CN109615404A - Based on hard-wired block chain data encryption strengthening design - Google Patents

Based on hard-wired block chain data encryption strengthening design Download PDF

Info

Publication number
CN109615404A
CN109615404A CN201910015838.0A CN201910015838A CN109615404A CN 109615404 A CN109615404 A CN 109615404A CN 201910015838 A CN201910015838 A CN 201910015838A CN 109615404 A CN109615404 A CN 109615404A
Authority
CN
China
Prior art keywords
block chain
data
hard
interface
dimensional code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910015838.0A
Other languages
Chinese (zh)
Inventor
李辉
熊晓明
徐崇耀
张景龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong University of Technology
Original Assignee
Guangdong University of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong University of Technology filed Critical Guangdong University of Technology
Priority to CN201910015838.0A priority Critical patent/CN109615404A/en
Publication of CN109615404A publication Critical patent/CN109615404A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • G06Q30/0185Product, service or business identity fraud

Abstract

The present invention relates to block chain information technical fields, hard-wired block chain data encryption strengthening design is based on more particularly to one kind, including two dimensional code, the two dimensional code is the interface for linking block chain, the interface is the unique identities of each vaccine, the interface is placed on record in block chain, and the more new information constantly in block chain, the two dimensional code is used for accident right-safeguarding, the present invention enhances the data tracking dynamics of vaccine in process of production, accomplish that the true and false of drug can really be looked into, accident source can be quickly exactly found by going wrong.Enhancing data are transferred to the safety in block chain process, prevent from artificially uploading garbage into block chain, are also prevented from information by the information that other illegal servers assume another's name to obtain vaccine and bring adverse effect to enterprise.The speed that data carry out Hash calculation is promoted, there is very strong creativeness.

