CN110933040B - Block chain based data uplink method, device, equipment and medium - Google Patents

Block chain based data uplink method, device, equipment and medium Download PDF

Info

Publication number
CN110933040B
CN110933040B CN201911071451.3A CN201911071451A CN110933040B CN 110933040 B CN110933040 B CN 110933040B CN 201911071451 A CN201911071451 A CN 201911071451A CN 110933040 B CN110933040 B CN 110933040B
Authority
CN
China
Prior art keywords
data
uplink
block chain
camera
consensus
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201911071451.3A
Other languages
Chinese (zh)
Other versions
CN110933040A (en
Inventor
邵卫
张南平
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuhan Feiwang Software Technology Co ltd
Original Assignee
Wuhan Feiwang Software Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuhan Feiwang Software Technology Co ltd filed Critical Wuhan Feiwang Software Technology Co ltd
Priority to CN201911071451.3A priority Critical patent/CN110933040B/en
Publication of CN110933040A publication Critical patent/CN110933040A/en
Application granted granted Critical
Publication of CN110933040B publication Critical patent/CN110933040B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Studio Devices (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides a block chain-based data uplink method, a block chain-based data uplink device, a block chain-based data uplink equipment and a block chain-based data uplink medium. The method comprises the following steps: acquiring data acquired by a camera and corresponding running state information of the camera, and taking the data and the running state information as data to be linked; performing security verification on the data to be uplink, and transmitting the verified data to be uplink to the block chain after the data to be uplink passes the security verification; and establishing a consensus algorithm, calculating the data to be uplink in the block chain according to the consensus algorithm, and transferring the data to be uplink in the block chain into a block chain data storage library according to a calculation result. According to the invention, the data acquired by the cell camera is combined with the state information of the cell camera, and the data is linked up, so that the cell security information is prevented from being lost when the cell camera is damaged, and meanwhile, according to the consensus algorithm, the state of the cell camera can be analyzed to judge whether the cell camera has a fault.

