccine, the interface is placed on record in block chain, and the more new information constantly in block chain, the two dimensional code is used for accident right-safeguarding, the present invention enhances the data tracking dynamics of vaccine in process of production, accomplish that the true and false of drug can really be looked into, accident source can be quickly exactly found by going wrong.Enhancing data are transferred to the safety in block chain process, prevent from artificially uploading garbage into block chain, are also prevented from information by the information that other illegal servers assume another's name to obtain vaccine and bring adverse effect to enterprise.The speed that data carry out Hash calculation is promoted, there is very strong creativeness.
Description
Technical field
The present invention relates to block chain information technical fields, and in particular to one kind is added based on hard-wired block chain data
Close strengthening design.
Background technique
Block chain technology is the product after multiple discipline developments to certain phase such as cryptography, computer science, economics,
The effective integration outstanding achievement of multiple subjects.The appearance of block chain technology has provided to solve the trust problem of human society
Power tool, and then bring human society into the gunz epoch.
Instantly, vaccine listed company is exactly the favorite of capital market, the share price of long-living biology from now on year lows to highest
Point has had the amount of increase more than twice.And from the beginning of this year, deep bid index breaks through nearly 3 years new low points, and many listed company's share prices are by the waist
It chops off, and medical stock has walked out the big bull market of a wave, it is double that many vaccine stocks realize share price, also allows vaccine listed company practical
The personal value of control people is constantly doubled.
Vaccine is to avoid safest one of the barrier of disease, all one's life of people may make a call to 20 for each of us
A variety of vaccines.Any vaccine is out of joint, all can bring the influence that can not be assessed to our life and health.Perhaps, right
For enterprise, vaccine adverse reaction rate is a statistics number, and for each family, risk probability can only
It is 0 or 1.Therefore a kind of feasible technology how is proposed to improve the source of the supervision of vaccine and accident of tracing to the source, and is one
Very need thing.
If giving one two dimensional code of each vaccine using technology of Internet of things.The two dimensional code includes this production of vaccine mistake
Cheng Zhong, the information such as safety coefficient, the responsible person of each link.Block chain technology is using multicenter or non-stop layer system, no
There are a center processors, so being difficult to distort or delete data.The supervision of vaccine can be greatly improved in this.
However, maximum hidden danger is exactly information security issue if block chain technology is widely used, wherein
Including hacker attack server, data by illegally various hidden danger such as interception.And huge data when carrying out encryption and decryption how
The problems such as improving speed.
Summary of the invention
In view of the deficiencies of the prior art, the invention discloses one kind is set based on hard-wired block chain data encryption reinforcing
Meter, it is intended to design a kind of hardware circuit to promote information security rank of the block chain technology in vaccine supervision application and be promoted and be breathed out
Uncommon value calculating speed.
The present invention is achieved by the following technical programs:
One kind being based on hard-wired block chain data encryption strengthening design, which is characterized in that including two dimensional code, described two
Dimension code is the interface for linking block chain, and the interface is the unique identities of each vaccine, and the interface records in block chain
It is on record, and the more new information constantly in block chain, the two dimensional code are used for accident right-safeguarding.
Preferably, the two dimensional code is related according to cryptographic Hash is converted to by it, cryptographic Hash index is carried out, finally by hash index
It is recorded in block chain node.
Preferably, the interface records the tool of each link of the vaccine from experiment link to links such as production, logistics
All information of body person liable.
Preferably, including chip finger print, the chip finger print design authentication by physics unclonable function.
Preferably, it updates every time and reads the equipment of two-dimensional code data and must all carry out equipment before reading data every time
Authentication, concrete operations are one equipment of every production, and chip finger print data will keep a record on the server.
Preferably, using the hardware circuit of SHA256 algorithm design SHA256, and SHA256 is connected using ahb bus
Come, including the slave interface of design ahb bus, the parsing and control module of ahb bus to SHA256.
Preferably, the process for checking chip finger print data is encrypted using asymmetric encryption RSA or SM2, each taking
Business device sends the data of several chip finger prints by the private key of asymmetric arithmetic.
Preferably, it is decrypted after equipment reads data with public key, if wherein existed and device chip fingerprint phase
The data matched, then equipment is legal equipment, can read data, then carries out the transmission of data.