Description

Based on hard-wired block chain data encryption strengthening design
Technical field
The present invention relates to block chain information technical fields, and in particular to one kind is added based on hard-wired block chain data Close strengthening design.
Background technique
Block chain technology is the product after multiple discipline developments to certain phase such as cryptography, computer science, economics, The effective integration outstanding achievement of multiple subjects.The appearance of block chain technology has provided to solve the trust problem of human society Power tool, and then bring human society into the gunz epoch.
Instantly, vaccine listed company is exactly the favorite of capital market, the share price of long-living biology from now on year lows to highest Point has had the amount of increase more than twice.And from the beginning of this year, deep bid index breaks through nearly 3 years new low points, and many listed company's share prices are by the waist It chops off, and medical stock has walked out the big bull market of a wave, it is double that many vaccine stocks realize share price, also allows vaccine listed company practical The personal value of control people is constantly doubled.
Vaccine is to avoid safest one of the barrier of disease, all one's life of people may make a call to 20 for each of us A variety of vaccines.Any vaccine is out of joint, all can bring the influence that can not be assessed to our life and health.Perhaps, right For enterprise, vaccine adverse reaction rate is a statistics number, and for each family, risk probability can only It is 0 or 1.Therefore a kind of feasible technology how is proposed to improve the source of the supervision of vaccine and accident of tracing to the source, and is one Very need thing.
If giving one two dimensional code of each vaccine using technology of Internet of things.The two dimensional code includes this production of vaccine mistake Cheng Zhong, the information such as safety coefficient, the responsible person of each link.Block chain technology is using multicenter or non-stop layer system, no There are a center processors, so being difficult to distort or delete data.The supervision of vaccine can be greatly improved in this.
However, maximum hidden danger is exactly information security issue if block chain technology is widely used, wherein Including hacker attack server, data by illegally various hidden danger such as interception.And huge data when carrying out encryption and decryption how The problems such as improving speed.
Summary of the invention
In view of the deficiencies of the prior art, the invention discloses one kind is set based on hard-wired block chain data encryption reinforcing Meter, it is intended to design a kind of hardware circuit to promote information security rank of the block chain technology in vaccine supervision application and be promoted and be breathed out Uncommon value calculating speed.
The present invention is achieved by the following technical programs:
One kind being based on hard-wired block chain data encryption strengthening design, which is characterized in that including two dimensional code, described two Dimension code is the interface for linking block chain, and the interface is the unique identities of each vaccine, and the interface records in block chain It is on record, and the more new information constantly in block chain, the two dimensional code are used for accident right-safeguarding.
Preferably, the two dimensional code is related according to cryptographic Hash is converted to by it, cryptographic Hash index is carried out, finally by hash index It is recorded in block chain node.
Preferably, the interface records the tool of each link of the vaccine from experiment link to links such as production, logistics All information of body person liable.
Preferably, including chip finger print, the chip finger print design authentication by physics unclonable function.
Preferably, it updates every time and reads the equipment of two-dimensional code data and must all carry out equipment before reading data every time Authentication, concrete operations are one equipment of every production, and chip finger print data will keep a record on the server.
Preferably, using the hardware circuit of SHA256 algorithm design SHA256, and SHA256 is connected using ahb bus Come, including the slave interface of design ahb bus, the parsing and control module of ahb bus to SHA256.
Preferably, the process for checking chip finger print data is encrypted using asymmetric encryption RSA or SM2, each taking Business device sends the data of several chip finger prints by the private key of asymmetric arithmetic.
Preferably, it is decrypted after equipment reads data with public key, if wherein existed and device chip fingerprint phase The data matched, then equipment is legal equipment, can read data, then carries out the transmission of data.
The invention has the benefit that
1, the data tracking dynamics of enhancing vaccine in process of production, accomplishes that the true and false of drug can really be looked into, goes wrong Accident source can be quickly exactly found.
2, enhancing data are transferred to the safety in block chain process, prevent from artificially uploading garbage into block chain, It is also prevented from information and adverse effect is brought to enterprise by the information that other illegal servers assume another's name to obtain vaccine.
3, the speed that data carry out Hash calculation is promoted.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this Some embodiments of invention for those of ordinary skill in the art without creative efforts, can be with It obtains other drawings based on these drawings.
Fig. 1 is the work flow diagram of present system;
Fig. 2 is the realization figure of PUF circuit of the invention;
Fig. 3 is the SHA256 design drawing of the invention based on ahb bus interface;
Fig. 4 is the block diagram of system of the invention.
Specific embodiment
In order to make the object, technical scheme and advantages of the embodiment of the invention clearer, below in conjunction with the embodiment of the present invention In attached drawing, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is A part of the embodiment of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art Every other embodiment obtained without creative efforts, shall fall within the protection scope of the present invention.
Embodiment 1
The present embodiment is directed to current vaccine problem and food hygiene and safety problem, and the monitoring and managing method about these problems All there is many weaknesses, be on the one hand that management level needs continuous promotion, be on the other hand then the promotion of technological layer, Concrete operations are as follows:
Firstly, using two dimensional code as the interface of link block chain, this interface and unique body as each vaccine Part, all information such as the specific person liable of each link of the vaccine from experiment link to links such as production, logistics are recorded, will It places on record in block chain, and with the continuous propulsion of link, information constantly updates in block chain.When user purchases When buying vaccine, two dimensional code must be consigned to user by hospital, and in case of accident, user can carry out right-safeguarding with two dimensional code.
In this process, several technical problems need to solve.One, prevent the equipment for reading two dimensional code from illegally being replaced In generation, causes the data of reading system untrue.Two, in order to improve the production efficiency of enterprise, needing quickly will be in two dimensional code Related evidence is converted to cryptographic Hash, and to carry out cryptographic Hash index, finally hash index is recorded in block chain node.Three, prevent The equipment for only reading data passes to data on other illegal servers, causes the leakage or loss of data.
Because each equipment that connect network just contains chip piece, we utilize " chip finger print ", and physics can not It clones function (PUF) and designs authentication.The equipment for reading two-dimensional code data is updated every time and all must before reading data every time It must carry out the authentication of equipment.Concrete operations are one equipment of every production, and chip finger print data will be done on the server Record.The process of verification chip finger print data is encrypted using asymmetric encryption RSA or SM2, and each server passes through non- The private key of symmetry algorithm sends the data of several chip finger prints, is decrypted after equipment reads data with public key, if wherein deposited In the data to match with device chip fingerprint, then equipment is legal equipment, can read data.Then the biography of data is carried out Defeated, process is as shown in Figure 1.
Embodiment 2
The present embodiment is based primarily upon digital PUF and is designed, and number PUF is divided to for two classes: first is that using some memories The manufacture of the stable state of cellular construction changes to realize.Second is that being realized using the change in propagation delay of digital signal.Mainstream Design method be realized using the change in propagation delay using digital signal, and utilize digital signal propagation delay become The cardinal principle changed come in realizing, the present invention is completed using moderator PUF, based on moderator PUF [1-2] is realized on IC Two symmetrical delayed digital signal paths, an excitation control the definite delay for selecting path.It is logical for introducing judgment condition It crosses two pulses while walking on both paths, see which path faster and correspondingly exports a response by arbiter circuit. It is to ensure that the absolute symmetry in the symmetrical delayed digital signal path of two-way, the present invention utilize in place of the most critical of this design Existing theory simultaneously combines the stringent hand wired in rear end, guarantees the otherness of PUF circuit, promotes the performance of PUF.Its circuit diagram 2 is such as Shown in figure.
It in order to promote the efficiency of enterprise, in the step of carrying out cryptographic Hash operation, is realized using the method for hardware, when batch When producing vaccine, the speed of data processing is obviously improved, design process, using the theory of SHA256 algorithm, is designed Then the hardware circuit of SHA256 is connected SHA256 using ahb bus, including design ahb bus slave interface, Parsing and control module of the ahb bus to SHA256.Its design frame chart is as shown in figure 3, system block diagram is as shown in Figure 4.
The present invention enhances the data tracking dynamics of vaccine in process of production, accomplishes that the true and false of drug can really be looked into, and occurs Problem can quickly be exactly found accident source.Enhancing data are transferred to the safety in block chain process, prevent from artificially uploading Garbage into block chain, be also prevented from information by other illegal servers assume another's name to obtain the information of vaccine bring to enterprise it is bad It influences.The speed that data carry out Hash calculation is promoted, there is very strong creativeness.
The above embodiments are merely illustrative of the technical solutions of the present invention, rather than its limitations;Although with reference to the foregoing embodiments Invention is explained in detail, those skilled in the art should understand that: it still can be to aforementioned each implementation Technical solution documented by example is modified or equivalent replacement of some of the technical features;And these modification or Replacement, the spirit and scope for technical solution of various embodiments of the present invention that it does not separate the essence of the corresponding technical solution.

