CN109639646B - Block chain-based Internet of things safety detection method and system - Google Patents

Block chain-based Internet of things safety detection method and system Download PDF

Info

Publication number
CN109639646B
CN109639646B CN201811364378.4A CN201811364378A CN109639646B CN 109639646 B CN109639646 B CN 109639646B CN 201811364378 A CN201811364378 A CN 201811364378A CN 109639646 B CN109639646 B CN 109639646B
Authority
CN
China
Prior art keywords
internet
things
detection
service provider
report
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811364378.4A
Other languages
Chinese (zh)
Other versions
CN109639646A (en
Inventor
徐恪
吴波
凌思通
李琦
张智超
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tsinghua University
Original Assignee
Tsinghua University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tsinghua University filed Critical Tsinghua University
Priority to CN201811364378.4A priority Critical patent/CN109639646B/en
Publication of CN109639646A publication Critical patent/CN109639646A/en
Priority to PCT/CN2019/112322 priority patent/WO2020098454A1/en
Application granted granted Critical
Publication of CN109639646B publication Critical patent/CN109639646B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Telephonic Communication Services (AREA)
  • Storage Device Security (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses a block chain-based Internet of things safety detection method and system, wherein the method comprises the following steps: the service provider of the Internet of things generates a system release statement and broadcasts the system release statement to the Internet of things in the form of an intelligent contract, and the intelligent contract comprises a guarantee fund paid by the provider; the Internet of things safety detection equipment verifies whether the system issued statement is true, and if true, the system issued statement is recorded in a block chain; the detection equipment acquires and detects a corresponding Internet of things system, and generates a first detection report when detecting a bug; the provider verifies the report, records the report in the blockchain if the report is true and generates a second detection report, verifies the authenticity and correctness of the report, and records the report in the blockchain if the report is true and correct; triggering an intelligent contract and distributing the deposit to corresponding detection equipment; and selecting the system for installation and use by inquiring the detection report. The detection method improves the integrity of vulnerability detection, enhances the ecological security of the Internet of things, and has strong detection capability and high fault tolerance rate.

