CN111741062B - Electronic equipment local area management system based on block chain technology - Google Patents

Electronic equipment local area management system based on block chain technology Download PDF

Info

Publication number
CN111741062B
CN111741062B CN202010399212.7A CN202010399212A CN111741062B CN 111741062 B CN111741062 B CN 111741062B CN 202010399212 A CN202010399212 A CN 202010399212A CN 111741062 B CN111741062 B CN 111741062B
Authority
CN
China
Prior art keywords
management
transaction
chain
node
equipment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010399212.7A
Other languages
Chinese (zh)
Other versions
CN111741062A (en
Inventor
彭祎
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hunan Peninsula Medical Technology Co ltd
Original Assignee
Hunan Peninsula Medical Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hunan Peninsula Medical Technology Co ltd filed Critical Hunan Peninsula Medical Technology Co ltd
Priority to CN202010399212.7A priority Critical patent/CN111741062B/en
Publication of CN111741062A publication Critical patent/CN111741062A/en
Application granted granted Critical
Publication of CN111741062B publication Critical patent/CN111741062B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Abstract

The invention relates to an electronic equipment local area management system based on a block chain technology, which comprises an equipment management chain. The device management chain is provided with at least one management device, the device management chain owner determines the management device, and the management device is used for managing the transaction of the device management chain. The equipment management chain is provided with a plurality of pieces of electronic equipment, and each piece of electronic equipment is associated with one block; the connection of all blocks constitutes a device management chain. The invention provides a safe and reliable electronic equipment management system which can save time and reduce resource consumption.