Claims (8)

1. one kind is based on hard-wired block chain data encryption strengthening design, which is characterized in that including two dimensional code, the two dimension Code is the interface of link block chain, and the interface is the unique identities of each vaccine, and the interface is recorded in block chain Case, and the more new information constantly in block chain, the two dimensional code are used for accident right-safeguarding.
2. according to claim 1 be based on hard-wired block chain data encryption strengthening design, which is characterized in that described Two dimensional code is related according to cryptographic Hash is converted to by it, carries out cryptographic Hash index, finally hash index is recorded in block chain node.
3. according to claim 1 be based on hard-wired block chain data encryption strengthening design, which is characterized in that described Interface records a vaccine from experiment link to production, all information of specific person liable of each link of logistics links.
4. according to claim 1 be based on hard-wired block chain data encryption strengthening design, which is characterized in that including Chip finger print, the chip finger print design authentication by physics unclonable function.
5. according to claim 1 be based on hard-wired block chain data encryption strengthening design, which is characterized in that every time It updates the equipment for reading two-dimensional code data and must all carry out the authentication of equipment before reading data every time, concrete operations are One equipment of every production, chip finger print data will keep a record on the server.
6. according to claim 1 be based on hard-wired block chain data encryption strengthening design, which is characterized in that utilize SHA256 algorithm designs the hardware circuit of SHA256, and is connected SHA256 using ahb bus, including design AHB The slave interface of bus, the parsing and control module of ahb bus to SHA256.
7. according to claim 4 be based on hard-wired block chain data encryption strengthening design, which is characterized in that described In chip finger print, the process of verification chip finger print data is encrypted using asymmetric encryption RSA or SM2, each server The data of several chip finger prints are sent by the private key of asymmetric arithmetic.
8. according to claim 6 be based on hard-wired block chain data encryption strengthening design, which is characterized in that when setting It is decrypted after standby reading data with public key, if wherein there are the data to match with device chip fingerprint, equipment is to close The equipment of method reads data, then carries out the transmission of data.
CN201910015838.0A 2019-01-08 2019-01-08 Based on hard-wired block chain data encryption strengthening design Pending CN109615404A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910015838.0A CN109615404A (en) 2019-01-08 2019-01-08 Based on hard-wired block chain data encryption strengthening design

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910015838.0A CN109615404A (en) 2019-01-08 2019-01-08 Based on hard-wired block chain data encryption strengthening design

Publications (1)

Publication Number Publication Date
CN109615404A true CN109615404A (en) 2019-04-12

Family

ID=66016893

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910015838.0A Pending CN109615404A (en) 2019-01-08 2019-01-08 Based on hard-wired block chain data encryption strengthening design

Country Status (1)

Country Link
CN (1) CN109615404A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110084626A (en) * 2019-05-08 2019-08-02 湖南大学 A kind of production of vaccine monitoring and managing method based on block chain