Description

Block chain-based Internet of things safety detection method and system
Technical Field
The invention relates to the technical field of Internet of things safety, in particular to a block chain-based Internet of things safety detection method and system.
Background
With the development of the technology of the internet of things, the scale of the internet of things is continuously enlarged, and the quantity of the equipment of the internet of things is expected to reach 281 billions in 2020. However, the internet of things system has vulnerability, the potential safety hazard of the internet of things system is an important factor for restricting the development of the internet of things technology, and the distributed denial of service attack caused by the devices has strong destructive power due to the huge number of the devices of the internet of things.
Aiming at the potential safety hazard of the Internet of things, the security detection technology of the Internet of things system is continuously developed, and the security detection mainly has the following defects: firstly, centralized security detection cannot well detect all vulnerabilities due to the differentiation of detection capabilities of each detection service; and distributed security detection improves the vulnerability detection capability, but cannot guarantee that the detection result has better fault tolerance, and meanwhile, an incentive mechanism for attracting vulnerability detectors to participate is also lacked. In summary, although the development of system vulnerability detection technology continuously improves vulnerability detection capability, it still cannot inhibit malicious attackers from publishing unsafe systems.
The blockchain technology is proposed in a paper of the chinese scholars in 2008, a decentralization distributed ledger is realized by adopting a consensus mechanism, distributed data storage and a point-to-point transmission technology, and the blockchain technology has a characteristic of being not falsifiable after introducing a cryptography related technology. The Etheng expands the technology of the block chain in the bit currency, and introduces an intelligent contract development language with complete pictures, so that the block chain technology jumps out of the currency circle and enters various technical fields. The application research of the blockchain technology in the aspect of the internet of things is gradually developed and made a certain progress, but the blockchain technology is not used for the research in the aspect of distributed detection of vulnerabilities of the internet of things system.
Disclosure of Invention
The present invention is directed to solving, at least to some extent, one of the technical problems in the related art.
Therefore, one object of the present invention is to provide a block chain-based security detection method for the internet of things, which solves the problem of incomplete vulnerability detection in the internet of things, constrains behaviors of service providers of the internet of things, improves the integrity of vulnerability detection, enhances the ecological security of the internet of things, and has strong detection capability and high fault tolerance rate.
The invention also aims to provide a block chain-based Internet of things security detection system.
In order to achieve the above object, an embodiment of the invention provides a block chain-based security detection method for an internet of things, including: s1, the service provider of the Internet of things generates a system issuing statement, the system issuing statement is broadcasted to the whole Internet of things in the form of an intelligent contract, and the intelligent contract comprises a guarantee paid by the service provider of the Internet of things for issuing the system issuing statement; s2, the Internet of things safety detection equipment verifies whether the system release statement is true, and when the system release statement is verified to be true, the system release statement is recorded in a block chain; s3, the Internet of things safety detection equipment acquires a corresponding Internet of things system according to the system release statement in the block chain, detects the Internet of things system, and generates a first detection report when detecting that the Internet of things system has a leak; s4, the service provider of internet of things verifies whether the first detection report is true, when the first detection report is verified to be true, the first detection report is recorded in the blockchain, the security detection device of internet of things generates and submits a second detection report, the service provider of internet of things verifies the authenticity and correctness of the second detection report, and when the second detection report is verified to be true and correct, the service provider of internet of things records the second detection report in the blockchain; s5, triggering the intelligent contract, and distributing the guarantee fund paid by the service provider of the Internet of things for issuing the system issuing statement to the Internet of things safety detection equipment which detects that the Internet of things system has a vulnerability in the form of the reward fund; and S6, the user of the Internet of things selects the safe and credible Internet of things system to install and use by inquiring the second detection report recorded in the block chain.
According to the block chain-based Internet of things security detection method, an automatic incentive mechanism is established, and Internet of things security detection equipment is attracted to participate in security detection of an Internet of things system, so that the problem of incomplete vulnerability detection in the Internet of things is solved, the behavior of an Internet of things service provider is further restrained, the completeness of vulnerability detection is improved, the ecological security of the Internet of things is enhanced, and the detection capability and the fault tolerance rate are high.
In addition, the block chain-based internet of things security detection method according to the embodiment of the present invention may further have the following additional technical features:
further, in an embodiment of the present invention, S2 further includes: s21, the Internet of things safety detection equipment detects the integrity of the system release statement, calculates the identifier in the system release statement, compares the identifier with the received identifier in the system release statement, and executes S22 if the identifiers are equal to each other; s22, the Internet of things safety detection device detects the authenticity of the system release statement, the public key of the Internet of things service provider is utilized to verify the signature of the Internet of things service provider, if the signature of the Internet of things service provider passes more than half of the verification of the Internet of things safety detection device, the system release statement is true, and the system release statement is recorded in the block chain.
Further, in an embodiment of the present invention, S3 further includes: s31, the Internet of things safety detection equipment downloads the corresponding Internet of things system according to the download link in the system release statement, and carries out safety scanning and detection on the Internet of things system; s32, when a vulnerability is detected in the Internet of things system, the Internet of things safety detection equipment generates the first detection report containing the hash value of the detection result and submits the first detection report to the Internet of things service provider.
Further, in an embodiment of the present invention, S4 further includes: s41, the service provider of the Internet of things verifies the authenticity of the first detection report, the public key of the safety detection equipment of the Internet of things is used for verifying the signature calculated by the safety detection equipment of the Internet of things by using the private key, and if the signature passes the verification, S42 is executed; s42, the service provider of the Internet of things calculates the identification of the safety detection equipment of the Internet of things, compares the identification with the identification of the safety detection equipment of the Internet of things in the received first detection report, and if the identification is equal, executes S43; s43, recording the first detection report in the block chain and generating a second detection report containing a detailed detection result hash value; s44, the service provider of the Internet of things verifies the authenticity of the second detection report, the public key of the safety detection equipment of the Internet of things is used for verifying the signature calculated by the safety detection equipment of the Internet of things by using the private key, and if the signature passes the verification, S45 is executed; s45, the service provider of the Internet of things calculates the hash value of the second detection report and compares the hash value with the hash value in the received second detection report, if the hash value is equal to the hash value in the second detection report, the service provider of the Internet of things executes S46; s46, the service provider of the Internet of things verifies the correctness of the second detection report, and if the verification is passed, S47 is executed; s47, recording the second detection report in the block chain.