Description

Electronic equipment local area management system based on block chain technology
Technical Field
The invention relates to an electronic equipment management technology, in particular to an electronic equipment local area management system based on a block chain technology.
Background
With the rapid development of science and technology in recent years, the scale of use of various electronic devices such as smart phones, smart watches, wearable medical devices and the like is increased explosively, however, the wide use of electronic devices brings convenience, and meanwhile, hidden dangers such as safety and anonymity are also inevitably introduced.
The blockchain is a point-to-point distributed account book technology based on a cryptographic algorithm, and is essentially an internet shared database. The block chain technology is applied to the management of the electronic equipment, and the advantages of decentralized trust, safety, non-tampering, traceability and the like can be fully utilized. But the competition of consensus algorithms and accounting rights in the blockchain will cause huge storage and calculation pressure on the electronic devices.
Disclosure of Invention
The invention aims to provide a safe and reliable electronic equipment management system which can save time and reduce resource consumption, and therefore, the invention provides the following technical scheme:
an electronic device local area management system based on a block chain technology comprises a device management chain, wherein the device management chain is provided with at least one management device, and the management device is used for managing transactions of the device management chain. The management device is determined by the device management chain master.
The equipment management chain is provided with a plurality of pieces of electronic equipment, and each piece of electronic equipment is associated with one block; the connection of all blocks constitutes a device management chain.
The management content of the management device comprises block creation, key management, archive request transaction, parameter request transaction and interaction chain transaction conversion.
The device management chain transaction includes the following data: (1) a transaction number; (2) transaction type, such as access transaction, archive transaction; (3) The address of the target electronic device, i.e. the address of the electronic device requesting access; (4) whether the transaction is an interaction chain transaction; each block comprises a first part, a second part and a transaction part; the first two parts of the block are a first part and a second part, and the transaction part is arranged behind the first two parts; the first part stores the hash value of the previous block, and the second part is used for authorizing the newly added electronic device and recording the authority management method of the device owner for the electronic device.
The process of block creation is: when a new electronic device obtains the consent of a device management chain owner to enter the device management chain, creating a block for the new electronic device, wherein the block is uniquely corresponding to the electronic device;
the key management process comprises the following steps: when a new electronic device obtains the agreement of a device management chain owner to enter the device management chain, the management device issues a secret key for the electronic device, wherein the secret key is used for encrypting the transaction between the electronic device and the management device; when an electronic device is determined as a dishonest device or an authorization period expires, the management device logs off a previously issued key;
the process of the parameter request transaction is as follows: the electronic equipment which needs to acquire the parameters sends a parameter request transaction to the management equipment, the management equipment sends a key to the electronic equipment which initiates the request after receiving the transaction, and the electronic equipment which initiates the request completes access through the key; according to the data request frequency, the method can be divided into single access and repeated access, and the management of the key is divided into single access and long-term access; for single access, a single key is issued, and the key is only used for completing acquisition of single data; for long-term access, a long-term key is issued, and the key can be repeatedly acquired within a certain period;
the archiving request transaction process comprises the following steps: the electronic device requiring archiving sends a transaction requesting archiving to the management device, the management device sends a key to the electronic device initiating the request after receiving the transaction, and the electronic device completes the storage action in the storage unit through the key;
when the electronic equipment initiating the parameter request comes from the interactive chain, because the transaction structures of the equipment management chain and the interactive chain are different, the block of the equipment management chain cannot directly account for the transaction of the interactive chain, and at the moment, the management equipment needs to perform structure conversion on the transaction of the interactive chain so that the transaction of the interactive chain conforms to the structure standard of the equipment management chain;
after the transaction is completed, the management device places the transaction related to the electronic device in the block corresponding to the electronic device and updates the transaction to the device management chain.
Compared with the prior art, the invention has the following beneficial effects:
(1) In the device management chain provided by the invention, the effective management of the electronic product is realized through the issuance and the logout of the secret key. The setting of the single-time key and the long-term key can avoid resource waste caused by repeatedly initiating transactions for the same parameter request within a period of time.
(2) The transaction in the device management chain can occur after being confirmed by the management device, so that the device management chain has higher safety and does not need signature confirmation of an initiator and an initiated party of the transaction. Therefore, the storage space can be effectively saved by adopting the simplified transaction structure provided by the invention.
(3) The owner of the electronic device can add new electronic devices by creating blocks through the management device, and each block in the device management chain is provided with a second part for authority management, so that the owner of the electronic device is allowed to control the authority of all the electronic devices in the device management chain. In addition, the data on the chain is guaranteed not to be tampered by the hash value of the first part, and the method is safer compared with a common electronic device management system.
(4) Compared with the existing block chain network, the device management chain is managed by the specified management device, so that extra computing capacity expense caused by contention for accounting does not exist, when the electronic device is newly added, other nodes do not need to confirm through a consensus algorithm, time can be saved, and efficiency can be improved.
It should be noted that, according to the needs of the simple lines, the above 4 points are only an overview of the beneficial effects of the present invention, and do not encompass all the beneficial effects, and the detailed description refers to the specific illustration in the embodiments.
Description of the drawings:
FIG. 1 is a block chain technology-based architecture diagram of an electronic device management system;
FIG. 2 is a schematic diagram of a transaction completed by a device management chain;
FIG. 3 is a schematic view of a processing flow after a management node receives a transaction;
fig. 4 is a schematic diagram illustrating the determination of election authority of each node according to the score in embodiment 6;
FIG. 5 is a schematic flow chart showing the operation of the first-level consensus in example 6;
FIG. 6 is a schematic flow chart showing the operation of the first-order consensus in example 7;
FIG. 7 is a flowchart illustrating the generation of a management node according to embodiment 8;
fig. 8 is a schematic diagram illustrating a flow of generation of a management node in embodiment 9.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be described clearly and completely with reference to the accompanying drawings. It is to be understood that the embodiments described are only a few embodiments of the present invention, and not all embodiments.
Thus, the following detailed description of the embodiments of the invention is not intended to limit the scope of the invention as claimed, but is merely representative of some embodiments of the invention. All other embodiments, which can be obtained by a person skilled in the art without inventive step based on the embodiments of the present invention, are within the scope of protection of the present invention.
It should be noted that the embodiments of the present invention and the features and technical solutions thereof may be combined with each other without conflict.
It should be noted that: like reference numbers and letters refer to like items in the following figures, and thus, once an item is defined in one figure, it need not be further defined and explained in subsequent figures.
In the description of the present invention, it should be noted that the terms "upper", "lower", and the like refer to orientations or positional relationships based on those shown in the drawings, or orientations or positional relationships that are conventionally arranged when the products of the present invention are used, or orientations or positional relationships that are conventionally understood by those skilled in the art, and such terms are used for convenience of description and simplification of the description, and do not refer to or imply that the devices or elements referred to must have a specific orientation, be constructed and operated in a specific orientation, and thus, should not be construed as limiting the present invention. Furthermore, the terms "first," "second," and the like are used merely to distinguish one description from another, and are not to be construed as indicating or implying relative importance.
Example 1:
an electronic device management system based on a block chain technology comprises a local area management system and a wide area management system. The local area management system comprises a device management chain, and the wide area management system comprises an interaction chain.
Example 2:
preferably, the device management chain comprises at least one management device, and the management device is used for managing the transaction of the device management chain; a number of electronic devices, each electronic device associated with a tile; the connection of all blocks constitutes a device management chain.
Preferably, the management device is determined by a device management chain master.
Preferably, the management content of the management device includes block creation, key management, archive request transaction, parameter request transaction, and inter-link transaction conversion. After the transaction is completed, the management device places the transaction related to the electronic device in the block corresponding to the electronic device and updates the transaction to the device management chain.
Preferably, the process of creating the block is as follows: when a new electronic device obtains the consent of the device management chain owner to enter the device management chain, a block is created for the new electronic device, and the block is uniquely corresponding to the electronic device.
Preferably, the key management process is as follows: when a new electronic device obtains the agreement of a device management chain owner to enter the device management chain, the management device issues a secret key for the electronic device, wherein the secret key is used for encrypting the transaction between the electronic device and the management device; when an electronic device is determined as a dishonest device or an authorization period expires, the management device logs out a previously issued key. Through the issuance and the logout of the secret key, the effective management of the electronic product is realized.
Preferably, data interaction between the electronic devices is required to complete the functions of the electronic devices, for example, the health monitoring related devices need to count data such as heart rate and blood pressure to determine the health condition. At this time, the electronic device which needs to acquire the parameters sends a parameter request transaction to the management device, after receiving the transaction, the management device sends a key to the electronic device which initiates the request, and the electronic device which initiates the request completes access through the key. According to the data request frequency, the method can be divided into single access and repeated access, so that the management of the key can be divided into single access and long-term access. For a single access, a single key is issued, which is only to complete a single data acquisition. For long-term access, a long-term key is issued whereby the key can be repeatedly retrieved for a certain period of time. The above arrangement can avoid resource waste caused by repeatedly initiating transactions for the same parameter request within a period of time.
Preferably, the archiving process is: the electronic device requiring archiving sends a transaction requesting archiving to the management device, after receiving the transaction, the management device sends a key to the electronic device initiating the request, and the electronic device completes the storage action in the storage unit through the key.
Preferably, when the electronic device initiating the parameter request is from the interaction chain, because the device management chain and the interaction chain transaction structure are different, the block of the device management chain cannot directly account for the transaction of the interaction chain, and at this time, the management device needs to perform structure conversion on the transaction of the interaction chain, so that the transaction of the interaction chain conforms to the structure standard of the device management chain. The communication problem caused by the difference of the transaction structures of the equipment management chain and the interaction chain is effectively solved by the arrangement.
Preferably, the transaction in the device management chain can occur after being confirmed by the management device, so that the security is high, and the signature confirmation of the initiator and the initiated party of the transaction is not required. Therefore, compared to the prior art blockchain data transaction structure, the present invention provides a simplified structure. The device management chain transaction at least comprises the following data: (1) a transaction number; (2) transaction type, such as access transaction, archive transaction; (3) The address of the target electronic device, i.e. the address of the electronic device requesting access; and (4) whether the transaction is an interaction chain transaction.
Preferably, each block comprises a first portion, a second portion and a transaction portion. The first two parts of the block are a first part, a second part, and a transaction part. The first part stores the hash value of the previous block, and the second part is used for authorizing the newly added electronic device and recording the authority management method of the device owner for the electronic device, as shown in table 1. In a second behavior example, he cannot access the device numbered B2 on his behalf on the device numbered A1. The transaction part is used for storing all transactions of the electronic equipment corresponding to the block.
TABLE 1
Numbering Requesting device Type of transaction Requested device Authority control
1 A1 Archiving C1 Y
2 A2 Access B2 N
In the device management chain provided by the invention, the owner of the electronic device can add the electronic device by creating the blocks by the management device, and each block in the device management chain is provided with a second part for authority management, so that the owner of the electronic device is allowed to control the authority of all the electronic devices in the device management chain. In addition, the data on the chain is guaranteed not to be tampered by the hash value of the first part, and the method is safer compared with a common electronic device management system. Compared with the existing block chain network, the device management chain is managed by the specified management device, so that extra computing capacity expense caused by contention for accounting does not exist, when the electronic device is newly added, other nodes do not need to confirm through a consensus algorithm, time can be saved, and efficiency can be improved.
Example 3:
preferably, the nodes of the interaction chain are composed of management devices of respective device management chains.
Preferably, the nodes of the interaction chain are composed of management devices of each device management chain, cloud storage devices of the electronic devices, and related devices providing various services.
Preferably, in order to realize efficient management, the invention adopts a classified management mode to realize the management of the nodes.
Preferably, the classification management specifically includes classifying the nodes, and determining a management node in each class of nodes, where the management node is used to manage the transactions occurring in the class.
Preferably, in order to reduce the loss caused by the dishonest of the management node, the management node in the invention is dynamically changed.
Preferably, the time of one management period is set to be the same as one consensus period.
The classification management system provided by the invention effectively reduces the scale of the nodes on the interactive chain, reduces the requirements on the storage space and the computing capacity of the electronic equipment participating in the block chain, manages the transaction on the interactive chain by the management nodes in various classes, and obviously improves the efficiency.
Preferably, the following data structure is adopted for the transaction in the interaction chain: the trade mark number, the former trade mark number, the trade initiator's key and signature, the trade acceptor's key and signature, the trade processing result, the trade content.
Preferably, the first part is a label of the current transaction, the second part is a label of the previous transaction, and the label is used for pointing to the last transaction of the transaction initiator.
Preferably, the third part and the fourth part are a key and a signature of the transaction initiator and a key and a signature of the transaction receiver, respectively.
Preferably, the fifth field is the result of the transaction, and includes the following parameters: receiving the transaction or rejecting the transaction.
Preferably, the sixth field is transaction content, which contains the operations that the transaction initiator wishes the transaction recipient to complete.
Preferably, each node is provided with a rights management list which carries node details which enable a transaction to be initiated to that node.
Preferably, each class is provided with a set of rights management lists, which is a set of all rights management lists in the class.
Preferably, each node can add, delete and modify the content related to the self-transaction right part in the right management list set.
Preferably, when the management node receives a transaction, it first determines whether the transaction recipient of the transaction is in the node it manages, and if not, sends the transaction to the management nodes of other classes in the chain.
Preferably, when the management node receives a transaction, it first confirms whether the recipient of the transaction is in the node it manages, and if so, checks whether the originator of the transaction is in the rights management list of the node. If so, sending the transaction to a transaction recipient and informing other classes of management nodes in the chain that the transaction has been accepted; if not, the transaction is processed with a rejection informing other classes of management nodes in the chain that the transaction has been processed.
Preferably, all received transactions will be stored by the management node, which integrates all transactions within one management period and organizes the creation of new tiles.
Preferably, the interaction chain includes at least the following transaction types: archiving transactions, parameter request transactions.
Preferably, the archive transaction is used to store the relevant data in the electronic device at a designated storage location, for example, the electronic device for health detection stores the detected data on a designated data health platform, so that the doctor can know the monitoring data of the patient in time.
Preferably, the workflow of the archiving transaction is as follows: the method comprises the following steps that an archiving request device initiates an archiving request transaction and sends the archiving request transaction to a management device of the archiving request device, and the management device confirms and converts the format of the archiving request transaction and then sends the archiving request transaction to a management node of the archiving request device; after receiving the transaction of the archiving request, the management node of the node where the archiving request equipment is located broadcasts the transaction; after receiving the archiving request transaction, the management node on the chain firstly confirms whether the transaction receiver of the archiving request transaction is in the managed node, and if not, the management node sends the archiving request transaction to other management nodes on the chain; if the transaction is in the authority management list, checking whether the archiving request device of the transaction is in the authority management list, if so, sending the transaction to the management device of the storage device, signing the archiving request transaction by the management device of the storage device, and sending the signed transaction to the management node of the management device so as to store the transaction in an interaction chain; at this time, the management device of the archive request device stores the parameters to be stored in the specified storage device by the data transfer protocol.
Preferably, the parameter request transaction is used for acquiring the parameters collected by the electronic device. Such as: a patient's doctor wishes to obtain blood pressure parameters of a patient's blood pressure monitor.