The invention has the benefit that
1, the data tracking dynamics of enhancing vaccine in process of production, accomplishes that the true and false of drug can really be looked into, goes wrong
Accident source can be quickly exactly found.
2, enhancing data are transferred to the safety in block chain process, prevent from artificially uploading garbage into block chain,
It is also prevented from information and adverse effect is brought to enterprise by the information that other illegal servers assume another's name to obtain vaccine.
3, the speed that data carry out Hash calculation is promoted.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below
There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this
Some embodiments of invention for those of ordinary skill in the art without creative efforts, can be with
It obtains other drawings based on these drawings.
Fig. 1 is the work flow diagram of present system;
Fig. 2 is the realization figure of PUF circuit of the invention;
Fig. 3 is the SHA256 design drawing of the invention based on ahb bus interface;
Fig. 4 is the block diagram of system of the invention.
Specific embodiment
In order to make the object, technical scheme and advantages of the embodiment of the invention clearer, below in conjunction with the embodiment of the present invention
In attached drawing, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is
A part of the embodiment of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art
Every other embodiment obtained without creative efforts, shall fall within the protection scope of the present invention.
Embodiment 1
The present embodiment is directed to current vaccine problem and food hygiene and safety problem, and the monitoring and managing method about these problems
All there is many weaknesses, be on the one hand that management level needs continuous promotion, be on the other hand then the promotion of technological layer,
Concrete operations are as follows:
Firstly, using two dimensional code as the interface of link block chain, this interface and unique body as each vaccine
Part, all information such as the specific person liable of each link of the vaccine from experiment link to links such as production, logistics are recorded, will
It places on record in block chain, and with the continuous propulsion of link, information constantly updates in block chain.When user purchases
When buying vaccine, two dimensional code must be consigned to user by hospital, and in case of accident, user can carry out right-safeguarding with two dimensional code.
In this process, several technical problems need to solve.One, prevent the equipment for reading two dimensional code from illegally being replaced
In generation, causes the data of reading system untrue.Two, in order to improve the production efficiency of enterprise, needing quickly will be in two dimensional code
Related evidence is converted to cryptographic Hash, and to carry out cryptographic Hash index, finally hash index is recorded in block chain node.Three, prevent
The equipment for only reading data passes to data on other illegal servers, causes the leakage or loss of data.
Because each equipment that connect network just contains chip piece, we utilize " chip finger print ", and physics can not
It clones function (PUF) and designs authentication.The equipment for reading two-dimensional code data is updated every time and all must before reading data every time
It must carry out the authentication of equipment.Concrete operations are one equipment of every production, and chip finger print data will be done on the server
Record.The process of verification chip finger print data is encrypted using asymmetric encryption RSA or SM2, and each server passes through non-
The private key of symmetry algorithm sends the data of several chip finger prints, is decrypted after equipment reads data with public key, if wherein deposited
In the data to match with device chip fingerprint, then equipment is legal equipment, can read data.Then the biography of data is carried out
Defeated, process is as shown in Figure 1.
Embodiment 2
The present embodiment is based primarily upon digital PUF and is designed, and number PUF is divided to for two classes: first is that using some memories
The manufacture of the stable state of cellular construction changes to realize.Second is that being realized using the change in propagation delay of digital signal.Mainstream
Design method be realized using the change in propagation delay using digital signal, and utilize digital signal propagation delay become
The cardinal principle changed come in realizing, the present invention is completed using moderator PUF, based on moderator PUF [1-2] is realized on IC
Two symmetrical delayed digital signal paths, an excitation control the definite delay for selecting path.It is logical for introducing judgment condition
It crosses two pulses while walking on both paths, see which path faster and correspondingly exports a response by arbiter circuit.
It is to ensure that the absolute symmetry in the symmetrical delayed digital signal path of two-way, the present invention utilize in place of the most critical of this design
Existing theory simultaneously combines the stringent hand wired in rear end, guarantees the otherness of PUF circuit, promotes the performance of PUF.Its circuit diagram 2 is such as
Shown in figure.
It in order to promote the efficiency of enterprise, in the step of carrying out cryptographic Hash operation, is realized using the method for hardware, when batch
When producing vaccine, the speed of data processing is obviously improved, design process, using the theory of SHA256 algorithm, is designed
Then the hardware circuit of SHA256 is connected SHA256 using ahb bus, including design ahb bus slave interface,
Parsing and control module of the ahb bus to SHA256.Its design frame chart is as shown in figure 3, system block diagram is as shown in Figure 4.