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140005967A1 (en) * 2012-06-29 2014-01-02 Kevin E. Fu Methods and systems for characterizing and identifying electronic devices
CN104736348A (en) * 2012-10-18 2015-06-24 联邦印刷有限公司 Identity card with physical unclonable function
CN106779742A (en) * 2016-12-05 2017-05-31 华迪计算机集团有限公司 A kind of method and system for carrying out complete monitoring safely to drug quality based on block chain
CN107657460A (en) * 2017-09-08 2018-02-02 众安信息技术服务有限公司 A kind of tobacco based on block chain is false proof and source tracing method and system
CN107730278A (en) * 2017-10-18 2018-02-23 上海唯链信息科技有限公司 A kind of false proof and retroactive method of the medicine based on block chain technology
CN108256875A (en) * 2018-04-09 2018-07-06 王先笨 A kind of safe traceability system based on product supply chain
CN109118253A (en) * 2018-08-22 2019-01-01 泰康保险集团股份有限公司 Block chain drug management-control method, device, medium and electronic equipment

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140005967A1 (en) * 2012-06-29 2014-01-02 Kevin E. Fu Methods and systems for characterizing and identifying electronic devices
CN104736348A (en) * 2012-10-18 2015-06-24 联邦印刷有限公司 Identity card with physical unclonable function
CN106779742A (en) * 2016-12-05 2017-05-31 华迪计算机集团有限公司 A kind of method and system for carrying out complete monitoring safely to drug quality based on block chain
CN107657460A (en) * 2017-09-08 2018-02-02 众安信息技术服务有限公司 A kind of tobacco based on block chain is false proof and source tracing method and system
CN107730278A (en) * 2017-10-18 2018-02-23 上海唯链信息科技有限公司 A kind of false proof and retroactive method of the medicine based on block chain technology
CN108256875A (en) * 2018-04-09 2018-07-06 王先笨 A kind of safe traceability system based on product supply chain
CN109118253A (en) * 2018-08-22 2019-01-01 泰康保险集团股份有限公司 Block chain drug management-control method, device, medium and electronic equipment

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110084626A (en) * 2019-05-08 2019-08-02 湖南大学 A kind of production of vaccine monitoring and managing method based on block chain
CN110084626B (en) * 2019-05-08 2023-04-18 湖南大学 Vaccine production supervision method based on block chain

Similar Documents

Publication Publication Date Title
Dilawar et al. Blockchain: securing internet of medical things (IoMT)
KR102403295B1 (en) System and method for validating homogeneously encrypted data and performing an operation thereon
US11144660B2 (en) Secure data sharing
TW201947446A (en) Blockchain-based information supervision method and device
US20220255763A1 (en) User data management for augmented reality using a distributed ledger
Domadiya et al. Improving healthcare services using source anonymous scheme with privacy preserving distributed healthcare data collection and mining
Juyal et al. Privacy and security of IoT based skin monitoring system using blockchain approach
Fu et al. Fog-to-multicloud cooperative eHealth data management with application-aware secure deduplication
CN114357492A (en) Medical data privacy fusion method and device based on block chain
Sarkar et al. Tree parity machine guided patients’ privileged based secure sharing of electronic medical record: cybersecurity for telehealth during COVID-19
CN112199697A (en) Information processing method, device, equipment and medium based on shared root key
CN112131593A (en) Information-based feature encryption method, device, equipment and storage medium
ˇZiga Kodric et al. Securing edge-enabled smart healthcare systems with blockchain: A systematic literature review
Yadav et al. An IoT based secure patient health monitoring system
Hassan et al. A lightweight proxy Re-encryption approach with certificate-based and incremental cryptography for fog-enabled E-healthcare
Yau et al. Secure pattern-based data sensitivity framework for big data in healthcare
CN109615404A (en) Based on hard-wired block chain data encryption strengthening design
CN115001709A (en) Credible acquisition and privacy protection method suitable for digital medical data
US11436351B1 (en) Homomorphic encryption of secure data
CN114547684A (en) Method and device for protecting multi-party joint training tree model of private data
Saraswat et al. Health chain-block chain based electronic healthcare record system with access and permission management
CN113935055A (en) Privacy protection recommendation method and system based on block chain and homomorphic encryption
Shafagh et al. Privacy-preserving quantified self: secure sharing and processing of encrypted small data
Aruna Survey on use of blockchain technology in cloud storage for the security of healthcare systems
Rastogi et al. Fully decentralized block chain with proxy re-encryption algorithm for healthcare security

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20190412