Preferably, the workflow of the parameter request transaction is as follows: the parameter request transaction is used for acquiring parameters acquired by the electronic equipment, and the workflow of the parameter request transaction is as follows: the parameter request equipment initiates a parameter request transaction and sends the parameter request transaction to the management equipment of the request equipment, and after the management equipment of the parameter request equipment confirms and converts the format of the transaction, the transaction is sent to the management node of the parameter request equipment; after receiving the transaction, the management node of the node where the parameter request equipment is located broadcasts the transaction; after receiving the parameter request transaction, the management node on the chain firstly confirms whether the requested equipment of the transaction of the parameter request transaction is in the nodes managed by the management node, and if not, the management node sends the parameter request transaction to other management nodes on the chain; if the transaction is in the authority management list, whether the parameter request equipment of the transaction is in the authority management list is checked, if the transaction is in the authority management list, the transaction is sent to the management equipment of the node, the requested node management equipment signs the parameter request transaction, the signed transaction is sent to the management node of the requested node management equipment so as to be stored in an interaction chain, and at the moment, the management equipment of the requested electronic equipment obtains the parameters from the requested electronic equipment and then sends the acquired parameters to the parameter request equipment through a data transmission protocol.
In the interaction chain, the parameters requesting transmission are not transmitted on the chain as a part of the transaction any more, so that the advantages of the block chain in aspects of decentralized certificate storage and verification are fully exerted on one hand, and the transaction data is prevented from being tampered; on the other hand, the scale of data on the chain is greatly reduced, and the requirements on the storage capacity and the computing capacity of equipment on the chain are reduced. Therefore, the interaction chain proposed in the present invention is a significant improvement over the prior art.
Example 5:
preferably, the consensus is completed by adopting a two-stage consensus mode, wherein the two-stage consensus mode comprises a first-stage consensus and a second-stage consensus.
Preferably, in the first level consensus, each class processes transactions within the class and forms new blocks. Each class sends the new block formed to the chain through the management node to facilitate secondary consensus.
Preferably, after the management period expires, a new round of election process of the management node is entered.
Preferably, in the management period, the management node ends the management period in advance when: the management node is failed and cannot continuously perform management responsibilities; is judged to be dishonest during management. And when the management period is ended in advance, entering a new round of election process of the management node.
Preferably, the above set value may be set to 60%, 65%, or 70%.
Preferably, the management node may be generated by one of three methods: generating a management node according to the credit score; generating a management node according to the amount of the pre-paid honest money; and comprehensively judging and generating the management node according to the credit score and the pre-paid honest.
In the prior art, all nodes can require consensus and form a new block by means of a workload certification algorithm and the like, and the large number of nodes directly causes efficiency reduction and results in the consumption of a large amount of computing power to solve a hash function to obtain the right of accounting. All transactions of one class in one consensus period can be verified by single consensus, and the efficiency of single consensus is effectively improved. In addition, primary consensus of various classes can be performed simultaneously, and the consensus efficiency is remarkably improved. In conclusion, compared with the prior art, the technical scheme provided by the invention improves the efficiency and reduces the resource waste.
Example 6:
preferably, the workflow for generating the primary consensus of the management node based on the credit score is that (1) the management node connects the transactions of all the nodes in the class managed by the management node to form a block to be subjected to consensus; (2) The management node sends a block to be identified to the managed node; (3) And other nodes in the same class check whether the blocks to be identified are correct, wherein the checked contents comprise whether the contents of each transaction are correct and whether the hash value of each transaction is correct. (4) If the management node is confirmed to be correct, sending a confirmation message to the management node; and if the confirmation is wrong, entering the punishment of the dishonest node. (5) And (2) when the confirmation information received by the management node reaches a set value, the management node submits the block in the step (1) to an interaction chain.
Preferably, in a punishment of the dishonest node in the step (4) of the primary consensus working process, if a problem is considered and the problem is caused by dishonest of a managed node, a negative information is sent to the management node and indicates the managed node as a dishonest node, and when the received instruction for the certain node reaches a set value, the managed node is determined to be dishonest. At this point, after deducting the program score, the management node is required to submit the corrected transaction, and the management node replans the consensus block and restarts the primary consensus. And correspondingly increasing credit scoring operation for all nodes which send negative information to the management node and indicate the dishonest nodes. And when the denial information is sent to the management node and the node of the dishonest node is not up to the set value, namely the instruction control is proved to be wrong, deducting the node credit score which sends the denial information and requires to replace the management node.
On one hand, the mechanism can encourage more nodes to monitor due to full-time responsibility, and prevent loss caused by dishonest nodes; on the other hand, it is possible to prevent some nodes from making an unreasonable instruction for awarding a credit score.
Preferably, the set value in the previous paragraph may be set to 60%, 65% or 70%.
Preferably, in a punishment of the dishonest node in the step (4) of the first-stage consensus working process, if a problem is considered and the problem is caused by dishonest of the management node, sending denial information to other nodes in the class and requiring replacement of the management node, and when the information requiring replacement of the management node reaches a set value, determining that the management node is dishonest. At this time, deducting the credit score corresponding to the dishonest management node, executing a management node replacement process, and after the management node is replaced, drawing up a consensus block by a new management node and restarting primary consensus again. And performing corresponding credit score increasing operation on all nodes which send the negative acknowledgement information and require to replace the management node. And when the information of the management node required to be replaced does not reach the set value, namely the instruction control is proved to be wrong, deducting the node credit score which sends the denial information and requires to replace the management node.
On one hand, the mechanism can effectively supervise the management nodes, can encourage more nodes to supervise due to full-time responsibility, and prevent huge loss caused by dishonest management nodes; on the other hand, it can prevent some nodes from issuing dishonest accusations for obtaining credit score rewards.
Preferably, the set value in the previous paragraph may be set to 60%, 65% or 70%.
Preferably, the second-level consensus workflow is that, after the interaction chain receives the new blocks formed by each class, the management node on the interaction chain checks whether the blocks submitted by each block are correct, sends a confirmation message if the blocks submitted by each block are correct, and sends a negative confirmation message if errors are found. If the management node sending the confirmation message reaches the designated value, the interaction chain links the blocks of all classes together at one time to form a new block of the interaction chain, broadcasts the finally formed block, and starts the next consensus period.
Preferably, if the management node that sent the confirmation message does not reach the specified value, the processing is performed in one of the following two ways: (1) When a block submitted by a class contains error transactions and the number of the nodes participating in confirmation in the class exceeds a set value, punishment is carried out on the class, specifically, credit scores of the nodes participating in confirmation in the class are deducted, and a management node is informed to submit the corrected block. (2) When a block submitted by a class contains wrong transactions and the number of nodes participating in confirmation in the class does not exceed a set value, judging that a management node is not honest, punishing the management node of the class, specifically, deducting credit scores of the management nodes in the class, executing a management node replacement process, and after the management node is replaced, drawing up a consensus block again by a new management node.
Preferably, the set value in the previous paragraph may be set to 60%, 65% or 70%.
Preferably, the method of generating a management node according to a credit score includes the steps of: (1) determining the election authority of each node according to the scores; (2) electing to generate a new management node; (3) And adjusting the credit scores of the nodes according to the situation during management.
Preferably, the step (1) of the process of generating the management node according to the credit score includes the steps of sorting the credit scores of all the nodes in the class to form a sorting table, and ranking the top 0% -a 1 The node is identified as a high credit node, can participate in election as a preparation management node, and has the right of election and elected at the same time; rank a 1 -a 2 The node of (1) is identified as a common node, has the option, and is not selected; rank a 2 -100% of the nodes are considered low credit nodes, have no election right, i.e. cannot participate in the election; wherein the content is 0 percent<a1<a2<100%。
Preferably, in the step (2) of the process of generating the management node according to the credit score, the first 0% -a is voted 1 And selecting a new management node from the nodes, and obtaining the node with the most approval tickets to select the management node. Nodes with authority to vote can vote for a vote, vote against a vote and vote for the abandon of the authority.
Preferably, in step (3) of the process of generating management nodes according to credit scores, the credit scores of the nodes are adjusted according to the following method: (1) And (3) the elected management node keeps honesty in the management period, after the management period is finished, adding 1 score of credit to the node which submits the bill to the management node, deducting 0.5 score of credit from the node which submits the bill to the management node, and not deducting nor adding the score of the abandoning right. (2) And when the elected management node is not honest in the management period, after the management period is finished, deducting the credit score of 0.5 for the node which submits the vote to the management node, adding the credit score of 1 for the node which submits the vote to the management node, and not deducting and not adding the credit score of the abandoning right. (3) And if the elected management node is not good faith in the management period, 5 points of credit score are deducted from the management node after the management period is finished. And adding 1 point to all nodes which send negative information in the first-level consensus and require to replace the management node. (4) And after the dishonest behavior of the managed node is confirmed, deducting 2 points of credit score from the managed node, and sending negative information to the management node and adding 0.5 point to the node indicating the dishonest node. (5) In the first-level consensus, when the negative information is sent to the management node and indicates that the node of the dishonest node does not reach the set value, the negative information is sent to the management node and indicates that the node of the dishonest node deducts 0.5 minutes. (6) In the first-level consensus, when the information of the management node required to be replaced does not reach the set value, 1 point is deducted from the node required to be replaced. (7) And when punishment is carried out on the class in the second-level consensus, the credit score of the node participating in the confirmation in the class is deducted by 1.