The present invention enhances the data tracking dynamics of vaccine in process of production, accomplishes that the true and false of drug can really be looked into, and occurs
Problem can quickly be exactly found accident source.Enhancing data are transferred to the safety in block chain process, prevent from artificially uploading
Garbage into block chain, be also prevented from information by other illegal servers assume another's name to obtain the information of vaccine bring to enterprise it is bad
It influences.The speed that data carry out Hash calculation is promoted, there is very strong creativeness.
The above embodiments are merely illustrative of the technical solutions of the present invention, rather than its limitations;Although with reference to the foregoing embodiments
Invention is explained in detail, those skilled in the art should understand that: it still can be to aforementioned each implementation
Technical solution documented by example is modified or equivalent replacement of some of the technical features;And these modification or
Replacement, the spirit and scope for technical solution of various embodiments of the present invention that it does not separate the essence of the corresponding technical solution.
Claims (8)
1. one kind is based on hard-wired block chain data encryption strengthening design, which is characterized in that including two dimensional code, the two dimension
Code is the interface of link block chain, and the interface is the unique identities of each vaccine, and the interface is recorded in block chain
Case, and the more new information constantly in block chain, the two dimensional code are used for accident right-safeguarding.
2. according to claim 1 be based on hard-wired block chain data encryption strengthening design, which is characterized in that described
Two dimensional code is related according to cryptographic Hash is converted to by it, carries out cryptographic Hash index, finally hash index is recorded in block chain node.
3. according to claim 1 be based on hard-wired block chain data encryption strengthening design, which is characterized in that described
Interface records a vaccine from experiment link to production, all information of specific person liable of each link of logistics links.
4. according to claim 1 be based on hard-wired block chain data encryption strengthening design, which is characterized in that including
Chip finger print, the chip finger print design authentication by physics unclonable function.
5. according to claim 1 be based on hard-wired block chain data encryption strengthening design, which is characterized in that every time
It updates the equipment for reading two-dimensional code data and must all carry out the authentication of equipment before reading data every time, concrete operations are
One equipment of every production, chip finger print data will keep a record on the server.
6. according to claim 1 be based on hard-wired block chain data encryption strengthening design, which is characterized in that utilize
SHA256 algorithm designs the hardware circuit of SHA256, and is connected SHA256 using ahb bus, including design AHB
The slave interface of bus, the parsing and control module of ahb bus to SHA256.
7. according to claim 4 be based on hard-wired block chain data encryption strengthening design, which is characterized in that described
In chip finger print, the process of verification chip finger print data is encrypted using asymmetric encryption RSA or SM2, each server
The data of several chip finger prints are sent by the private key of asymmetric arithmetic.
8. according to claim 6 be based on hard-wired block chain data encryption strengthening design, which is characterized in that when setting
It is decrypted after standby reading data with public key, if wherein there are the data to match with device chip fingerprint, equipment is to close
The equipment of method reads data, then carries out the transmission of data.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910015838.0A CN109615404A (en) | 2019-01-08 | 2019-01-08 | Based on hard-wired block chain data encryption strengthening design |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910015838.0A CN109615404A (en) | 2019-01-08 | 2019-01-08 | Based on hard-wired block chain data encryption strengthening design |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109615404A true CN109615404A (en) | 2019-04-12 |
Family
ID=66016893
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910015838.0A Pending CN109615404A (en) | 2019-01-08 | 2019-01-08 | Based on hard-wired block chain data encryption strengthening design |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109615404A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110084626A (en) * | 2019-05-08 | 2019-08-02 | 湖南大学 | A kind of production of vaccine monitoring and managing method based on block chain |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140005967A1 (en) * | 2012-06-29 | 2014-01-02 | Kevin E. Fu | Methods and systems for characterizing and identifying electronic devices |