Further, in an embodiment of the present invention, S5 further includes: s51, the second detection report is recorded in the block chain, and the intelligent contract is triggered; and S52, the intelligent contract distributes the guarantee fund in the system issuing statement to the Internet of things safety detection equipment which detects that the Internet of things system has a vulnerability, and the service provider of the Internet of things takes the loss of the guarantee fund as a penalty for issuing the Internet of things system with the vulnerability.
In order to achieve the above object, an embodiment of another aspect of the present invention provides a block chain-based security detection system for internet of things, including: the issuing module is used for generating a system issuing statement by an Internet of things service provider, wherein the system issuing statement is broadcasted to the whole Internet of things in the form of an intelligent contract, and the intelligent contract comprises a guarantee paid by the Internet of things service provider for issuing the system issuing statement; the first detection module is used for verifying whether the system issuing statement is true by the Internet of things safety detection equipment and recording the system issuing statement in a block chain when the system issuing statement is verified to be true; the second detection module is used for acquiring a corresponding Internet of things system by the Internet of things safety detection equipment according to the system release statement in the block chain, detecting the Internet of things system and generating a first detection report when detecting that the Internet of things system has a bug; a third detection module, configured to verify, by the service provider of the internet of things, whether the first detection report is true, record the first detection report in the blockchain when the first detection report is verified to be true, generate and submit a second detection report by the security detection device of the internet of things, verify, by the service provider of the internet of things, authenticity and correctness of the second detection report, and record the second detection report in the blockchain when the second detection report is verified to be true and correct; the reward module is used for triggering the intelligent contract and distributing the guarantee fund paid by the service provider of the Internet of things for issuing the system issuing statement to the Internet of things safety detection equipment for detecting that the Internet of things system has a leak in the form of reward fund; and the application module is used for the Internet of things user to select the safe and credible Internet of things system for installation and use by inquiring the second detection report recorded in the block chain.
According to the block chain-based Internet of things security detection system, an automatic incentive mechanism is established, so that the Internet of things security detection equipment is attracted to participate in security detection of the Internet of things system, the problem of incomplete vulnerability detection in the Internet of things is solved, the behavior of an Internet of things service provider is further restrained, the completeness of vulnerability detection is improved, the ecological security of the Internet of things is enhanced, and the detection capability and the fault tolerance rate are high.
In addition, the block chain based internet of things security detection system according to the above embodiment of the present invention may further have the following additional technical features:
further, in an embodiment of the present invention, the first detection module is further configured to detect integrity of the system release declaration by the internet of things security detection device, calculate an identifier in the system release declaration, compare the identifier with the received identifier in the system release declaration, detect authenticity of the system release declaration by the internet of things security detection device if the identifiers are equal to each other, verify a signature of the internet of things service provider by using a public key of the internet of things service provider, and record the system release declaration in the block chain if the signature of the internet of things service provider passes verification of more than half of the internet of things security detection devices.
Further, in an embodiment of the present invention, the second detection module is further configured to, the internet-of-things security detection device downloads the corresponding internet-of-things system according to a download link in the system issuance statement, and performs security scanning and detection on the internet-of-things system; when a vulnerability is detected in the IOT system, the IOT safety detection equipment generates a first detection report containing a detection result hash value and submits the first detection report to the IOT service provider.
Further, in an embodiment of the present invention, the third detection module is further configured to verify, by the service provider of the internet of things, the authenticity of the first detection report, verify, using a public key of the security detection device of the internet of things, a signature calculated by the security detection device of the internet of things using a private key, if the signature passes the verification, calculate the identifier of the security detection device of the internet of things, compare the identifier with the identifier of the security detection device of the internet of things in the received first detection report, and if the identifiers are equal to each other, record the first detection report in the block chain and generate a second detection report containing a hash value of a detailed detection result; the service provider of the Internet of things checks the authenticity of the second detection report, the public key of the safety detection equipment of the Internet of things is used for verifying the signature calculated by the safety detection equipment of the Internet of things by using the private key, if the signature passes the verification, the service provider of the Internet of things calculates the hash value of the second detection report and compares the hash value with the received hash value in the second detection report, if the signature is equal to the hash value, the service provider of the Internet of things verifies the correctness of the second detection report, and if the signature passes the verification, the service provider of the Internet of things records the second detection report in the block chain.
Further, in an embodiment of the present invention, the reward module is further configured to record that the second detection report is in the blockchain, and trigger the smart contract; and the intelligent contract distributes the guarantee fund in the system issuing statement to the Internet of things safety detection equipment which detects that the Internet of things system has the vulnerability, and the service provider of the Internet of things takes the loss of the guarantee fund as a penalty for issuing the Internet of things system with the vulnerability.
Additional aspects and advantages of the invention will be set forth in part in the description which follows and, in part, will be obvious from the description, or may be learned by practice of the invention.
Drawings
The foregoing and/or additional aspects and advantages of the present invention will become apparent and readily appreciated from the following description of the embodiments, taken in conjunction with the accompanying drawings of which:
fig. 1 is a block chain-based security detection method for the internet of things according to an embodiment of the present invention;
fig. 2 is a flowchart of a block chain-based security detection method for the internet of things according to an embodiment of the present invention;
FIG. 3 is an IOT service provider system layout according to one embodiment of the present invention;
fig. 4 is a diagram of a detection report submitted by a security detection device of the internet of things according to an embodiment of the invention;
FIG. 5 is a block chain structure with detection reports according to an embodiment of the present invention;
fig. 6 is a flowchart of a block chain-based security detection method for the internet of things according to an embodiment of the present invention;
fig. 7 is a flowchart illustrating key steps of a block chain-based security detection method for the internet of things according to an embodiment of the present invention;
fig. 8 is a schematic structural diagram of a block chain-based security detection system of the internet of things according to an embodiment of the present invention.
Detailed Description
Reference will now be made in detail to embodiments of the present invention, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to the same or similar elements or elements having the same or similar function throughout. The embodiments described below with reference to the drawings are illustrative and intended to be illustrative of the invention and are not to be construed as limiting the invention.