The specific analysis of the maliciousness degree of the node mainly considered by the limitation of increasing and deducting the score is as follows, as for the dishonest of the management node in the management period, the dishonest of the management node obviously has subjective intention and the dishonest of the management node causes great harm, so that the node is deducted by 5 points. For the dishonest of the managed node, the dishonest is also subjective and intentional, but the dishonest of the managed node causes less harm, so that the process of deducting 2 points is adopted for the dishonest of the managed node. For a management node to be dishonest during its management period, the node giving the dishonest management node a vote may be a mistake, and therefore, a process of deducting 0.5 minutes is taken for it. When negative information is sent to a management node and the node which sends out the dishonest node is indicated to not reach a set value, namely, the instruction control is not established, the node which sends out the instruction control is discussed in two situations, namely, the node which sends out the instruction control is a dishonest node and hopes to obtain credit score in a dishonest instruction control mode, and the node which sends out the instruction control is a goodwill node but causes the misinstruction control due to negligence. Strict punishment should be carried out on the first type of nodes, but the supervision enthusiasm of the second type of nodes can be frustrated by the fact that the punishment is too heavy. Therefore, the penalty of the node without instruction control is set to be 0.5, the value which can be obtained when the instruction control is established is not exceeded, at the moment, the monitoring enthusiasm that the dishonest node is punished and the benevolent node is contorted due to the over-punishment can be avoided.
According to the analysis, the credit score adjusting method has the advantages that credit score adding and subtracting scores are reasonably set, so that the credit score adjusting method with strong operability is provided, all nodes can be encouraged to adhere to honest, and malicious control can be effectively prevented.
Preferably, a default score is given to the newly added node, which may be set to 50, 60, or 70.
Example 7:
in the embodiment, the method for generating the management node according to the credit score is provided, but in actual operation, a better effect can be achieved by giving a material reward to the honest node and giving a material penalty to the dishonest node.
Preferably, the node can participate in the first-level consensus after pre-trading a certain amount of honesty.
Preferably, the loss due to the managed node's dishonest is small, while the loss due to the managed node's dishonest is large. Thus, the node of pre-honesty Jin Zuiduo acts as the management node.
Preferably, the specific workflow of generating the management node according to the amount of the pre-loyalty money is as follows: after the management period expires, the node of the pre-honesty Jin Zuiduo becomes the management node of the next management period. During the management period, the management node will end the management period in advance when: the management node is failed and cannot continuously perform management responsibilities; is judged to be dishonest during the management process. The managed node does not receive the information sent by the management node within the appointed time, namely the management node is considered to have a fault, and then a new round of the election process of the management node is started. At this time, the generation process of the management node is as follows: the honest of all nodes except the current management node are compared, and the node with the pre-honest Jin Zuiduo becomes the management node.
Preferably, the above set value may be set to 60%, 65%, or 70%.
The management node is selected according to the amount of the integrity money, so that the maximum amount of the integrity money pre-submitted by the management node is ensured, and the maximum amount of the confident money is ensured once the dishonest behavior occurs, so that the dishonest behavior of the management node can be effectively deterred, and huge loss caused by dishonest of the management node is prevented. In addition, for the promotion efficiency, the node voting link is omitted by directly comparing the amounts of the honest money, the election program is further simplified, and the quick generation of the management nodes is facilitated.
Preferably, the workflow of generating a level of consensus of the management nodes based on the amount of pre-paid honesty is the same as in example 6.
Preferably, in a punishment of the dishonest node in the step (4) of the primary consensus working process, if a problem is considered and the problem is caused by dishonest of a managed node, a negative information is sent to the management node and indicates the managed node as a dishonest node, and when the received instruction for the certain node reaches a set value, the managed node is determined to be dishonest. At this time, the pre-integrity of the dishonest managed node is not collected, the dishonest managed node is required to re-pre-integrity and submit the corrected transaction, and the management node replans the consensus block and restarts a level of consensus. For the non-acceptable pre-loyalty money, all the nodes which send the repudiation information to the management node and indicate the malicious node are distributed according to the proportion of paying the loyalty money.
The working method can effectively supervise the managed nodes, guide all the nodes to do honest behaviors, and actively check errors and report the errors.
Preferably, the allocating the pre-loyalty money which is not paid according to the proportion of paying the loyalty money specifically comprises: assuming that the amount of the non-receivable honesty is M, the number of the nodes which send the denial information and require to replace the management node is N, and the honesty of each node in the N nodes is N 1 、N 2 …N n Then the pre-loyalty point that can be obtained by the kth node is M k =M*N k /(N 1 +N 2 …+N n )。
By adopting the proportional distribution mode, all the nodes can be encouraged to pay more integrity, and the paying of more integrity helps to keep the nodes integrity, so the distribution mode is favorable for promoting the nodes to keep integrity.
Preferably, the above set value may be set to 60%, 65%, or 70%.
Preferably, in a punishment of the dishonest node in the step (4) of the primary consensus working process, if a problem is considered and the problem is caused by dishonest of the management node, sending denial information to other nodes in the class and requiring replacement of the management node, and when the information requiring replacement of the management node reaches a set value, determining that the management node is dishonest. At the moment, the pre-integrity of the dishonest management node is not collected, the dishonest management node is required to pay the integrity again, the management node replacement process is executed, and after the management node is replaced, the new management node plans the consensus block again and starts the first-level consensus again. For the non-acceptable pre-loyalty money, all the nodes which send the negative information and require to replace the management node are distributed according to the proportion of the loyalty money. On one hand, the mechanism can effectively supervise the management node and prevent huge loss caused by the dishonest management node; on the other hand, more nodes can be encouraged to monitor due to full time.
Preferably, the above set value may be set to 60%, 65%, or 70%.
Preferably, the amount of loyalty money has a minimum requirement, but no upper limit. The integrity of all nodes is not guaranteed due to too low integrity cost, and the lowest cost of the integrity nodes can be guaranteed due to the minimum requirement.
Preferably, the second-level consensus workflow is that, after the interaction chain receives the new blocks formed by each class, the management node on the interaction chain checks whether the blocks submitted by each block are correct, sends a confirmation message if the blocks submitted by each block are correct, and sends a negative confirmation message if errors are found. If the management node sending the confirmation message reaches the designated value, the interaction chain links the blocks of all classes together at one time to form a new block of the interaction chain, broadcasts the finally formed block, and starts the next consensus period.
Preferably, if the management node that sent the confirmation message does not reach the specified value, the processing is performed in one of the following two ways: (1) When a block submitted by a class contains error transactions and the number of the nodes participating in confirmation in the class exceeds a set value, punishing the class is carried out, specifically, the integrity of the nodes participating in confirmation in the class is not received, the integrity is required to be re-paid by the nodes participating in confirmation, and the management node is informed to submit the corrected block. For a non-repudiation, it is assigned by the management node that found the error on the interaction chain. (2) When a block submitted by a class contains error transactions and the number of nodes participating in confirmation in the class does not exceed a set value, the management node is judged to be dishonest, the management node of the class is punished, specifically, the honesty of the dishonest management node is not collected, the honesty is paid again, a management node replacement process is executed, and after the management node is replaced, a consensus block is drawn up again by a new management node.
Preferably, the above set value may be set to 60%, 65%, or 70%.
Preferably, for a non-repudiation loyalty, the management node that found the error on the interaction chain is allocated proportionally to the repudiation loyalty.
In the second level consensus, because only the management node can participate in the allocation of the confident pre-loyalty money, more managed nodes are willing to participate in the competition of the management node by increasing the amount of the pre-loyalty money. Furthermore, only the trustworthy nodes that found the error may be allocated. Therefore, the system provided by the invention can guide the management node to keep integrity to participate in the distribution of the confident pre-integrity money, and avoids the high pre-integrity money from being confident due to the dishonest.
Example 8:
in order to fully utilize the advantages of the two management node generation methods in embodiment 6 and embodiment 7, the present embodiment combines the features of the two management node generation methods to provide a hybrid management node generation method.
Preferably, the workflow of the first-level consensus of the hybrid-based management node generation method is the same as that of embodiment 6.
Preferably, in a punishment of the dishonest node in the step (4) of the primary consensus working process, if a problem is considered and the problem is caused by dishonest of a managed node, a negative information is sent to the management node and indicates the managed node as a dishonest node, and when the received instruction for the certain node reaches a set value, the managed node is determined to be dishonest. At this time, the pre-loyalty points of the dishonest managed nodes are not collected, the pre-loyalty points are re-collected, the corresponding credit scores are deducted, the corrected transaction is required to be submitted, the management nodes draft the consensus blocks again, and primary consensus is started again. And correspondingly increasing credit scoring operation for all nodes which send negative information to the management node and indicate the dishonest nodes. And when the negative confirmation information is sent to the management node and the node of the dishonest node does not reach the set value, namely the instruction control is proved to be wrong, deducting the node credit score which sends the negative confirmation information and requires to replace the management node. For the non-acceptable pre-loyalty money, all the nodes which send negative information to the management node and indicate the malicious node are distributed according to the proportion of paying the loyalty money.
Preferably, the set value in the previous paragraph may be set to 60%, 65% or 70%.
Preferably, in a punishment of the dishonest node in the step (4) of the first-stage consensus working process, if a problem is considered and the problem is caused by dishonest of the management node, sending denial information to other nodes in the class and requiring replacement of the management node, and when the information requiring replacement of the management node reaches a set value, determining that the management node is dishonest. At the moment, the pre-integrity fund of the dishonest management node is not collected, the dishonest management node is required to pay the integrity fund again, the corresponding credit score of the dishonest management node is deducted, the management node replacement process is executed, and after the management node is replaced, a consensus block is drawn up again by a new management node and primary consensus begins again. And performing corresponding credit score increasing operation on all nodes which send the denial information and require to replace the management node. And when the information of the management node required to be replaced does not reach the set value, namely the instruction control is proved to be wrong, deducting the node credit score which sends the denial information and requires the management node to be replaced. For the non-acceptable pre-loyalty money, all the nodes which send the negative information and require to replace the management node are distributed according to the proportion of the loyalty money.
Preferably, the set value in the previous paragraph may be set to 60%, 65% or 70%.
Preferably, the second-level consensus workflow is that after the interaction chain receives the new blocks formed by each class, the management node on the interaction chain checks whether the blocks submitted by each block are correct, sends a confirmation message if the blocks are correct, and sends a denial message if errors are found. If the management node sending the confirmation message reaches the designated value, the interaction chain links the blocks of all classes together at one time to form a new block of the interaction chain, broadcasts the finally formed block, and starts the next consensus period.
Preferably, if the management node that sent the confirmation message does not reach the specified value, the processing is performed in one of the following two ways: (1) When a block submitted by a class contains error transactions and the number of nodes participating in confirmation in the class exceeds a set value, punishment is carried out on the class, specifically, integrity of the nodes participating in confirmation in the class is not received, the nodes participating in confirmation are required to pay the integrity again, credit scores of the nodes participating in confirmation in the class are deducted, and a management node is informed to submit the corrected block. (2) When a block submitted by one class comprises error transactions and the number of the nodes participating in confirmation in the class does not exceed a set value, judging that the management node is not honest, punishing the management node of the class, specifically, not receiving the honesty of the dishonest management node, requiring the dishonest management node to pay the honesty again, deducting the credit score of the management node in the class, executing a management node replacement process, and after the management node is replaced, drawing up a consensus block again by a new management node.
Preferably, the set value in the previous paragraph may be set to 60%, 65% or 70%.
Preferably, the method of generating a management node according to a credit score includes the steps of: (1) determining the election authority of each node according to the scores; (2) Determining a management node in the nodes with the elected right according to the node pre-loyalty money amount; (3) And adjusting the credit score of each node according to the situation during management.
Preferably, the step (1) of generating the hybrid management node includes the steps of sorting the credit scores of all the nodes in the class to form a sorting table, and ranking the top 0% -b 1 The node(s) of (1) is identified as a high-credit node and can participate in elections as a preliminary management node, wherein 0 percent of the total<b 1 <100%。
Preferably, in the step (2) of generating the hybrid management node, the credit score is ranked as 0% -b 1 The nodes in (2) are sorted according to the amount of the pre-loyalty money, and the electing management node with the highest amount of the pre-loyalty money is selected.
Preferably, the score adjustment method in the hybrid management node generation step (3) is the same as that in embodiment 6.
Preferably, a default score is given to newly added nodes, which may be set to 50, 60, or 70.
By adopting the management node generation method provided by the embodiment, the waste of time and calculation power caused by organizing voting can be avoided, and a new management node can be determined through sequencing. In addition, the method provided in this embodiment ensures that the node serving as the management node has a higher trust score, that is, a higher reliability; on the other hand, the node with the highest integrity money amount can serve as the management node to ensure that the management node pays the maximum cost once the management node performs the dishonest action, so that the conversion from the integrity node to the dishonest node is further prevented.
Example 9
In order to fully utilize the advantages of the two management node generation methods in embodiment 6 and embodiment 7, the present embodiment combines the features of the two methods to provide a hybrid management node generation method.
Preferably, the workflow of the first-level consensus of the hybrid-based management node generation method is the same as that of embodiment 8.
Preferably, the punishment of the dishonest node in step (4) of the one-stage consensus operation process is the same as that of embodiment 8.
Preferably, the workflow of the second-level consensus is the same as in example 8.
Preferably, the generation step of the hybrid management node is as follows: (1) determining the election authority of each node according to the scores; (2) Determining a management node in the nodes with the elected right according to the node pre-loyalty money amount and the credit score; (3) And adjusting the credit scores of the nodes according to the situation during management.
Preferably, the step (1) of generating the hybrid management node includes the steps of sorting the credit scores of all the nodes in the class to form a sorting table, and ranking the top 0% -c 1 The node(s) of (1) is identified as a high-credit node and can participate in elections as a preliminary management node, wherein 0 percent of the total<c 1 <100%。
Preferably, in the step (2) of generating the hybrid management node, assuming that there are V nodes with credit scores of 0% -c1 ranked first, first obtaining a credit score ranking list a of the V nodes, and then obtaining a credit score ranking list B of the V nodes for paying the honest money amount, the comprehensive score of the node W is:
Z=s 1 *A W +s 2 *B W
wherein: s 1 、s 2 For credit scoring coefficient, loyalty factor, s 1 >0,s 2 >0,s 1 +s 2 =1;
A W The score corresponding to the ranking rank in the credit scores of the node W is the score corresponding to the 1 st ranking rank, and the score corresponding to the 1 st ranking rank is the highest, and is sequentially reduced by 1, for example: the score corresponding to the 1 st name is V, the score corresponding to the 2 nd name is V-1, the score corresponding to the 3 rd name is V-2, and the rest can be done in the same way;
B W the score of the 1 st name is the score corresponding to the ranking name of the node W in the honest amount, and the score is reduced by 1 in sequence, for example: the score corresponding to the 1 st name is V, the score corresponding to the 2 nd name is V-1, the score corresponding to the 3 rd name is V-2, and the rest can be done in the same way;
and sorting according to the magnitude of the comprehensive score Z value, and selecting the node with the maximum comprehensive score Z value as the selected management node.
Preferably, s can be used in the case of low mutual trust between nodes 1 The value is set to be small, s 2 The value is set to be larger. For example, mixing s 1 The value is set to 0.2 and the s2 value is set to 0.8. Preferably, s can be assigned to the node in case of complete distrust between the nodes 1 The value is set to 0.1,s 2 Set the value to 0.9, even s 1 The value is set to 0,s 2 The value is set to 1.
Preferably, s can be used under the condition of higher mutual trust degree between nodes 1 The value is set to be small, s 2 The value is set to be larger. For example, mixing s 1 The value is set to 0.8,s 2 The value is set to 0.2.
Preferably, the adjustment method of credit score in the hybrid management node generation step (3) is the same as that in embodiment 8.
Preferably, a default score is given to newly added nodes, which may be set to 50, 60, or 70.
By adopting the technical scheme in the embodiment, the corresponding credit scoring coefficient and the corresponding payment honest coefficient can be dynamically adjusted according to the trust condition between the nodes so as to meet the requirement of risk control. Specifically, in the case where the degree of mutual trust is low, s is increased 2 And the value ensures the management node election strategy which takes the honest money amount as the guide. Correspondingly, under the condition of higher mutual trust degree, the mutual trust degree is improveds 1 The value ensures the management node election strategy taking the credibility as the guide, and can reduce the capital pressure caused by the high integrity Jin Duijie point under the condition of ensuring the integrity of the management node.
The above embodiments are only used to illustrate the present invention and not to limit the technical solutions described in the present invention, and although the present invention has been described in detail in the present specification with reference to the above embodiments, the present invention is not limited to the above specific embodiments, and therefore, any modifications or equivalents of the present invention may be made; but all technical solutions and modifications thereof without departing from the spirit and scope of the present invention are encompassed in the claims of the present invention.

Claims (4)

1. An electronic device local area management system based on a block chain technology is characterized in that: the system comprises an equipment management chain, wherein the equipment management chain is provided with at least one management equipment, and the management equipment is used for managing the transaction of the equipment management chain;
the management content of the management equipment comprises block creation, key management, archive request transaction, parameter request transaction and interaction chain transaction conversion; the device management chain transaction includes the following data: (1) a transaction number; (2) a transaction type; (3) an address of the target electronic device; (4) whether the transaction is an interaction chain transaction; each block comprises a first part, a second part and a transaction part; the first two parts of the block are a first part and a second part, and the transaction part is arranged behind the first two parts; the first part stores the hash value of the previous block, and the second part is used for authorizing the newly added electronic equipment and recording the authority management method of the equipment owner for the electronic equipment; the process of block creation is: when a new electronic device obtains the consent of a device management chain owner to enter the device management chain, creating a block for the new electronic device, wherein the block is uniquely corresponding to the electronic device; the key management process comprises the following steps: when a new electronic device obtains the agreement of a device management chain owner to enter the device management chain, the management device issues a secret key for the electronic device, wherein the secret key is used for encrypting the transaction between the electronic device and the management device; when an electronic device is determined as a dishonest device or an authorization period expires, the management device logs off a previously issued key; the process of the parameter request transaction is as follows: the electronic equipment which needs to acquire the parameters sends a parameter request transaction to the management equipment, the management equipment sends a key to the electronic equipment which initiates the request after receiving the transaction, and the electronic equipment which initiates the request completes access through the key; according to the data request frequency, the method is divided into single access and repeated access, and the management of the key is divided into single access and long-term access; for single access, a single key is issued, and the key is only used for completing acquisition of single data; for long-term access, a long-term key is issued and repeatedly acquired within a certain period by the key; the archiving request transaction process comprises the following steps: the electronic device requiring archiving sends a transaction requesting archiving to the management device, the management device sends a key to the electronic device initiating the request after receiving the transaction, and the electronic device completes the storage action in the storage unit through the key; when the electronic equipment initiating the parameter request comes from the interactive chain, because the transaction structures of the equipment management chain and the interactive chain are different, the block of the equipment management chain cannot directly account for the transaction of the interactive chain, and at the moment, the management equipment needs to perform structure conversion on the transaction of the interactive chain so that the transaction of the interactive chain conforms to the structure standard of the equipment management chain; after the transaction is completed, the management device places the transaction related to the electronic device in the block corresponding to the electronic device and updates the transaction to the device management chain.
2. The system according to claim 1, wherein the system comprises: the management device is determined by the device management chain master.
3. The system according to claim 2, wherein the system comprises: the equipment management chain is provided with a plurality of pieces of electronic equipment, and each piece of electronic equipment is associated with one block; the connection of all blocks constitutes a device management chain.
4. An electronic device management system based on the blockchain technology, which manages all electronic devices of a single user by using the electronic device local area management system based on the blockchain technology as claimed in any one of claims 1 to 3.
CN202010399212.7A 2020-05-12 2020-05-12 Electronic equipment local area management system based on block chain technology Active CN111741062B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010399212.7A CN111741062B (en) 2020-05-12 2020-05-12 Electronic equipment local area management system based on block chain technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010399212.7A CN111741062B (en) 2020-05-12 2020-05-12 Electronic equipment local area management system based on block chain technology

Publications (2)

Publication Number Publication Date
CN111741062A CN111741062A (en) 2020-10-02
CN111741062B true CN111741062B (en) 2023-04-18

Family

ID=72647162

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010399212.7A Active CN111741062B (en) 2020-05-12 2020-05-12 Electronic equipment local area management system based on block chain technology

Country Status (1)

Country Link
CN (1) CN111741062B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109711184A (en) * 2018-12-28 2019-05-03 国网电子商务有限公司 Block chain data access control method and device based on attribute encryption
US10326802B1 (en) * 2018-12-04 2019-06-18 Xage Security, Inc. Centrally managing data for orchestrating and managing user accounts and access control and security policies remotely across multiple devices
CN110099055A (en) * 2019-04-29 2019-08-06 北京工业大学 Internet of Things service architecture based on lightweight block chain node
CN110471986A (en) * 2019-07-31 2019-11-19 阿里巴巴集团控股有限公司 Bill real name based on block chain gets method, apparatus and electronic equipment

Family Cites Families (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11979392B2 (en) * 2017-07-17 2024-05-07 Comcast Cable Communications, Llc Systems and methods for managing device association
CN107895111B (en) * 2017-10-11 2021-06-11 西安电子科技大学 Internet of things equipment supply chain trust system management method, computer program and computer
US20190229930A1 (en) * 2018-01-24 2019-07-25 Comcast Cable Communications, Llc Blockchain for the connected home
CN109104311B (en) * 2018-08-06 2021-08-31 腾讯科技(深圳)有限公司 Block chain-based device management method, apparatus, medium, and electronic device
CN109241778A (en) * 2018-08-13 2019-01-18 阿里巴巴集团控股有限公司 A kind of public transport data processing method and device based on block chain
CN109302415B (en) * 2018-11-09 2019-11-01 四川虹微技术有限公司 A kind of authentication method, block chain node and storage medium
CN109769024A (en) * 2019-01-18 2019-05-17 东喜和仪(珠海市)数据科技有限公司 Internet of Things construction method and device based on data trade block chain
CN110309634B (en) * 2019-04-04 2020-12-22 深圳大通实业股份有限公司 Credible advertisement data management system based on block chain
CN110458558A (en) * 2019-07-04 2019-11-15 重庆金融资产交易所有限责任公司 Data encryption method, device and computer equipment based on block chain
CN110598446A (en) * 2019-09-16 2019-12-20 腾讯科技(深圳)有限公司 Block chain based test method and device, storage medium and computer equipment
CN110912707B (en) * 2019-11-22 2021-09-10 腾讯科技(深圳)有限公司 Block chain-based digital certificate processing method, device, equipment and storage medium

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10326802B1 (en) * 2018-12-04 2019-06-18 Xage Security, Inc. Centrally managing data for orchestrating and managing user accounts and access control and security policies remotely across multiple devices
CN109711184A (en) * 2018-12-28 2019-05-03 国网电子商务有限公司 Block chain data access control method and device based on attribute encryption
CN110099055A (en) * 2019-04-29 2019-08-06 北京工业大学 Internet of Things service architecture based on lightweight block chain node
CN110471986A (en) * 2019-07-31 2019-11-19 阿里巴巴集团控股有限公司 Bill real name based on block chain gets method, apparatus and electronic equipment

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
基于区块链的物联网管理系统设计与实现;张弘;《中国优秀硕士学位论文全文数据库 (信息科技辑) 》;20200315;全文 *

Also Published As

Publication number Publication date
CN111741062A (en) 2020-10-02

Similar Documents

Publication Publication Date Title
AU2022202133B2 (en) Systems and methods for creating a universal record
CN111695994B (en) Block chain consensus method and system based on credit score
US11710190B2 (en) Blockchain subrogation claims with arbitration
CN107220130B (en) Method, device and system for realizing information consensus at nodes of block chain
CN111727450B (en) Zxfoom Block chain Block block chain event communication of (a) verification of
CN110263024A (en) Data processing method, terminal device and computer storage medium
US10230711B2 (en) System and methods for enhancing authentication procedures in an anti-fraud environment
CN109325848B (en) Debt collection urging method and device based on block chain and computer readable storage medium
JP6075153B2 (en) Processing server and transfer management method
CN106845210A (en) Event authentication method and apparatus
CN110602217B (en) Block chain-based alliance management method, device, equipment and storage medium
CN112685766B (en) Enterprise credit investigation management method and device based on block chain, computer equipment and storage medium
CN108769230A (en) Transaction data storage method, device, server and storage medium
CN105590215A (en) Device and method for data processing on-line processing of date mistakes between mechanisms
CN110599355A (en) Block chain-based vehicle insurance information system, insurance policy registration method and claim settlement method
CN111695997A (en) Block chain consensus method and system based on node credit scoring and pre-loyalty points
CN111741062B (en) Electronic equipment local area management system based on block chain technology
CN113159849B (en) Carbon transaction system based on green coin and blue coin system
CN101356776A (en) Efficient method and system for secure business-to-business transaction
CN110930158A (en) Block chain DPoS common recognition method based on reward and punishment mechanism
CN111741061B (en) Electronic equipment wide area management system based on block chain technology
CN111695995A (en) Electronic equipment management system based on block chain technology
CN111695996A (en) Block chain consensus method and system based on pre-loyalty gold
CN111899094A (en) Block chain consensus method and system based on node credit scoring and pre-loyalty points
CN107424067A (en) One kind holds collection of letters breath Online Processing System and method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20230323

Address after: 3rd Floor, Building A2, Lugu Science and Technology Innovation and Entrepreneurship Park, No. 1698, Yuelu West Avenue, Changsha High-tech Development Zone, Changsha, Hunan Province 410000

Applicant after: Hunan Peninsula Medical Technology Co.,Ltd.

Address before: 610000 Shunsheng Road, Zhengxing Street, Tianfu New District, Chengdu City, Sichuan Province

Applicant before: Chengdu Xinyu Matrix Technology Co.,Ltd.

GR01 Patent grant
GR01 Patent grant