CN104736348A (en) * | 2012-10-18 | 2015-06-24 | 联邦印刷有限公司 | Identity card with physical unclonable function |
CN106779742A (en) * | 2016-12-05 | 2017-05-31 | 华迪计算机集团有限公司 | A kind of method and system for carrying out complete monitoring safely to drug quality based on block chain |
CN107657460A (en) * | 2017-09-08 | 2018-02-02 | 众安信息技术服务有限公司 | A kind of tobacco based on block chain is false proof and source tracing method and system |
CN107730278A (en) * | 2017-10-18 | 2018-02-23 | 上海唯链信息科技有限公司 | A kind of false proof and retroactive method of the medicine based on block chain technology |
CN108256875A (en) * | 2018-04-09 | 2018-07-06 | 王先笨 | A kind of safe traceability system based on product supply chain |
CN109118253A (en) * | 2018-08-22 | 2019-01-01 | 泰康保险集团股份有限公司 | Block chain drug management-control method, device, medium and electronic equipment |
-
2019
- 2019-01-08 CN CN201910015838.0A patent/CN109615404A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140005967A1 (en) * | 2012-06-29 | 2014-01-02 | Kevin E. Fu | Methods and systems for characterizing and identifying electronic devices |
CN104736348A (en) * | 2012-10-18 | 2015-06-24 | 联邦印刷有限公司 | Identity card with physical unclonable function |
CN106779742A (en) * | 2016-12-05 | 2017-05-31 | 华迪计算机集团有限公司 | A kind of method and system for carrying out complete monitoring safely to drug quality based on block chain |
CN107657460A (en) * | 2017-09-08 | 2018-02-02 | 众安信息技术服务有限公司 | A kind of tobacco based on block chain is false proof and source tracing method and system |
CN107730278A (en) * | 2017-10-18 | 2018-02-23 | 上海唯链信息科技有限公司 | A kind of false proof and retroactive method of the medicine based on block chain technology |
CN108256875A (en) * | 2018-04-09 | 2018-07-06 | 王先笨 | A kind of safe traceability system based on product supply chain |
CN109118253A (en) * | 2018-08-22 | 2019-01-01 | 泰康保险集团股份有限公司 | Block chain drug management-control method, device, medium and electronic equipment |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110084626A (en) * | 2019-05-08 | 2019-08-02 | 湖南大学 | A kind of production of vaccine monitoring and managing method based on block chain |
CN110084626B (en) * | 2019-05-08 | 2023-04-18 | 湖南大学 | Vaccine production supervision method based on block chain |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Dilawar et al. | Blockchain: securing internet of medical things (IoMT) | |
KR102403295B1 (en) | System and method for validating homogeneously encrypted data and performing an operation thereon | |
US11144660B2 (en) | Secure data sharing | |
TW201947446A (en) | Blockchain-based information supervision method and device | |
US20220255763A1 (en) | User data management for augmented reality using a distributed ledger | |
Domadiya et al. | Improving healthcare services using source anonymous scheme with privacy preserving distributed healthcare data collection and mining | |
Juyal et al. | Privacy and security of IoT based skin monitoring system using blockchain approach | |
Fu et al. | Fog-to-multicloud cooperative eHealth data management with application-aware secure deduplication | |
CN114357492A (en) | Medical data privacy fusion method and device based on block chain | |
Sarkar et al. | Tree parity machine guided patients’ privileged based secure sharing of electronic medical record: cybersecurity for telehealth during COVID-19 | |
CN112199697A (en) | Information processing method, device, equipment and medium based on shared root key | |
CN112131593A (en) | Information-based feature encryption method, device, equipment and storage medium | |
ˇZiga Kodric et al. | Securing edge-enabled smart healthcare systems with blockchain: A systematic literature review | |
Yadav et al. | An IoT based secure patient health monitoring system | |
Hassan et al. | A lightweight proxy Re-encryption approach with certificate-based and incremental cryptography for fog-enabled E-healthcare | |
Yau et al. | Secure pattern-based data sensitivity framework for big data in healthcare | |
CN109615404A (en) | Based on hard-wired block chain data encryption strengthening design | |
CN115001709A (en) | Credible acquisition and privacy protection method suitable for digital medical data | |
US11436351B1 (en) | Homomorphic encryption of secure data | |
CN114547684A (en) | Method and device for protecting multi-party joint training tree model of private data | |
Saraswat et al. | Health chain-block chain based electronic healthcare record system with access and permission management | |
CN113935055A (en) | Privacy protection recommendation method and system based on block chain and homomorphic encryption | |
Shafagh et al. | Privacy-preserving quantified self: secure sharing and processing of encrypted small data | |
Aruna | Survey on use of blockchain technology in cloud storage for the security of healthcare systems | |
Rastogi et al. | Fully decentralized block chain with proxy re-encryption algorithm for healthcare security |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20190412 |