The method and system for detecting the security of the internet of things based on the block chain according to the embodiment of the invention are described below with reference to the accompanying drawings, and first, the method for detecting the security of the internet of things based on the block chain according to the embodiment of the invention is described with reference to the accompanying drawings.
As shown in fig. 1, the security detection method of the internet of things includes three roles: (1) the service provider of the Internet of things comprises an Internet of things manufacturer, a third-party software and hardware market and the like, and is mainly responsible for creating and maintaining an Internet of things system and a block chain account book; (2) the Internet of things safety detection equipment comprises a plurality of Internet of things safety detection manufacturers, Internet of things safety detectors, Internet of things equipment with safety detection capability and the like; (3) the internet of things equipment and the user are mainly responsible for installing the published internet of things system and hope to obtain corresponding security feedback (such as a security detection result aiming at a certain internet of things system).
Fig. 2 is a flowchart of a block chain-based security detection method for the internet of things according to an embodiment of the present invention.
As shown in fig. 2, the block chain-based internet of things security detection method includes the following steps:
in step S1, the service provider of the internet of things generates a system issuance statement, which is broadcast to the entire internet of things in the form of an intelligent contract, and the intelligent contract contains the deposit paid by the service provider of the internet of things for issuing the issuance statement.
Specifically, the service provider generation system of the internet of things issues a statement Δ, Δ is broadcast to the whole internet of things in the form of an intelligent contract, and the format of Δ is ═ Δid,Pi,Un,Uv,Uh,Ul,Ii,PsignIn which P isiIs the only identification, U, of each service provider of the Internet of thingsn、Uv、Uh、UlName, version, hash value and download link, I, of the system of the Internet of thingsiThe system is characterized in that an Internet of things service provider submits a guarantee fund while releasing the system, and when a vulnerability of the released Internet of things system is detected, the guarantee fund is distributed to corresponding detection equipment in an incentive mode to be used as a reward; deltaidIssuing a unique identifier of a declaration delta for the system, the value of which is a six-element group Pi,Un,Uv,Uh,Ul,IiHash value of, i.e. deltaid=H(Pi||Un||Uv||Uh||Ul||Ii),PsignTo issue a signature of the IOT service provider of the system, the signature is signed by the IOT service provider private key skPiIs obtained by calculation, i.e.
Figure BDA0001868152500000061
In step S2, the internet of things security detection device verifies whether the system issuance statement is true, and records the system issuance statement in the blockchain when the system issuance statement is true.
Further, in an embodiment of the present invention, the method may further include:
s21, the Internet of things safety detection equipment detects the integrity of the system issued declaration, calculates the identification in the system issued declaration, compares the identification with the identification in the received system issued declaration, and executes S22 if the identification is equal to the identification;
and S22, detecting the authenticity of the system release statement by the Internet of things safety detection equipment, verifying the signature of the Internet of things service provider by using the public key of the Internet of things service provider, and if the signature of the Internet of things service provider passes the verification of more than half of the Internet of things safety detection equipment, judging that the system release statement is true, and recording the system release statement in a block chain.
Specifically, after receiving the system release statement Δ, the internet of things detection device detects the integrity of Δ, i.e., recalculates Δid=(Pi||Un||Uv||Uh||Ul||Ii) And is related to a of the received deltasidComparing, if they are not equal, discarding the received delta, and if they are equal, detecting the authenticity of delta, i.e. using the public key pkP of the service provider of the internet of thingsiFor signature PsignPerforming verification when signing PsignWhen the verification of more than half of detection devices is carried out, the system issuing declaration delta is true, the occurrence of a spoofing attack is avoided, and meanwhile, the delta is recorded in a block chain.
As shown in fig. 3, it can be appreciated that the system issues the specific value Δ ═ { Δ ═ Δ @id,Pi,Un,Uv,Uh,Ul,Ii,PsignBroadcasting is carried out in the form of, after receiving delta, the Internet of things safety detection equipment firstly broadcasts the deltaidAnd PsignPerforming authenticity verification, if the verification is passed, the verification will beThe verification results are submitted to a plurality of IOT service providers, and the IOT service providers determine whether to write the system release into the block chain according to the number of the received verification results. Fig. 1 includes 6 internet of things detection devices, if Δ exceeds the verification of 3 detection devices, the internet of things service provider writes the system release Δ into the blockchain, otherwise, the system release Δ is invalid.
In step S3, the internet of things security detection device obtains a corresponding internet of things system according to the system issuance statement in the block chain, detects the internet of things system, and generates a first detection report when detecting that a vulnerability exists in the internet of things system.
Further, in an embodiment of the present invention, the method may further include:
s31, the Internet of things safety detection equipment downloads the corresponding Internet of things system according to the download link in the system release statement, and carries out safety scanning and detection on the Internet of things system;
s32, when a vulnerability is detected in the Internet of things system, the Internet of things safety detection equipment generates a first detection report containing a detection result hash value and submits the first detection report to the Internet of things service provider.
Specifically, after the release statement Δ of the internet of things system is recorded in the blockchain, the detection device of the internet of things detects U in the ΔlDownloading a corresponding Internet of things system, and carrying out security scanning and detection on the system, wherein when a bug is detected in the Internet of things system, detection equipment needs to submit a detection report containing a detection result, but in order to prevent the detection result from being plagiarized, the detection equipment needs to submit an initial detection report
Figure BDA0001868152500000071
The report only contains the hash value of the detection result, and does not contain the detailed detection result, and the specific format is as follows:
Figure BDA0001868152500000072
wherein D isiIs the identification of the safety detection equipment of the Internet of things,
Figure BDA0001868152500000073
is the second detection report
Figure BDA0001868152500000074
The hash value of (a) of (b),
Figure BDA0001868152500000075
is the wallet address of the security detection equipment of the internet of things,
Figure BDA0001868152500000076
is composed of
Figure BDA0001868152500000077
Can be identified by a quadruplet of delta, Di
Figure BDA0001868152500000078
Obtained by a hash calculation, i.e.
Figure BDA0001868152500000079
Figure BDA00018681525000000710
Using its private key skD for a detection deviceiThe calculated signature is specifically calculated by the following formula:
Figure BDA00018681525000000711
when in use
Figure BDA00018681525000000712
After being recorded in the block chain, the detection equipment submits a second detection report
Figure BDA00018681525000000713
Where Des is the detailed result of the detection,
Figure BDA00018681525000000714
is composed of
Figure BDA00018681525000000715
Can be identified by a quadruplet of delta, Di
Figure BDA00018681525000000716
Des is obtained by Hash calculation, i.e.
Figure BDA00018681525000000717
Figure BDA00018681525000000718
Using its private key skD for a detection deviceiCalculated signatures, i.e.
Figure BDA00018681525000000719
In step S4, the service provider of the internet of things verifies whether the first detection report is true, records the first detection report in the blockchain when the first detection report is verified to be true, generates and submits a second detection report, verifies the authenticity and correctness of the second detection report, and records the second detection report in the blockchain when the second detection report is verified to be true and correct.
Further, in an embodiment of the present invention, the method may further include:
s41, the Internet of things service provider checks the authenticity of the first detection report, the public key of the Internet of things safety detection equipment is used for verifying the signature calculated by the Internet of things safety detection equipment by using the private key, and if the signature passes the verification, S42 is executed;
s42, the service provider of the Internet of things calculates the identification of the safety detection equipment of the Internet of things, compares the identification with the identification of the safety detection equipment of the Internet of things in the received first detection report, and if the identification is equal, executes S43;
s43, recording the first detection report in the block chain and generating a second detection report containing the hash value of the detailed detection result;
s44, the Internet of things service provider verifies the authenticity of the second detection report, the public key of the Internet of things safety detection equipment is used for verifying the signature calculated by the Internet of things safety detection equipment by using the private key, and if the signature passes the verification, S45 is executed;
s45, the service provider of the Internet of things calculates the hash value of the second detection report and compares the hash value with the hash value in the received second detection report, and if the hash value is equal to the hash value in the received second detection report, the service provider of the Internet of things executes S46;
s46, the service provider of the Internet of things verifies the correctness of the second detection report, and if the verification is passed, S47 is executed;
s47, recording the second detection report in the block chain.
Specifically, after receiving the first detection report, each internet of things service provider verifies the signature by using the corresponding public key
Figure BDA00018681525000000720
Computing after passing verification
Figure BDA0001868152500000081
And are combined with
Figure BDA0001868152500000082
Comparing, and reporting the initial detection report through a PoW consensus mechanism if the two are equal
Figure BDA0001868152500000083
Recorded in the blockchain, and after receiving the second detection report, each IOT service provider verifies the signature by using the corresponding public key
Figure BDA0001868152500000084
After the verification is passed, calculating
Figure BDA0001868152500000085
And are combined with
Figure BDA0001868152500000086
Comparing, if equal, the service provider of the Internet of things is right
Figure BDA0001868152500000087
The detection result Des in (1) is subjected to correctness verification, and if the detection results in the Des are all correct, the final detection is carried out through a Proof Of Work (PoW for short) consensus mechanismTest report
Figure BDA0001868152500000088
Recorded in a blockchain.
In step S5, an intelligent contract is triggered, and a guarantee fund paid by an internet of things service provider for issuing a statement to an issuing system is distributed in the form of a reward fund to the internet of things security detection device that detects that a vulnerability exists in the internet of things system.
In particular, the second detection report
Figure BDA0001868152500000089
The system issuing statement delta is recorded in a blockchain, an intelligent contract of the recording system issuing statement delta is triggered, the triggered intelligent contract automatically distributes the deposit in the system issuing statement delta to corresponding detection equipment in an incentive mode, and meanwhile, the service provider of the Internet of things uses the lost payment deposit as a punishment due to the fact that the service provider of the Internet of things issues a leaky Internet of things system.
As shown in fig. 4, it can be understood that when the system release Δ is recorded in the blockchain, the internet of things detection device passes through U in the ΔlAnd downloading the data to a published Internet of things system, and carrying out security detection and scanning. When a vulnerability is discovered, the IOT detection equipment firstly submits an initial detection report containing a hash value of a detection result
Figure BDA00018681525000000810
The detection report
Figure BDA00018681525000000811
After the authenticity verification is passed, the block chain of the initial detection report is logged into the block chain through PoW consensus, otherwise, the block chain of the initial detection report is discarded; then, the Internet of things detection equipment submits a final detection report containing detailed detection results
Figure BDA00018681525000000812
The detection report
Figure BDA00018681525000000813
After passing the authenticity verification and the correctness verificationThe block chain can be written into the block chain by the service provider of the Internet of things according to the PoW consensus, and otherwise, the block chain is discarded; and finally, after the detection report is recorded into the block chain, the corresponding system is automatically triggered to release the statement delta, and the guarantee fund submitted by the Internet of things system provider when the statement is released is automatically distributed to the detection equipment to serve as a reward.
In step S6, the user of the internet of things selects a safe and trusted system of the internet of things to install and use by querying the second detection report recorded in the block chain.
According to the embodiment of the invention, the system for detecting the release of the service provider of the Internet of things is introduced through the reward mechanism, so that the comprehensive safety feedback of the system of the Internet of things is favorably formed, the service provider of the Internet of things cannot easily release the system of the Internet of things with holes, the behavior of the service provider of the Internet of things is subject to safety constraint, the safety of the whole Internet of things can be improved, and a safer ecological system of the Internet of things is established.
The block chain based internet of things security detection method according to the embodiment of the invention is described in detail below with reference to the accompanying drawings.
As shown in fig. 5, a blockchain structure of a security detection report of an internet of things system is recorded, which mainly includes five items of a last blockmark, a timestamp, a random number, and a detection report. Wherein the last block mark is such that the blocks are linked to form a chain; the time stamp records the time of block creation; the detection report is submitted by the detection equipment and passes the verification, and all reports are linked in a Meckel tree form; the block mark is the hash value of the last block mark, the timestamp, the detection report and the random number, the service provider of the internet of things successfully creates the block by trying various random numbers to enable the hash value to meet a certain form and complete workload certification, and after the detection equipment submits the detection report, the service provider of the internet of things records the detection report passing authenticity verification and correctness verification in a block chain.
Fig. 6 and fig. 7 show a fine-grained and coarse-grained flow chart of the block chain-based security detection method for the internet of things, respectively, and it can be seen from the flow chart that when a detection report is recorded in the block chain, a system release statement Δ stored in an intelligent contract form is triggered, and a guarantee fund paid by an internet of things service provider is issued to an internet of things detection device in an incentive form. Meanwhile, the Internet of things equipment and the user can inquire detection results recorded in the block chain and select a safer and more credible Internet of things system for installation and use.
From the specific implementation mode, the block chain-based internet of things security detection method introduces an intelligent contract to collect the guarantee money from the internet of things provider of the publishing system and distribute the guarantee money to the detection equipment for detecting the security hidden trouble of the system, introduces a form of submitting detection reports in stages to avoid plagiarism, counterfeiting and other behaviors possibly occurring between the detection equipment, and enables the internet of things service provider to detect the detection result and maintain the related block chain.
In conclusion, the method can realize the lightweight detection of the detection equipment of the Internet of things system and the fair and fair distribution of certain rewards while striking the Internet of things service provider who issues the unsafe system, thereby achieving the purposes of inhibiting bad system providers and attracting more detection equipment to join in the system safety detection, enabling users to obtain more authoritative system safety evaluation and being beneficial to creating a safer Internet of things environment.
According to the block chain-based Internet of things security detection method, an automatic incentive mechanism is established, and Internet of things security detection equipment is attracted to participate in security detection of an Internet of things system, so that the problem of incomplete vulnerability detection in the Internet of things is solved, the behavior of an Internet of things service provider is further restrained, the completeness of vulnerability detection is improved, the ecological security of the Internet of things is enhanced, and the detection capability and the fault tolerance rate are high.
Next, a block chain-based internet of things security detection system proposed according to an embodiment of the present invention is described with reference to the drawings.
Fig. 8 is a schematic structural diagram of a block chain-based internet of things security detection system according to an embodiment of the present invention.
As shown in fig. 8, the block chain based internet of things security detection system 10 includes: a publication module 100, a first detection module 200, a second detection module 300, a third detection module 400, a reward module 500, and an application module 600.
The issuing module 100 is used for the service provider of the internet of things to generate a system issuing statement, the system issuing statement is broadcast to the whole internet of things in the form of an intelligent contract, and the intelligent contract contains a guarantee paid by the service provider of the internet of things for issuing the statement.
The first detection module 200 is used for verifying whether the system issued declaration is true by the internet of things security detection device, and recording the system issued declaration in the blockchain when the system issued declaration is true.
The second detection module 300 is configured to, by the security detection device of the internet of things, obtain a corresponding internet of things system according to the system issuance statement in the block chain, detect the internet of things system, and generate a first detection report when detecting that a bug exists in the internet of things system.
The third detection module 400 is configured to verify whether the first detection report is true by the service provider of the internet of things, record the first detection report in the blockchain when the first detection report is verified to be true, generate and submit a second detection report including a hash value of the detailed detection result by the security detection device of the internet of things, verify authenticity and correctness of the second detection report by the service provider of the internet of things, and record the second detection report in the blockchain when the second detection report is verified to be true and correct.
The reward module 500 is configured to trigger an intelligent contract, and distribute a guarantee fund paid by an internet of things service provider for issuing a statement for an issuing system to the internet of things security detection device that detects that a vulnerability exists in the internet of things system in the form of a reward fund.
The application module 600 is used for the internet of things user to select a safe and reliable internet of things system for installation and use by querying the second detection report recorded in the block chain. The block chain-based Internet of things security detection system 10 solves the problem of incomplete vulnerability detection in the Internet of things, restrains behaviors of service providers of the Internet of things, improves completeness of vulnerability detection, enhances ecological security of the Internet of things, and is high in detection capability and fault tolerance rate.
Further, in an embodiment of the present invention, the first detection module is further configured to detect integrity of a system release declaration by the internet of things security detection device, issue a flag in the declaration by the computing system, compare the flag with a received flag in the system release declaration, detect authenticity of the system release declaration by the internet of things security detection device if the flag is equal to the received flag in the system release declaration, verify a signature of the internet of things service provider by using a public key of the internet of things service provider, verify that the system release declaration is true if the signature of the internet of things service provider passes verification of more than half of the internet of things security detection devices, and record the system release declaration in the block chain.
Further, in an embodiment of the present invention, the second detection module is further configured to download, by the internet-of-things security detection device, the corresponding internet-of-things system according to the download link in the system release statement, and perform security scanning and detection on the internet-of-things system; when a vulnerability is detected in the Internet of things system, the Internet of things safety detection equipment generates a first detection report containing a detection result hash value and submits the first detection report to an Internet of things service provider.
Further, in an embodiment of the present invention, the third detection module is further configured to verify authenticity of the first detection report by the service provider of the internet of things, verify a signature calculated by the security detection device of the internet of things using a private key by using a public key of the security detection device of the internet of things, calculate an identifier of the security detection device of the internet of things if the signature passes the verification, compare the identifier with the identifier of the security detection device of the internet of things in the received first detection report, and if the identifier is equal to the identifier of the security detection device of the internet of things in the received first detection report, record the first detection report in a block chain and generate a second detection report containing a hash value; and the service provider of the Internet of things checks the authenticity of the second detection report, the public key of the safety detection equipment of the Internet of things is used for verifying the signature calculated by the safety detection equipment of the Internet of things by using the private key, if the signature passes the verification, the service provider of the Internet of things calculates the hash value of the second detection report and compares the hash value with the hash value in the received second detection report, if the hash value is equal to the hash value, the service provider of the Internet of things verifies the correctness of the second detection report, and if the signature passes the verification, the service provider of the Internet of things records the second detection report in a block chain.
Further, in an embodiment of the present invention, the reward module is further configured to record that the second detection report is in the blockchain, and trigger the smart contract; and the intelligent contract distributes the guarantee fund in the system issuing statement to the Internet of things safety detection equipment which detects that the Internet of things system has the vulnerability, and the service provider of the Internet of things takes the loss of the guarantee fund as a punishment because of issuing the Internet of things system with the vulnerability.
It should be noted that the foregoing explanation of the embodiment of the block chain-based internet of things security detection method is also applicable to the system of the embodiment, and details are not described here.
According to the block chain-based Internet of things security detection system provided by the embodiment of the invention, an automatic incentive mechanism is established, so that the Internet of things security detection equipment is attracted to participate in the security detection of the Internet of things system, the problem of incomplete vulnerability detection in the Internet of things is solved, the behavior of an Internet of things service provider is further restrained, the completeness of vulnerability detection is improved, the ecological security of the Internet of things is enhanced, and the detection capability and the fault tolerance rate are high.
Furthermore, the terms "first", "second" and "first" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defined as "first" or "second" may explicitly or implicitly include at least one such feature. In the description of the present invention, "a plurality" means at least two, e.g., two, three, etc., unless specifically limited otherwise.
In the description herein, references to the description of the term "one embodiment," "some embodiments," "an example," "a specific example," or "some examples," etc., mean that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the invention. In this specification, the schematic representations of the terms used above are not necessarily intended to refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples. Furthermore, various embodiments or examples and features of different embodiments or examples described in this specification can be combined and combined by one skilled in the art without contradiction.
Although embodiments of the present invention have been shown and described above, it is understood that the above embodiments are exemplary and should not be construed as limiting the present invention, and that variations, modifications, substitutions and alterations can be made to the above embodiments by those of ordinary skill in the art within the scope of the present invention.

Claims (10)

1. A block chain-based Internet of things safety detection method is characterized by comprising the following steps:
s1, the service provider of the Internet of things generates a system issuing statement, the system issuing statement is broadcasted to the whole Internet of things in the form of an intelligent contract, and the intelligent contract comprises a guarantee paid by the service provider of the Internet of things for issuing the system issuing statement;
s2, the Internet of things safety detection equipment verifies whether the system release statement is true, and when the system release statement is verified to be true, the system release statement is recorded in a block chain;
s3, the Internet of things safety detection equipment acquires a corresponding Internet of things system according to the system release statement in the block chain, detects the Internet of things system, and generates a first detection report when detecting that the Internet of things system has a leak;
s4, the service provider of internet of things verifies whether the first detection report is true, when the first detection report is verified to be true, the first detection report is recorded in the blockchain, the security detection device of internet of things generates and submits a second detection report, the service provider of internet of things verifies the authenticity and correctness of the second detection report, and when the second detection report is verified to be true and correct, the service provider of internet of things records the second detection report in the blockchain;
s5, triggering the intelligent contract, and distributing the guarantee fund paid by the service provider of the Internet of things for issuing the system issuing statement to the Internet of things safety detection equipment which detects that the Internet of things system has a vulnerability in the form of the reward fund;
and S6, the user of the Internet of things selects the safe and credible Internet of things system to install and use by inquiring the second detection report recorded in the block chain.
2. The block chain based internet of things security detection method of claim 1, wherein the S2 further comprises:
s21, the Internet of things safety detection equipment detects the integrity of the system release statement, calculates the identifier in the system release statement, compares the identifier with the received identifier in the system release statement, and executes S22 if the identifiers are equal to each other;
s22, the Internet of things safety detection device detects the authenticity of the system release statement, the public key of the Internet of things service provider is utilized to verify the signature of the Internet of things service provider, if the signature of the Internet of things service provider passes more than half of the verification of the Internet of things safety detection device, the system release statement is true, and the system release statement is recorded in the block chain.
3. The block chain based internet of things security detection method of claim 1, wherein the S3 further comprises:
s31, the Internet of things safety detection equipment downloads the corresponding Internet of things system according to the download link in the system release statement, and carries out safety scanning and detection on the Internet of things system;
s32, when a vulnerability is detected in the Internet of things system, the Internet of things safety detection equipment generates the first detection report containing the hash value of the detection result and submits the first detection report to the Internet of things service provider.
4. The block chain based internet of things security detection method of claim 1, wherein S4 further comprises:
s41, the service provider of the Internet of things verifies the authenticity of the first detection report, the public key of the safety detection equipment of the Internet of things is used for verifying the signature calculated by the safety detection equipment of the Internet of things by using the private key, and if the signature passes the verification, S42 is executed;
s42, the service provider of the Internet of things calculates the identification of the safety detection equipment of the Internet of things, compares the identification with the identification of the safety detection equipment of the Internet of things in the received first detection report, and if the identification is equal, executes S43;
s43, recording the first detection report in the block chain and generating a second detection report containing a detailed detection result hash value;
s44, the service provider of the Internet of things verifies the authenticity of the second detection report, the public key of the safety detection equipment of the Internet of things is used for verifying the signature calculated by the safety detection equipment of the Internet of things by using the private key, and if the signature passes the verification, S45 is executed;
s45, the service provider of the Internet of things calculates the hash value of the second detection report and compares the hash value with the hash value in the received second detection report, if the hash value is equal to the hash value in the second detection report, the service provider of the Internet of things executes S46;
s46, the service provider of the Internet of things verifies the correctness of the second detection report, and if the verification is passed, S47 is executed;
s47, recording the second detection report in the block chain.
5. The block chain based internet of things security detection method of claim 1, wherein the S5 further comprises:
s51, the second detection report is recorded in the block chain, and the intelligent contract is triggered;
and S52, the intelligent contract distributes the guarantee fund in the system issuing statement to the Internet of things safety detection equipment which detects that the Internet of things system has a vulnerability, and the service provider of the Internet of things takes the loss of the guarantee fund as a penalty for issuing the Internet of things system with the vulnerability.
6. The utility model provides a thing networking safety inspection system based on block chain which characterized in that includes:
the issuing module is used for generating a system issuing statement by an Internet of things service provider, wherein the system issuing statement is broadcasted to the whole Internet of things in the form of an intelligent contract, and the intelligent contract comprises a guarantee paid by the Internet of things service provider for issuing the system issuing statement;
the first detection module is used for verifying whether the system issuing statement is true by the Internet of things safety detection equipment and recording the system issuing statement in a block chain when the system issuing statement is verified to be true;
the second detection module is used for acquiring a corresponding Internet of things system by the Internet of things safety detection equipment according to the system release statement in the block chain, detecting the Internet of things system and generating a first detection report when detecting that the Internet of things system has a bug;
a third detection module, configured to verify, by the service provider of the internet of things, whether the first detection report is true, record the first detection report in the blockchain when the first detection report is verified to be true, generate and submit a second detection report by the security detection device of the internet of things, verify, by the service provider of the internet of things, authenticity and correctness of the second detection report, and record the second detection report in the blockchain when the second detection report is verified to be true and correct;
the reward module is used for triggering the intelligent contract and distributing the guarantee fund paid by the service provider of the Internet of things for issuing the system issuing statement to the Internet of things safety detection equipment for detecting that the Internet of things system has a leak in the form of reward fund;
and the application module is used for the Internet of things user to select the safe and credible Internet of things system for installation and use by inquiring the second detection report recorded in the block chain.
7. The block chain based Internet of things security detection system of claim 6, wherein the first detection module is further configured to,
the internet of things safety detection device detects the integrality of the system release statement, calculates the identification in the system release statement, compares the identification with the received identification in the system release statement, if the identifications are equal, the internet of things safety detection device detects the authenticity of the system release statement, utilizes the public key of the internet of things service provider to verify the signature of the internet of things service provider, if the signature of the internet of things service provider is more than half of the verification of the internet of things safety detection device, the system release statement is true, and the system release statement is recorded in the block chain.
8. The block chain based Internet of things security detection system of claim 6, wherein the second detection module is further configured to,
the Internet of things safety detection equipment downloads the corresponding Internet of things system according to the download link in the system release statement, and carries out safety scanning and detection on the Internet of things system;
when a vulnerability is detected in the IOT system, the IOT safety detection equipment generates a first detection report containing a detection result hash value and submits the first detection report to the IOT service provider.
9. The block chain based Internet of things security detection system of claim 6, wherein the third detection module is further configured to,
the service provider of the Internet of things checks the authenticity of the first detection report, verifies a signature calculated by the Internet of things safety detection equipment by using a private key by using a public key of the Internet of things safety detection equipment, if the signature passes the verification, calculates an identifier of the Internet of things safety detection equipment, compares the identifier with the identifier of the Internet of things safety detection equipment in the received first detection report, and if the identifier of the Internet of things safety detection equipment in the received first detection report is equal to the identifier of the Internet of things safety detection equipment in the received first detection report, records the first detection report in the block chain and generates a second detection report containing a detailed detection result hash value;
the service provider of the Internet of things checks the authenticity of the second detection report, the public key of the safety detection equipment of the Internet of things is used for verifying the signature calculated by the safety detection equipment of the Internet of things by using the private key, if the signature passes the verification, the service provider of the Internet of things calculates the hash value of the second detection report and compares the hash value with the received hash value in the second detection report, if the signature is equal to the hash value, the service provider of the Internet of things verifies the correctness of the second detection report, and if the signature passes the verification, the service provider of the Internet of things records the second detection report in the block chain.
10. The blockchain-based internet of things security detection system of claim 6, wherein the reward module is further configured to,
recording the second detection report in the block chain, and triggering the intelligent contract;
and the intelligent contract distributes the guarantee fund in the system issuing statement to the Internet of things safety detection equipment which detects that the Internet of things system has the vulnerability, and the service provider of the Internet of things takes the loss of the guarantee fund as a penalty for issuing the Internet of things system with the vulnerability.
CN201811364378.4A 2018-11-16 2018-11-16 Block chain-based Internet of things safety detection method and system Active CN109639646B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201811364378.4A CN109639646B (en) 2018-11-16 2018-11-16 Block chain-based Internet of things safety detection method and system
PCT/CN2019/112322 WO2020098454A1 (en) 2018-11-16 2019-10-21 Method and system for detecting security of internet to things based on blockchain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811364378.4A CN109639646B (en) 2018-11-16 2018-11-16 Block chain-based Internet of things safety detection method and system

Publications (2)

Publication Number Publication Date
CN109639646A CN109639646A (en) 2019-04-16
CN109639646B true CN109639646B (en) 2020-04-24

Family

ID=66068201

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811364378.4A Active CN109639646B (en) 2018-11-16 2018-11-16 Block chain-based Internet of things safety detection method and system

Country Status (2)

Country Link
CN (1) CN109639646B (en)
WO (1) WO2020098454A1 (en)

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109639646B (en) * 2018-11-16 2020-04-24 清华大学 Block chain-based Internet of things safety detection method and system
CN110474868B (en) * 2019-06-27 2022-12-16 山东安畅物联网科技有限公司 Internet of things environment safety detection method and system based on block chain excitation mechanism
WO2019170173A2 (en) * 2019-06-27 2019-09-12 Alibaba Group Holding Limited Managing cybersecurity vulnerabilities using blockchain networks
EP3673432B1 (en) 2019-06-27 2021-11-03 Advanced New Technologies Co., Ltd. Implementing a blockchain-based workflow
CN110490613B (en) * 2019-08-27 2023-05-05 浪潮卓数大数据产业发展有限公司 Block chain-based product detection method and system
US20210126937A1 (en) * 2019-10-28 2021-04-29 General Electric Company Cyber-security improvement platform utilizing a secure, distributed transaction ledger
CN113032490B (en) * 2019-12-05 2022-07-12 腾讯科技(深圳)有限公司 Contract data processing method, related equipment and medium
CN111327425B (en) * 2020-01-20 2021-04-27 福州大学 Vehicle information safety broadcasting excitation system based on bitcoin and working method thereof
CN111585984B (en) * 2020-04-24 2021-10-26 清华大学 Decentralized security guarantee method and device for packet full life cycle
CN113536321B (en) * 2021-07-16 2023-10-20 华北电力科学研究院有限责任公司 Vulnerability detection method and device

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107566381A (en) * 2017-09-12 2018-01-09 中国联合网络通信集团有限公司 Equipment safety control method, apparatus and system
CN108388806A (en) * 2018-02-12 2018-08-10 徐正伟 A kind of Internet of Things security hardening based on block chain and data Right protection device

Family Cites Families (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106462841A (en) * 2014-03-27 2017-02-22 诺基亚技术有限公司 Method and apparatus for automatic inter-device authorisation
US10275772B2 (en) * 2014-06-16 2019-04-30 Bank Of America Corporation Cryptocurrency risk detection system
US9792742B2 (en) * 2016-02-02 2017-10-17 Live Nation Entertainment, Inc. Decentralized virtual trustless ledger for access control
CN106204057A (en) * 2016-06-27 2016-12-07 惠众商务顾问(北京)有限公司 Physical message accidental validation block chain method for anti-counterfeit, system and device
US20180315055A1 (en) * 2017-05-01 2018-11-01 International Business Machines Corporation Blockchain For Issue/Defect Tracking System
CN107346482A (en) * 2017-05-12 2017-11-14 深圳蜂链科技有限公司 The method and device that block chain is docked, verifies, known together with the outer data of chain
CN107171794B (en) * 2017-06-27 2019-10-22 葛峰 A kind of electronic document signature method based on block chain and intelligent contract
CN107819848A (en) * 2017-11-08 2018-03-20 济南浪潮高新科技投资发展有限公司 A kind of internet of things equipment autonomy interconnected method based on block chain
CN108196872A (en) * 2017-12-27 2018-06-22 邵美 The upgrade method of intelligent contract in a kind of block catenary system
CN108737370B (en) * 2018-04-05 2020-10-16 西安电子科技大学 Block chain-based Internet of things cross-domain authentication system and method
CN109639646B (en) * 2018-11-16 2020-04-24 清华大学 Block chain-based Internet of things safety detection method and system

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107566381A (en) * 2017-09-12 2018-01-09 中国联合网络通信集团有限公司 Equipment safety control method, apparatus and system
CN108388806A (en) * 2018-02-12 2018-08-10 徐正伟 A kind of Internet of Things security hardening based on block chain and data Right protection device

Also Published As

Publication number Publication date
WO2020098454A1 (en) 2020-05-22
CN109639646A (en) 2019-04-16

Similar Documents

Publication Publication Date Title
CN109639646B (en) Block chain-based Internet of things safety detection method and system
Lin et al. BCPPA: A blockchain-based conditional privacy-preserving authentication protocol for vehicular ad hoc networks
Nikitin et al. {CHAINIAC}: Proactive {Software-Update} transparency via collectively signed skipchains and verified builds
Koteska et al. Blockchain implementation quality challenges: a literature
EP3563553B1 (en) Method for signing a new block in a decentralized blockchain consensus network
CN109889497B (en) Distrust-removing data integrity verification method
WO2020015635A1 (en) Distributed voting system, method and apparatus, and computer device and readable storage medium
CN108846673B (en) Block data processing method, device, equipment and storage medium
CN111079136B (en) Fog computing intrusion detection feature sharing system based on block chain technology
KR100350841B1 (en) Original data circulation method, system, apparatus, and computer readable medium
CN110443075A (en) A kind of method and device of block chain intelligence contract verifying deployment
Yan et al. Social-chain: Decentralized trust evaluation based on blockchain in pervasive social networking
WO2020057757A1 (en) Method for signing a new block in a decentralized blockchain consensus network
CN106209379A (en) A kind of Android APK countersignature verification method
CN113723962B (en) Block chain authority management method and block chain system
JP2010508567A (en) Disabling malware on computing devices
Cao et al. A blockchain-based access control and intrusion detection framework for satellite communication systems
CN113010906B (en) Trusted data tracing method and system based on blockchain
JP2023530594A (en) Permitted Event Processing in Distributed Databases
US8214634B1 (en) Establishing trust via aggregate peer ranking
Xia et al. Trust in Software Supply Chains: Blockchain-Enabled SBOM and the AIBOM Future
KR20190045754A (en) Method for managing license of software based on blockchain, and license management server using the same
Wu et al. Privacy-preserving and Traceable Blockchain-based Charging Payment Scheme for Electric Vehicles
Javed et al. Secure message handling in vehicular energy networks using blockchain and artificially intelligent IPFS
Chen et al. Towards Reliable Utilization of AIGC: Blockchain-Empowered Ownership Verification Mechanism

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant