CN111400774A - Block chain structure of secondary water supply anti-terrorism anti-poison safety system - Google Patents

Block chain structure of secondary water supply anti-terrorism anti-poison safety system Download PDF

Info

Publication number
CN111400774A
CN111400774A CN202010209257.3A CN202010209257A CN111400774A CN 111400774 A CN111400774 A CN 111400774A CN 202010209257 A CN202010209257 A CN 202010209257A CN 111400774 A CN111400774 A CN 111400774A
Authority
CN
China
Prior art keywords
chain
level
water supply
block chain
layer
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010209257.3A
Other languages
Chinese (zh)
Other versions
CN111400774B (en
Inventor
杜明辉
李斌
刘萍
熊玉茹
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Anncore Biotechnology Co ltd
Original Assignee
Beijing Anncore Biotechnology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Anncore Biotechnology Co ltd filed Critical Beijing Anncore Biotechnology Co ltd
Priority to CN202010209257.3A priority Critical patent/CN111400774B/en
Publication of CN111400774A publication Critical patent/CN111400774A/en
Application granted granted Critical
Publication of CN111400774B publication Critical patent/CN111400774B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
    • G06Q50/06Electricity, gas or water supply
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/26Government or public services
    • G06Q50/265Personal security, identity or safety
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Abstract

The invention discloses a block chain architecture of a secondary water supply anti-terrorism anti-virus poison-throwing safety system, which comprises a storage layer, a block chain layer, an interface layer and an application layer, wherein a deployment architecture comprises a county-level secondary chain and a provincial-city-level primary management chain; the method comprises the steps that a block chain layer is formed by block chain link points uploading data to a storage layer through an intelligent contract by using a block chain technology, an interface layer is distributed on the block chain link points corresponding to each block chain layer to perform node monitoring, and information of the block chain nodes is uploaded to an application layer after being encrypted and verified; and data of the county-level secondary chain is transmitted to the province-city-level primary management chain in a chain-crossing manner, and nodes of the province-city-level primary management chain supervise the water supply safety of the secondary water supply pump house through an application layer. According to the technical scheme, the anti-terrorism and anti-virus-throwing equipment information for secondary water supply is encrypted and stored in a multi-node and multi-distribution mode, data cannot be falsified, permanent traceability is achieved, real-time monitoring is achieved, attack and malicious virus throwing of terrorists are effectively prevented, and safety of a drinking water system is guaranteed in an all-round mode.

Description

Block chain structure of secondary water supply anti-terrorism anti-poison safety system
Technical Field
The invention relates to the technical field of water affair management, in particular to a block chain architecture of a secondary water supply anti-terrorism anti-virus poison-throwing safety system.
Background
At present, the guarantee of the secondary water supply safety is improved to the height of improving the anti-terrorism strategy of the civilian and the state, and the requirement of solving the water quality safety problem of the drinking water of the residents in good towns for the last kilometer is clearly put forward. At present, the anti-terrorism and anti-virus-throwing work of the secondary water supply facilities in cities and towns is still a weak link, the secondary water supply pump rooms in cities and towns are numerous and dispersed, the difficulty of prevention is very high only by relying on the existing manpower, terrorists still can take the opportunity to throw the virus in the secondary water supply facilities, and great potential safety hazards exist.
At present, some secondary water supply pump rooms are provided with cameras to monitor water supply facilities, particularly water tanks, so as to achieve the purpose of safety. However, in the conventional monitoring mode, the possibility of human damage exists, and the possibility that key video monitoring evidence is artificially damaged, lost and unrecoverable is high. Monitoring data transmission can be carried out by lawless persons to maliciously tamper data or delay data transmission through a network. At present, no system solution exists for water safety of the town secondary water supply pump house.
Disclosure of Invention
Aiming at least one of the problems, the invention provides a block chain architecture of a secondary water supply anti-terrorism and anti-virus-throwing safety system, which is characterized in that a block chain bottom architecture is constructed, anti-terrorism and anti-virus-throwing equipment information is encrypted to form a block chain by using nodes of a county-level secondary chain to be managed by a provincial and city-level primary management chain, the block chain technology stores the urban secondary water supply anti-terrorism and anti-virus-throwing equipment information in a multi-node and multi-distribution encryption mode, data cannot be falsified, the data are traced permanently, and the data are monitored in real time, so that terrorists are effectively prevented from attacking and maliciously throwing viruses, and the safety of a drinking water system is guaranteed in an all.
In order to achieve the aim, the invention provides a block chain architecture of a secondary water supply anti-terrorism and anti-virus-poisoning safety system, wherein the system architecture comprises a storage layer, a block chain layer, an interface layer and an application layer, and a deployment architecture comprises a county-level secondary chain and a provincial-city-level primary management chain; the storage layer is used for managing and storing data and carrying out safety backup, the block chain layers are formed by uploading block chain nodes of the data to the storage layer through an intelligent contract by using a block chain technology, the interface layers are distributed on the block chain nodes corresponding to the block chain layers to carry out node monitoring, and the information of the block chain nodes is uploaded to the application layer after being encrypted and verified; the information of the real-time acquisition record of the alarm linkage device arranged in the secondary water supply pump house forms a front node of the county-level secondary chain, the data of the county-level secondary chain is transmitted to the province-city-level primary management chain in a chain-crossing mode, and the node of the province-city-level primary management chain supervises the water supply safety of the secondary water supply pump house through an application layer.
In the above technical solution, preferably, data transmission between the blockchain nodes is processed by encryption transmission, the blockchain layer forms a blockbrowser through an interface, and the application layer accesses the blockbrowser through the interface.
In the above technical solution, preferably, the blockchain node uses its own identity as a transaction signature, and each link of the blockchain layer needs to perform authority verification by using an identity authority verification mechanism.
In the above technical solution, preferably, the data transmission is encrypted by using a cryptographic algorithm.
In the above technical scheme, preferably, the alarm linkage device includes a safety water tank, a water quality monitor, and a video monitoring device, the alarm linkage device collects monitoring information in real time, and encrypts the abnormal early warning information to form a block cochain.
In the above technical solution, preferably, the nodes of the county-level and second-level chain include county-level and district-level mechanisms, and the nodes of the province-city-level and first-level management chain include city-level, municipality-level and province-level mechanisms.
In the above technical solution, preferably, the institution of the provincial and municipal administration chain has authority to add and manage states of the institution of the county and municipal administration chain, and the administrator account of the current institution has authority to add and manage member accounts.
In the above technical solution, preferably, the county level secondary chain has not less than 20 nodes to operate normally, and the provincial and municipal level primary management chain has not less than 20 nodes to operate normally.
In the above technical solution, preferably, when the alarm linkage device detects abnormal early warning information, the alarm is linked to the nodes of the county-level secondary chain and the province-city-level primary management chain in real time.
Compared with the prior art, the invention has the beneficial effects that: by constructing a block chain bottom layer framework, encrypting the anti-terrorist and anti-virus-throwing equipment information by using the nodes of a county-level secondary chain to form a block chain, performing cross-chain acquisition and management on the information of the county-level secondary chain by using a province-level primary management chain, and storing the multi-node and multi-distribution encryption of the town secondary water supply anti-terrorist and anti-virus-throwing equipment information by using a block chain technology, wherein data cannot be falsified and is permanently traced to the source, and the data is monitored in real time, so that attack and malicious virus throwing of terrorists are effectively prevented, and the safety of a drinking water system is guaranteed in an all-round way.
Drawings
Fig. 1 is a schematic structural diagram of a block chain architecture of a secondary water supply anti-terrorist and anti-poison security system according to an embodiment of the present invention;
FIG. 2 is a schematic diagram of an application of a two-stage private chain for anti-terrorism and anti-virus administration with secondary water supply according to an embodiment of the present invention;
FIG. 3 is a schematic view of the monitoring principle of the anti-terrorist and anti-virus-exposure data of secondary water supply disclosed in one embodiment of the present invention;
fig. 4 is a schematic view of a secondary water supply anti-terrorist and anti-virus-exposure data monitoring process according to an embodiment of the invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all, embodiments of the present invention. All other embodiments, which can be obtained by a person skilled in the art without any inventive step based on the embodiments of the present invention, are within the scope of the present invention.
The invention is described in further detail below with reference to the attached drawing figures:
as shown in fig. 1, according to the blockchain architecture of the secondary water supply anti-terrorism and anti-virus-poisoning security system provided by the present invention, the system architecture includes a storage layer, a blockchain layer, an interface layer and an application layer, and the deployment architecture includes a county-level secondary chain and a provincial-city-level primary management chain; the storage layer is used for managing and safely backing up stored data, block chain nodes for uploading data to the storage layer through an intelligent contract by using a block chain technology form block chain layers, the interface layers are distributed on the block chain nodes corresponding to each block chain layer to perform node monitoring, and information of the block chain nodes is uploaded to the application layer after being encrypted and verified; the information of the real-time acquisition record of the alarm linkage device arranged in the secondary water supply pump house forms a preposed node of a county-level secondary chain, the data of the county-level secondary chain is transmitted to a provincial and municipal-level primary management chain in a chain-crossing manner, and the node of the provincial and municipal-level primary management chain supervises the water supply safety of the secondary water supply pump house through an application layer.
In the embodiment, a secondary water supply anti-terrorism and anti-virus-throwing safety system is combined, a safe water tank vibration sensor, a water quality monitor, a monitoring device and other alarm linkage devices are adopted at the front end and are in networking linkage with an anti-terrorism center, a community property center and a water service center, a novel anti-terrorism and anti-virus-throwing facility without dead angles is created, data are stored in a distributed mode, the data cannot be tampered and traced permanently, relevant information of the secondary water supply facility is monitored and recorded in real time, attack of terrorists is fundamentally prevented, and drinking water safety is guaranteed in an all-round mode.
The secondary water supply anti-terrorism anti-poison-throwing safety system comprises a plurality of secondary water supply pump rooms, wherein each secondary water supply pump room comprises a safety water tank, a water quality monitor, alarm devices such as monitoring equipment and the like, and the real-time monitoring alarm is carried out. And arranging nodes on the chain in each secondary water supply pump room, judging that all data and log management data generated on all monitored intelligent security and protection equipment on the site of the secondary water supply pump room respectively correspond to different structured and unstructured storage databases in the state of the nodes on the chain according to the monitoring information to serve as storage layers for managing and storing the data, and performing safe backup. Corresponding data (information and video uplink) in all storage databases of the storage layer are uploaded and received by the intelligent contract through a block chain technology, and are stored and processed to form a block chain layer.
Each block chain layer forms a block browser which is distributed on the corresponding node to encrypt and respectively carry out node monitoring, and an interface layer is formed:
(1) messages among the blockchain nodes need to be encrypted for transmission, and the https protocol is enabled for communication between the web end and the background interface service.
(2) Sensitive data, files and other information need to be encrypted and then stored in a database or a file server.
(3) If an interface needing to interact with other third parties exists, the authority of the interface needs to be strictly controlled, the user access is authenticated, and data are encrypted and transmitted.
(4) Each node in the block chain uses its own identity as a transaction signature.
(5) Each link of the block chain layer needs an identity authority verification mechanism.
(6) The encryption algorithm in the system adopts a national encryption algorithm.
And the block chain node information is encrypted and verified and then uploaded to an application layer (operation and maintenance layer) in real time, and the application objects are mechanisms such as public security, anti-terrorism command centers, governments, control areas in cell pump rooms and the like.
In the above embodiment, preferably, data transmission between the link points of the block is processed by encrypted transmission, the block link layer forms a block browser through the interface, and the application layer accesses the block browser through the interface.
In the above embodiment, preferably, the block link point uses its own identity as a transaction signature, and each link of the block link layer needs to perform authority verification by using an identity authority verification mechanism.
In the above embodiment, preferably, the alarm linkage device includes a safety water tank, a water quality monitor, and a video monitoring device, and the alarm linkage device collects monitoring information in real time and encrypts the abnormal early warning information to form a block chain link. Information (system state, detection information, alarm information, system time service, equipment ID and the like) recorded by the safety water tank, the water tank alarm device and the video monitoring equipment in real time forms a preposed node, and uplink recorded information is used as second-level chain transmission data and a first-level chain to be directly transmitted to the anti-terrorism command center and the duty room in a chain-crossing mode to generate a linkage alarm device, so that visual real-time monitoring and alarm are formed.
As shown in fig. 2, in the above embodiment, preferably, the nodes of the county-level secondary chain include county-level and district-level organizations, and the nodes of the province-city-level primary management chain include city-level, municipality-level and province-level organizations.
In the above embodiment, preferably, the institution of the provincial and municipal administration chain has the authority to add and manage the status of the institution of the county level and secondary chain, and the administrator account of the current institution has the authority to add and manage the member account.
In the above embodiment, preferably, the county level secondary chain has no less than 20 nodes to operate normally, and the province and city level primary management chain has no less than 20 nodes to operate normally.
In the above embodiment, preferably, when the alarm linkage device detects the abnormal early warning information, the alarm is linked to the nodes of the county-level secondary chain and the province-city-level primary management chain in real time.
As shown in fig. 3 and 4, according to the block chain architecture of the secondary water supply anti-terrorism and anti-virus-exposure security system disclosed in the above embodiment, nodes on a chain are arranged in each secondary water supply pump room, a hash uplink is formed by data recorded by water quality monitoring and monitoring equipment, video recording and files of daily patrol inspection information recorded on all security water tanks in the secondary water supply pump room site, and is safely backed up, the uplink can complete the storage and state processing of transactions on the block chain after entering an intelligent contract, a block browser is formed through an interface, information among the nodes of the block chain or information such as sensitive data and files needs to be encrypted and transmitted, all information needs to be checked by data/contract, inquired by data, integrated by CA, encrypted by data, monitored by nodes, and finally transmitted to each application layer through data uploading, data contract, on-chain inquiry and authority management, such as public security, anti-terrorism command centers, governments, secondary water supply district central control rooms and the like, can supervise the safety of each secondary water supply pump room in real time. When a suspicious person in the secondary water supply pump room triggers the alarm device or the water quality monitoring data is abnormal, the linkage alarm device and the monitoring record information are directly transmitted to the anti-terrorist command center and the district duty room to generate real-time alarm linkage. In addition, the constructed secondary water supply anti-terrorist and anti-virus-throwing equipment secondary special chain takes each county-level administrative district as a secondary chain node, and the anti-terrorist and anti-virus-throwing information is encrypted to form a block uplink; and taking provincial level, city level and autonomous region level as primary management chains, and collecting data of each county level secondary chain through cross-chain.
The above is only a preferred embodiment of the present invention, and is not intended to limit the present invention, and various modifications and changes will occur to those skilled in the art. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (9)

1. A block chain architecture of a secondary water supply anti-terrorism anti-virus poison-throwing safety system is characterized in that a system architecture comprises a storage layer, a block chain layer, an interface layer and an application layer, and a deployment architecture comprises a county-level secondary chain and a provincial-city-level primary management chain;
the storage layer is used for managing and storing data and carrying out safety backup, the block chain layers are formed by uploading block chain nodes of the data to the storage layer through an intelligent contract by using a block chain technology, the interface layers are distributed on the block chain nodes corresponding to the block chain layers to carry out node monitoring, and the information of the block chain nodes is uploaded to the application layer after being encrypted and verified;
the information of the real-time acquisition record of the alarm linkage device arranged in the secondary water supply pump house forms a front node of the county-level secondary chain, the data of the county-level secondary chain is transmitted to the province-city-level primary management chain in a chain-crossing mode, and the node of the province-city-level primary management chain supervises the water supply safety of the secondary water supply pump house through an application layer.
2. The blockchain architecture of the secondary water supply anti-terrorist and anti-virus exposure security system according to claim 1, wherein data transmission between the blockchain nodes is processed by encryption transmission, the blockchain layer forms a blockbrowser through an interface, and the application layer accesses the blockbrowser through the interface.
3. The blockchain architecture of the secondary water supply anti-terrorist and anti-virus-exposure security system as claimed in claim 1 or 2, wherein the blockchain node uses its own identity certificate as a transaction signature, and each link of the blockchain layer needs to use an identity authority verification mechanism for authority verification.
4. The blockchain architecture of the secondary water supply anti-terrorist and anti-virus exposure security system according to claim 2, wherein the data transmission is encrypted by using a cryptographic algorithm.
5. The block chain architecture of the secondary water supply anti-terrorism and anti-poison exposure safety system as claimed in claim 1, wherein the alarm linkage device comprises a safety water tank, a water quality monitor and a video monitoring device, and the alarm linkage device collects monitoring information in real time and encrypts abnormal early warning information to form a block chain.
6. The blockchain architecture of the secondary water supply anti-terrorist and anti-poison exposure safety system according to claim 1, wherein the nodes of the county-level and secondary-level chain include county-level and district-level mechanisms, and the nodes of the provincial-city-level and primary-level management chain include city-level, autonomous district-level and provincial-level mechanisms.
7. The blockchain architecture of the secondary water supply anti-terrorism and anti-virus exposure security system as claimed in claim 6, wherein the organization of the provincial and municipal administration chain has authority to add and manage states of the organization of the county and level chain, and the administrator account of the current organization has authority to add and manage member accounts.
8. The blockchain architecture of the secondary water supply anti-terrorist and anti-poison exposure safety system according to claim 6, wherein the county level secondary chain has no less than 20 nodes in normal operation, and the province and city level primary management chain has no less than 20 nodes in normal operation.
9. The blockchain architecture of the secondary water supply anti-terrorism and anti-poison exposure safety system according to claim 5, wherein when the alarm linkage device detects abnormal early warning information, the alarm linkage device alarms in real time to be linked to nodes of the county-level secondary chain and the provincial-city-level primary management chain.
CN202010209257.3A 2020-03-23 2020-03-23 Block chain system of secondary water supply anti-terrorism anti-poison safety system Active CN111400774B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010209257.3A CN111400774B (en) 2020-03-23 2020-03-23 Block chain system of secondary water supply anti-terrorism anti-poison safety system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010209257.3A CN111400774B (en) 2020-03-23 2020-03-23 Block chain system of secondary water supply anti-terrorism anti-poison safety system

Publications (2)

Publication Number Publication Date
CN111400774A true CN111400774A (en) 2020-07-10
CN111400774B CN111400774B (en) 2021-05-07

Family

ID=71429028

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010209257.3A Active CN111400774B (en) 2020-03-23 2020-03-23 Block chain system of secondary water supply anti-terrorism anti-poison safety system

Country Status (1)

Country Link
CN (1) CN111400774B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112800457A (en) * 2021-01-13 2021-05-14 迅鳐成都科技有限公司 Sensitive information supervision method and system for block chain network
CN113723220A (en) * 2021-08-11 2021-11-30 电子科技大学 Deep counterfeiting traceability system based on big data federated learning architecture

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108252363A (en) * 2018-02-06 2018-07-06 北京安洁康生物科技有限公司 Application process of the block chain technology in secondary water-supply facility
CN109389474A (en) * 2018-10-12 2019-02-26 国网能源研究院有限公司 A kind of distributed power generation marketization transaction construction and design method based on block chain
US20190122086A1 (en) * 2017-10-24 2019-04-25 0Chain, LLC SYSTEMS AND METHODS OF SUSTAINABILITY PROTOCOL USING DISTRIBUTED BLOCKCHAIN APPLICATION WITH IoT SENSORS
CN109784759A (en) * 2019-01-30 2019-05-21 威海华智数字经济研究院有限公司 A kind of Internal Audit system based on block chain technology
CN109816257A (en) * 2019-01-30 2019-05-28 广东电网有限责任公司 A kind of double source energy internet transaction method and equipment based on block chain
CN109871669A (en) * 2019-03-14 2019-06-11 哈尔滨工程大学 A kind of data sharing solution based on block chain technology
CN110177130A (en) * 2019-04-22 2019-08-27 郑州匹客科技有限公司 Network is intelligently produced based on industrial cloud chain mixed distribution formula
CN110689471A (en) * 2019-09-30 2020-01-14 浙江水利水电学院 Water resource monitoring system and method based on block chain