Description

Block chain based data uplink method, device, equipment and medium
Technical Field
The invention relates to the technical field of wind power plant centralized control, in particular to a block chain-based data chaining method, device, equipment and medium.
Background
Currently, with the development of scientific technology, a blockchain is widely applied to data storage and interaction due to advantages of decentralization, openness, security and autonomy, and is generally formed by interconnecting a plurality of blockchain nodes through communication links, and each blockchain node can provide a corresponding service or issue task.
Now, the application of block chain is more and more extensive, arrive newest leading edge technique greatly, the security protection data of district to the district, the technique of block chain has all been adopted, current district is the data of some community residents mostly, the data about the district security protection of gathering by the district camera, the people of honoring are not many, in case the data that the district camera appears damaging and leads to the district security protection takes place to lose, can cause very big hindrance to the security protection work of district, therefore, how to carry out the cochain to the data that the district camera gathered, protect into the problem that needs to solve for one to the data that have cochain.
The above is only for the purpose of assisting understanding of the technical aspects of the present invention, and does not represent an admission that the above is prior art.
Disclosure of Invention
In view of this, the present invention provides a block chain-based data uplink method, apparatus, device and medium, which are intended to solve the technical problem that the prior art cannot uplink data collected by a cell camera and protect the uplink data.
The technical scheme of the invention is realized as follows:
in one aspect, the present invention provides a block chain-based data uplink method, including the following steps:
s1, acquiring data collected by the camera and corresponding running state information of the camera, and taking the data and the running state information as data to be linked;
s2, performing security verification on the data to be uplink, and transmitting the verified data to be uplink into the block chain after the data to be uplink passes the security verification;
s3, establishing a consensus algorithm, calculating the data to be uplink in the block chain according to the consensus algorithm, and transferring the data to be uplink in the block chain into the block chain data storage according to the calculation result.
On the basis of the above technical solution, preferably, in step S1, the data collected by the camera and the corresponding operating state information of the camera are acquired, and the data and the operating state information are used as data to be uplink, and the method further includes the following steps of acquiring the data collected by the camera and the corresponding operating state information of the camera, where the operating state includes: and during work and fault, the data and the running state information collected by the camera are used as data to be linked and stored in a local equipment log.
Based on the above technical solution, preferably, in step S2, the method further includes the steps of setting a security data standard, performing security verification on the uplink data according to the security data standard, and transmitting the to-be-uplink data to the block chain when the uplink data meets the security data standard; and when the uplink data does not meet the safety data standard, deleting the data to be uplink, and detecting a camera corresponding to the data.
On the basis of the above technical scheme, preferably, when the uplink data meets the safety data standard, the to-be-uplink data is transmitted to the block chain, the method further includes the following steps of obtaining the equipment number of each camera in the cell, establishing an identity verification library according to the equipment number, performing identity verification on the to-be-uplink data through the identity verification library, and when the to-be-uplink data passes the verification, transmitting the to-be-uplink data to the block chain; and deleting the data to be uplink when the data to be uplink is not verified.
Based on the above technical solution, preferably, in step S3, a consensus algorithm is established, the data to be uplink in the block chain is calculated according to the consensus algorithm, and the data to be uplink in the block chain is transferred to the block chain data repository according to the calculation result, which further includes the following steps:
Figure BDA0002261079920000021
h is a consensus value of the consensus algorithm, m is the number of the cameras for transmitting information, and N is the total number of the cameras.
On the basis of the above technical solution, preferably, the to-be-uplink data in the block chain is transferred to and stored in the block chain data repository according to the calculation result, and the method further includes the steps of setting a consensus threshold, comparing the consensus threshold with the consensus threshold, and when the consensus is greater than the consensus threshold, transferring the to-be-uplink data in the block chain to and stored in the block chain data repository; and deleting the data to be uplink in the block chain when the consensus value is smaller than the consensus value threshold.
On the basis of the above technical solution, preferably, when the consensus value is greater than the consensus value threshold, the to-be-uplink data in the block chain is transferred to the block chain data repository, and the method further includes the steps of establishing a private key library, encrypting the to-be-uplink data transferred to the block chain data repository through the private key library, acquiring the device information of the camera corresponding to the to-be-uplink data, and distributing corresponding decoding according to the device information.
Still further preferably, the block chain-based data uplink apparatus includes:
the acquisition module is used for acquiring data acquired by the camera and corresponding running state information of the camera, and taking the data and the running state information as data to be linked;
the uplink module is used for carrying out security verification on the data to be uplink, and transmitting the verified data to be uplink into the block chain after the data to be uplink passes the security verification;
and the computing module is used for establishing a consensus algorithm, computing the data in the block chain according to the consensus algorithm and storing the computed data into the block chain data storage bank.
In a second aspect, the block chain based data uplink method further includes an apparatus, the apparatus comprising: a memory, a processor, and a block chain based data uplink method program stored on the memory and executable on the processor, the block chain based data uplink method program configured to implement the steps of the block chain based data uplink method as described above.
In a third aspect, the block chain based data uplink method further includes a medium, which is a computer medium having a block chain based data uplink method program stored thereon, and when the block chain based data uplink method program is executed by a processor, the block chain based data uplink method program implements the steps of the block chain based data uplink method as described above.
Compared with the prior art, the block chain-based data uplink method has the following beneficial effects:
(1) the data collected by the cell camera and the state of the camera corresponding to the data are combined into complete data to be subjected to chain linking, then the data subjected to chain linking are encrypted through a private key, only security personnel can decrypt the data through decoding of corresponding camera equipment, and the data of the camera is subjected to chain linking encryption in such a way, so that the data can be prevented from being lost, and meanwhile, the data can be protected, and the data is prevented from being maliciously tampered;
(2) by establishing the consensus algorithm, the data in the block chain is calculated by using the consensus algorithm, the consensus value of each calculated to-be-linked data is obtained, the data can be analyzed according to the consensus value, the data with problems can be accurately judged, the corresponding camera is found at the same time, and security personnel can be reminded to maintain the data in time.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
FIG. 1 is a schematic diagram of an apparatus in a hardware operating environment according to an embodiment of the present invention;
FIG. 2 is a flowchart illustrating a block chain based data uplink method according to a first embodiment of the present invention;
fig. 3 is a functional block diagram illustrating a block chain-based data uplink method according to a first embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be obtained by a person skilled in the art without any inventive step based on the embodiments of the present invention, are within the scope of the present invention.
As shown in fig. 1, the apparatus may include: a processor 1001, such as a Central Processing Unit (CPU), a communication bus 1002, a user interface 1003, a network interface 1004, and a memory 1005. Wherein a communication bus 1002 is used to enable connective communication between these components. The user interface 1003 may include a Display screen (Display), an input unit such as a Keyboard (Keyboard), and the optional user interface 1003 may also include a standard wired interface, a wireless interface. The network interface 1004 may optionally include a standard wired interface, a WIreless interface (e.g., a WIreless-FIdelity (WI-FI) interface). The Memory 1005 may be a Random Access Memory (RAM) Memory, or may be a Non-Volatile Memory (NVM), such as a disk Memory. The memory 1005 may alternatively be a storage device separate from the processor 1001.
Those skilled in the art will appreciate that the configuration shown in fig. 1 does not constitute a limitation of the device, and that in actual implementations the device may include more or less components than those shown, or some components may be combined, or a different arrangement of components.
As shown in fig. 1, the memory 1005 as a medium may include an operating system, a network communication module, a user interface module, and a block chain based data uplink method program.
In the apparatus shown in fig. 1, the network interface 1004 is mainly used for establishing a communication connection between the apparatus and a server storing all data required in the system of block chain based data uplink method; the user interface 1003 is mainly used for data interaction with a user; the processor 1001 and the memory 1005 of the block chain-based data uplink method apparatus of the present invention may be disposed in the block chain-based data uplink method apparatus, and the block chain-based data uplink method apparatus calls the block chain-based data uplink method program stored in the memory 1005 through the processor 1001 and executes the block chain-based data uplink method provided in the present invention.
Referring to fig. 2, fig. 2 is a flowchart illustrating a block chain-based data uplink method according to a first embodiment of the present invention.
In this embodiment, the block chain based data uplink method includes the following steps:
s10: and acquiring data acquired by the camera and corresponding running state information of the camera, and taking the data and the running state information as data to be linked.
It should be understood that the data acquired by the camera in this embodiment is a security situation that the camera shoots the whole cell, and is a video file, and the running state of the camera at this time is recorded in the acquisition process, and if the camera is running normally, the running state is a working state; if the camera does not shoot the picture or cannot normally transmit data, the corresponding state is a fault, and the central processing unit sends a warning to security personnel after finding the situation to remind the camera to be maintained in time.
It should be understood that when acquiring data collected by a camera, the device information of the camera corresponding to the data is also synchronously acquired, and the device information of the camera is corresponding to the data and the state collected by the camera and is combined together for recording, and the recording form is as follows: video data recorded by a camera in the working state is stored in a local equipment log as an equipment record which can be checked, and the recorded data is linked up to prevent the data from being lost or tampered.
S20: and carrying out security verification on the data to be uplink, and transmitting the verified data to be uplink to the block chain after the data to be uplink passes the security verification.
It should be understood that before the obtained data is uplink, security verification is performed on the data to be uplink, where the security verification is performed by setting a standard format of security data by a user, and the format of the data to be uplink is verified according to the standard format, and the format may be an attribute format of a video or a format of status information of a device, and through the formats, some error data can be screened out so as to prevent excessive data from occupying resources.
It should be understood that the central processing unit may also establish an identity verification library according to the device numbers of different cameras in the cell, and then perform identity verification on the data to be uplink according to the identity verification library, and if the device corresponding to the data to be uplink can be found in the identity verification library, it indicates that there is no problem in the data; if the equipment corresponding to the uplink data cannot be found in the identity verification library, it indicates that the equipment may have a problem or the data is tampered.
It should be appreciated that blockchains are a new model for the application of computer technologies such as distributed data storage, point-to-point transmission, consensus mechanisms, encryption algorithms, etc. The block chain is an important concept of bitcoin, which is essentially a decentralized database, and as the underlying technology of bitcoin, is a string of data blocks generated by using a cryptographic method for correlation.
It should be understood that, in general, a blockchain system is composed of a data layer, a network layer, a consensus layer, a stimulus layer, a contract layer, and an application layer. The data layer encapsulates a bottom layer data block, basic data such as related data encryption and time stamp and a basic algorithm; the network layer comprises a distributed networking mechanism, a data transmission mechanism, a data verification mechanism and the like; the consensus layer mainly encapsulates various consensus algorithms of the network nodes; the incentive layer integrates economic factors into a block chain technology system, and mainly comprises an issuing mechanism, a distributing mechanism and the like of economic incentive; the contract layer mainly encapsulates various scripts, algorithms and intelligent contracts and is the basis of the programmable characteristic of the block chain; the application layer encapsulates various application scenarios and cases of the blockchain.
S30: and establishing a consensus algorithm, calculating the data to be uplink in the block chain according to the consensus algorithm, and transferring the data to be uplink in the block chain into a block chain data storage library according to a calculation result.
It should be understood that the consensus algorithm mentioned in this embodiment is:
Figure BDA0002261079920000071
h is a consensus value of the consensus algorithm, m is the number of the cameras for transmitting information, and N is the total number of the cameras.
It should be understood that consensus generally refers to a consensus among different people regarding a certain problem or view, a common understanding, value, idea, etc. sought by different groups, and in a consensus agreed upon in some respect, the mechanism of consensus is to determine the way in which a certain consensus is achieved and maintained. In this embodiment, the consensus algorithm is used to detect the correctness of the data, m is the number of the cameras transmitting information, and if 3m +1 cameras transmit information, at least 2m +1 cameras are required to achieve consensus, where the consensus is achieved according to the correctness of the data.
It should be understood that the common identification in this embodiment means that if a certain data is to be uplink, the cpu compares the format of the certain data with other data to be uplink, and if the format is the same, it indicates that a common identification is achieved between the cell cameras, and the data can be uplink.
It should be understood that, in this embodiment, a common identity threshold is set, and the data to be uplink is determined through the common identity threshold, where when the common identity is greater than the common identity threshold, it indicates that the cell camera has achieved common identity for the correctness of the data, and the data to be uplink is correct; when the consensus value is smaller than the consensus value threshold, the cell camera does not achieve the consensus on the correctness of the data, the data needing to be linked is wrong, the data is deleted, the corresponding camera is tracked, and the corresponding camera number is sent to security personnel.
It should be understood that the private key is a private algorithm used for encrypting data, and is more private than the existing encryption technology, limited decoding is only allocated for data to be encrypted, and the decoding is not public, and by encrypting the data to be linked stored in the blockchain data storage by the private key, the security of the data can be effectively protected, and the data can be greatly prevented from being tampered.
The above description is only for illustrative purposes and does not limit the technical solutions of the present application in any way.
As can be easily found from the above description, in the present embodiment, data acquired by a camera and corresponding running state information of the camera are acquired, and the data and the running state information are used as data to be linked; performing security verification on the data to be uplink, and transmitting the verified data to be uplink to the block chain after the data to be uplink passes the security verification; and establishing a consensus algorithm, calculating the data to be uplink in the block chain according to the consensus algorithm, and transferring the data to be uplink in the block chain into a block chain data storage library according to a calculation result. This embodiment combines together through the data with district camera collection and the status information of district camera, links up these data, has avoided the district camera when damaging, may lead to district security protection information to lose, simultaneously according to consensus algorithm, can carry out the analysis to the state of district camera, judges whether there is the trouble the district camera.
In addition, the embodiment of the invention also provides a data uplink device based on the block chain. As shown in fig. 3, the block chain based data uplink apparatus includes: an acquisition module 10, an uplink module 20, and a calculation module 30.
An obtaining module 10, configured to obtain data acquired by a camera and corresponding running state information of the camera, and use the data and the running state information as to-be-linked data;
the uplink module 20 is configured to perform security verification on the to-be-uplink data, and transmit the verified to-be-uplink data to the block chain after the to-be-uplink data passes the security verification;
and the calculating module 30 is configured to establish a consensus algorithm, calculate data in the blockchain according to the consensus algorithm, and store the calculated data in the blockchain data storage library.
In addition, it should be noted that the above-described embodiments of the apparatus are merely illustrative, and do not limit the scope of the present invention, and in practical applications, a person skilled in the art may select some or all of the modules to implement the purpose of the embodiments according to actual needs, and the present invention is not limited herein.
In addition, the technical details that are not elaborated in this embodiment may refer to the block chain based data uplink method provided in any embodiment of the present invention, and are not described herein again.
Furthermore, an embodiment of the present invention further provides a medium, which is a computer medium, and the computer medium stores a block chain based data uplink method program, and when executed by a processor, the block chain based data uplink method program implements the following operations:
s1, acquiring data collected by the camera and corresponding running state information of the camera, and taking the data and the running state information as data to be linked;
s2, performing security verification on the data to be uplink, and transmitting the verified data to be uplink into the block chain after the data to be uplink passes the security verification;
s3, establishing a consensus algorithm, calculating the data to be uplink in the block chain according to the consensus algorithm, and transferring the data to be uplink in the block chain into the block chain data storage according to the calculation result.
Further, when executed by a processor, the block chain based data uplink method further performs the following operations:
the data of acquireing the camera and the running state information of the corresponding camera, running state includes: and during work and fault, the data and the running state information collected by the camera are used as data to be linked and stored in a local equipment log.
Further, when executed by a processor, the block chain based data uplink method further performs the following operations:
setting a safety data standard, carrying out safety verification on the uplink data according to the safety data standard, and transmitting the data to be uplink into a block chain when the uplink data meets the safety data standard; and when the uplink data does not meet the safety data standard, deleting the data to be uplink, and detecting a camera corresponding to the data.
Further, when executed by a processor, the block chain based data uplink method further performs the following operations:
acquiring equipment numbers of all cameras in a cell, establishing an identity verification library according to the equipment numbers, performing identity verification on data to be uplink through the identity verification library, and transmitting the data to be uplink into a block chain when the data to be uplink passes the verification; and deleting the data to be uplink when the data to be uplink is not verified.
Further, when executed by a processor, the block chain based data uplink method further performs the following operations:
the consensus algorithm is as follows:
Figure BDA0002261079920000101
h is a consensus value of the consensus algorithm, m is the number of the cameras for transmitting information, and N is the total number of the cameras.
Further, when executed by a processor, the block chain based data uplink method further performs the following operations:
setting a consensus threshold, comparing the consensus with the consensus threshold, and when the consensus is greater than the consensus threshold, transferring the data to be uplink in the block chain into the block chain data storage library; and deleting the data to be uplink in the block chain when the consensus value is smaller than the consensus value threshold.
Further, when executed by a processor, the block chain based data uplink method further performs the following operations:
and establishing a private key library, encrypting the data to be uplink stored in the block chain data repository through the private key library, acquiring the equipment information of the camera corresponding to the data to be uplink, and distributing corresponding decoding according to the equipment information.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents, improvements and the like that fall within the spirit and principle of the present invention are intended to be included therein.

Claims (9)

1. A block chain based data uplink method is characterized in that: comprises the following steps;
s1, acquiring data collected by the camera and corresponding running state information of the camera, and taking the data and the running state information as data to be linked;
s2, performing security verification on the data to be uplink, and transmitting the verified data to be uplink into the block chain after the data to be uplink passes the security verification;
s3, establishing a consensus algorithm, calculating the data to be uplink in the block chain according to the consensus algorithm, and transferring the data to be uplink in the block chain into a block chain data storage library according to the calculation result;
the consensus algorithm is as follows:
Figure FDA0003196974660000011
h is a consensus value of the consensus algorithm, m is the number of the cameras for transmitting information, and N is the total number of the cameras.
2. The block chain based data uplink method of claim 1, wherein: step S1, acquiring the data collected by the camera and the corresponding operating state information of the camera, and using the data and the operating state information as the data to be linked, further including the following steps of acquiring the data collected by the camera and the corresponding operating state information of the camera, where the operating state includes: and during work and fault, the data and the running state information collected by the camera are used as data to be linked and stored in a local equipment log.
3. The block chain based data uplink method of claim 1, wherein: in step S2, performing security verification on the to-be-uplink data, further including setting a security data standard, performing security verification on the to-be-uplink data according to the security data standard, and transmitting the to-be-uplink data to a block chain when the to-be-uplink data meets the security data standard; and when the uplink data does not meet the safety data standard, deleting the data to be uplink, and detecting a camera corresponding to the data.
4. The block chain based data uplink method of claim 3, wherein: when the uplink data meet the safety data standard, transmitting the data to be uplink into the block chain, and further comprising the following steps of obtaining the equipment number of each camera in the cell, establishing an identity verification library according to the equipment number, performing identity verification on the data to be uplink through the identity verification library, and transmitting the data to be uplink into the block chain when the data to be uplink passes the verification; and deleting the data to be uplink when the data to be uplink is not verified.
5. The block chain based data uplink method of claim 1, wherein: according to the calculation result, transferring the data to be uplink linked in the block chain into the block chain data storage library, and further comprising the following steps of setting a consensus value threshold, comparing the consensus value with the consensus value threshold, and transferring the data to be uplink linked in the block chain into the block chain data storage library when the consensus value is larger than the consensus value threshold; and deleting the data to be uplink in the block chain when the consensus value is smaller than the consensus value threshold.
6. The block chain based data uplink method of claim 5, wherein: and when the consensus value is greater than the consensus value threshold value, transferring the data to be uplink stored in the block chain into the block chain data repository.
7. A block chain based data uplink device, the block chain based data uplink device comprising:
the acquisition module is used for acquiring data acquired by the camera and corresponding running state information of the camera, and taking the data and the running state information as data to be linked;
the uplink module is used for carrying out security verification on the data to be uplink, and transmitting the verified data to be uplink into the block chain after the data to be uplink passes the security verification;
the computing module is used for establishing a consensus algorithm, computing the data in the block chain according to the consensus algorithm and storing the computed data into a block chain data storage bank;
the consensus algorithm is as follows:
Figure FDA0003196974660000021
h is a consensus value of the consensus algorithm, m is the number of the cameras for transmitting information, and N is the total number of the cameras.
8. An apparatus for block chain based data uplink, the apparatus comprising: a memory, a processor, and a block chain based data uplink method program stored on the memory and executable on the processor, the block chain based data uplink method program configured to implement the steps of the block chain based data uplink method according to any of claims 1 to 6.
9. A medium, characterized in that the medium is a computer medium having a block chain based data uplink method program stored thereon, wherein the block chain based data uplink method program, when executed by a processor, implements the steps of the block chain based data uplink method according to any one of claims 1 to 6.
CN201911071451.3A 2019-11-05 2019-11-05 Block chain based data uplink method, device, equipment and medium Active CN110933040B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911071451.3A CN110933040B (en) 2019-11-05 2019-11-05 Block chain based data uplink method, device, equipment and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911071451.3A CN110933040B (en) 2019-11-05 2019-11-05 Block chain based data uplink method, device, equipment and medium

Publications (2)

Publication Number Publication Date
CN110933040A CN110933040A (en) 2020-03-27
CN110933040B true CN110933040B (en) 2021-11-12

Family

ID=69853267

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911071451.3A Active CN110933040B (en) 2019-11-05 2019-11-05 Block chain based data uplink method, device, equipment and medium

Country Status (1)

Country Link
CN (1) CN110933040B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111652458B (en) * 2020-04-09 2023-09-26 南京审计大学 Engineering auditing method based on blockchain technology
CN111586069A (en) * 2020-05-15 2020-08-25 广州全宇风信息科技有限公司 Internet of things equipment management and data chaining method based on block chain technology
CN112307458A (en) * 2020-10-29 2021-02-02 深圳市赛肯威科技有限公司 Light node uplink method and device, Internet of things central control terminal and block chain network
CN115134376A (en) * 2021-03-26 2022-09-30 中兴通讯股份有限公司 Data processing method, device and storage medium

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106920167A (en) * 2017-02-24 2017-07-04 北京航空航天大学 A kind of block chain mechanism based on P2P finance and common recognition algorithm
US10701054B2 (en) * 2018-01-31 2020-06-30 Salesforce.Com, Inc. Systems, methods, and apparatuses for implementing super community and community sidechains with consent management for distributed ledger technologies in a cloud based computing environment
CN110400142B (en) * 2018-06-01 2021-06-25 腾讯科技(深圳)有限公司 Data processing method, device and storage medium
CN108985790A (en) * 2018-06-25 2018-12-11 平安科技(深圳)有限公司 Method for anti-counterfeit, system, computer equipment and storage medium based on block chain
CN108990002A (en) * 2018-06-27 2018-12-11 柳州市蓝海数链科技有限公司 A kind of block chain data processing method, device, terminal and storage medium
CN108921556B (en) * 2018-07-02 2022-04-19 上海达家迎信息科技有限公司 Block chain verification method, device, equipment and storage medium
CN110011793A (en) * 2019-04-03 2019-07-12 上海中商网络股份有限公司 Anti-fake data processing method of tracing to the source, device, equipment and medium
CN110111104A (en) * 2019-04-23 2019-08-09 矩阵元技术(深圳)有限公司 Block chain intelligence contract implementation method, device, computer equipment and storage medium
CN110336815B (en) * 2019-07-04 2024-06-07 深圳前海微众银行股份有限公司 Block chain-based attack defense method, device, equipment and readable storage medium
CN110336833B (en) * 2019-07-30 2022-06-21 中国工商银行股份有限公司 Picture content consensus method based on block chain and server

Also Published As

Publication number Publication date
CN110933040A (en) 2020-03-27

Similar Documents

Publication Publication Date Title
CN110933040B (en) Block chain based data uplink method, device, equipment and medium
CN112968764B (en) Multilink cipher logic block chain
CN111881481B (en) Medical data processing method, device, equipment and storage medium based on blockchain
EP3709568A1 (en) Deleting user data from a blockchain
CN114372296B (en) Block chain-based user behavior data auditing method and system
CN111339141B (en) Data transmission method, block chain node equipment and medium
CN110929229A (en) Block chain-based office document credibility verification method and system
CN106603561A (en) Block level encryption method in cloud storage and multi-granularity deduplication method
CN111428694A (en) Abnormal smoke monitoring system of wisdom building site based on block chain
CN111597167A (en) Big data management system and method applying block chain technology
CN106203164B (en) Information security big data resource management system based on trust computing and cloud computing
CN112084529A (en) Privacy data encryption access method and system based on block chain technology for community
Ametepe et al. Data provenance collection and security in a distributed environment: a survey
CN116366673A (en) Data analysis and sharing method oriented to management of power grid information machine room
CN114724661A (en) Multi-source clinical trial data sharing method based on block chain technology
CN109246248A (en) The credible and secure shared system of data and method based on block chain technology
Zhang et al. Aegis: a trusted, automatic and accurate verification framework for vertical federated learning
CN113886817A (en) Host intrusion detection method and device, electronic equipment and storage medium
CN116249108A (en) Edge computing key management method for trusted uplink of IoT user perception data
CN116185296A (en) Distributed safe storage system based on multimedia teleconference information
CN116032590A (en) DDOS attack detection model training method and related device
CN114598556A (en) IT infrastructure configuration integrity protection method and protection system
CN113988867A (en) Fraud detection method and device, computer equipment and storage medium
CN111241139B (en) Data statistical method, device, computer equipment and storage medium
CN114418092A (en) Block chain-based federal learning malicious node screening method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB03 Change of inventor or designer information
CB03 Change of inventor or designer information

Inventor after: Shao Wei

Inventor after: Zhang Nanping

Inventor before: Shao Wei

Inventor before: Hu Jun

GR01 Patent grant
GR01 Patent grant
PE01 Entry into force of the registration of the contract for pledge of patent right
PE01 Entry into force of the registration of the contract for pledge of patent right

Denomination of invention: Blockchain based data uploading methods, devices, devices, and media

Granted publication date: 20211112

Pledgee: Guanggu Branch of Wuhan Rural Commercial Bank Co.,Ltd.

Pledgor: Wuhan FEIWANG Software Technology Co.,Ltd.

Registration number: Y2024980018659