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20190122086A1 (en) * 2017-10-24 2019-04-25 0Chain, LLC SYSTEMS AND METHODS OF SUSTAINABILITY PROTOCOL USING DISTRIBUTED BLOCKCHAIN APPLICATION WITH IoT SENSORS
CN108252363A (en) * 2018-02-06 2018-07-06 北京安洁康生物科技有限公司 Application process of the block chain technology in secondary water-supply facility
CN109389474A (en) * 2018-10-12 2019-02-26 国网能源研究院有限公司 A kind of distributed power generation marketization transaction construction and design method based on block chain
CN109784759A (en) * 2019-01-30 2019-05-21 威海华智数字经济研究院有限公司 A kind of Internal Audit system based on block chain technology
CN109816257A (en) * 2019-01-30 2019-05-28 广东电网有限责任公司 A kind of double source energy internet transaction method and equipment based on block chain
CN109871669A (en) * 2019-03-14 2019-06-11 哈尔滨工程大学 A kind of data sharing solution based on block chain technology
CN110177130A (en) * 2019-04-22 2019-08-27 郑州匹客科技有限公司 Network is intelligently produced based on industrial cloud chain mixed distribution formula
CN110689471A (en) * 2019-09-30 2020-01-14 浙江水利水电学院 Water resource monitoring system and method based on block chain

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112800457A (en) * 2021-01-13 2021-05-14 迅鳐成都科技有限公司 Sensitive information supervision method and system for block chain network
CN113723220A (en) * 2021-08-11 2021-11-30 电子科技大学 Deep counterfeiting traceability system based on big data federated learning architecture
CN113723220B (en) * 2021-08-11 2023-08-25 电子科技大学 Deep counterfeiting traceability system based on big data federation learning architecture

Also Published As

Publication number Publication date
CN111400774B (en) 2021-05-07

Similar Documents

Publication Publication Date Title
CN109729180B (en) Whole system intelligent community platform
CN103391185B (en) A kind of cloud security storage of track traffic Monitoring Data and processing method and system
CN107786640A (en) A kind of city intelligent manhole cover system and management method
CN103856345B (en) Server account number and password management method and system and server
CN103118036A (en) Cloud end based intelligent security protection system and method
CN111400774B (en) Block chain system of secondary water supply anti-terrorism anti-poison safety system
CN105430000A (en) Cloud computing security management system
CN103391216A (en) Alarm and blocking method for illegal external connections
CN103563302A (en) Network asset information management
CN110213226A (en) Associated cyber attack scenarios method for reconstructing and system are recognized based on risk total factor
CN100589425C (en) Public secure protection system and public secure protection method
CN113115315B (en) IOT equipment behavior credible supervision method based on block chain
CN107919970A (en) A kind of log management realization method and system of safe O&M service cloud platform
CN106982204A (en) Credible and secure platform
CN107659584A (en) A kind of food processing factory's network security management system
Liang et al. Information security monitoring and management method based on big data in the internet of things environment
CN110708340A (en) Enterprise private network security supervision system
CN206672171U (en) A kind of floating population's management system with warning function
CN111143874A (en) Hoisting equipment monitoring method and system based on block chain and storage medium
CN114024957B (en) Method for judging risk of user behavior in zero trust architecture
CN107465688A (en) A kind of identification method of status monitoring evaluation system network application authority
CN207612279U (en) A kind of food processing factory's network security management system
Sayfayn et al. Cybersafety analysis of the maroochy shire sewage spill (preliminary draft)
CN202524422U (en) Disaster prevention and mitigation service platform for urban public buildings
Rupa An Integrated digital authentication mechanism for intrusion detection system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant