CN112822279A - Monitoring method and device based on intelligent sensing and trusted storage - Google Patents

Monitoring method and device based on intelligent sensing and trusted storage Download PDF

Info

Publication number
CN112822279A
CN112822279A CN202110045101.0A CN202110045101A CN112822279A CN 112822279 A CN112822279 A CN 112822279A CN 202110045101 A CN202110045101 A CN 202110045101A CN 112822279 A CN112822279 A CN 112822279A
Authority
CN
China
Prior art keywords
node
contract
enterprise
data
sensor
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110045101.0A
Other languages
Chinese (zh)
Other versions
CN112822279B (en
Inventor
朱晓宁
段珺轲
谭海燕
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jingying Digital Technology Co Ltd
Original Assignee
Jingying Digital Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jingying Digital Technology Co Ltd filed Critical Jingying Digital Technology Co Ltd
Priority to CN202110045101.0A priority Critical patent/CN112822279B/en
Publication of CN112822279A publication Critical patent/CN112822279A/en
Application granted granted Critical
Publication of CN112822279B publication Critical patent/CN112822279B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1095Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B21/00Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
    • G08B21/02Alarms for ensuring the safety of persons
    • G08B21/12Alarms for ensuring the safety of persons responsive to undesired emission of substances, e.g. pollution alarms
    • G08B21/16Combustible gas alarms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Combustion & Propulsion (AREA)
  • Medical Informatics (AREA)
  • Chemical & Material Sciences (AREA)
  • Computing Systems (AREA)
  • Environmental & Geological Engineering (AREA)
  • Toxicology (AREA)
  • Business, Economics & Management (AREA)
  • Emergency Management (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention provides a monitoring method and a device based on intelligent perception and trusted storage, wherein the method comprises the following steps: when the enterprise node receives monitoring data uploaded by the sensor, the identity address of the sensor is verified; if the identity address passes the verification, calling a record to record the monitoring data about the enterprise node, and synchronizing the data to other nodes in the block chain; and the evaluation mechanism node calls monitoring data stored in the record contract and executes risk evaluation according to the monitoring data. According to the embodiment of the invention, the automatic and transparent execution processes of registering the contract, recording the contract and evaluating the contract are intelligently monitored through the accurate and reliable data sensing of the sensor and the safe and tamper-proof storage mode of the block chain, so that the safety and credibility of the monitored data from the source to the storage process are ensured, the flow of manually analyzing the data is simplified, the expenditure of manpower is reduced, and the management efficiency is improved.

Description

Monitoring method and device based on intelligent sensing and trusted storage
Technical Field
The invention relates to the technical field of intelligent monitoring, in particular to a monitoring method and a monitoring device based on intelligent sensing and trusted storage.
Background
The supply of coal resources is an important force for supporting the economic development of China, and the detection and early warning of the coal mine construction environment are the basis for ensuring the safe production. In the coal mining and production process, the accident rate can be greatly reduced by effective detection and timely early warning.
At present, some coal mine enterprises have insufficient knowledge on coal mine detection and early warning, most underground mines still use independent systems with single functions to carry out various detections (such as gas monitoring, dust detection and the like), the independent systems cannot meet the management requirements of the coal mine safety production process, and the reliability of monitoring data is questioned to a certain extent.
Disclosure of Invention
The invention solves the problems of low reliability of monitoring data and low management efficiency of the existing monitoring method.
In order to solve the above problems, the present invention provides a monitoring method based on intelligent sensing and trusted storage, which is applied to a node in a block chain, and the method includes: when the enterprise node receives monitoring data uploaded by a sensor, the identity address of the sensor is verified; if the identity address passes the verification, calling a record to be recorded and recording the monitoring data in the enterprise node, and synchronizing data to other nodes in the block chain; the evaluation organization node calls an evaluation contract to call monitoring data stored in the enterprise node, and carries out risk evaluation according to the monitoring data.
Optionally, the method further comprises: the admission mechanism node establishes a registration contract and issues the registration contract to the block chain; the admission mechanism node calls the registration contract to add an enterprise account address allowing registration of a recording contract into an enterprise account list; when the enterprise node calls the recording contract, verifying whether the account address of the enterprise node exists in the enterprise account list; if the account address exists in the enterprise account list, creating a recording contract corresponding to the enterprise node; the record contract includes an identity address of a sensor corresponding to the enterprise node.
Optionally, the method further comprises: when monitoring that the monitoring data exceeds the standard, the enterprise node generates alarm information; and inputting the alarm information into the enterprise node, and synchronizing the alarm information to other nodes in the block chain.
Optionally, the method further comprises: the evaluation organization node receives query requests of other nodes; and the evaluation mechanism node feeds back the current state information of the evaluation contract and/or the monitoring data called by the evaluation contract and the identity address of the corresponding sensor to other nodes according to the query request.
Optionally, the method further comprises: when a new node sends a joining request to an admission mechanism node, the admission mechanism node audits the joining request; and if the addition request passes the verification, the admission authority node issues a certificate for authenticating the identity of the new node.
Optionally, the identity address includes an account address of an enterprise node corresponding to the sensor and a unique identifier of the sensor.
Optionally, the monitoring data is obtained by processing at least one of the following raw data periodically collected by the sensor: data analysis, image recognition and data denoising.
The invention provides a monitoring device based on intelligent perception and trusted storage, which is applied to nodes in a block chain, and comprises: the enterprise node verification module is used for verifying the identity address of the sensor when monitoring data uploaded by the sensor is received; the data entry module is used for calling, recording and closing the enterprise node to enter the monitoring data and synchronizing data to other nodes in the block chain if the identity address passes the verification; and the evaluation mechanism node monitoring module is used for calling an evaluation contract to call the monitoring data stored in the enterprise node and executing risk evaluation according to the monitoring data.
Optionally, the apparatus further includes an admission authority node registration module configured to: establishing a registration contract and issuing the registration contract to the block chain; calling the registration contract to add an enterprise account address allowing registration of a recording contract into an enterprise account list; when the enterprise node calls the recording contract, verifying whether the account address of the enterprise node exists in the enterprise account list; if the account address exists in the enterprise account list, creating a recording contract corresponding to the enterprise node; the record contract includes an identity address of a sensor corresponding to the enterprise node.
Optionally, the apparatus further comprises an enterprise node alarm module, configured to: when monitoring that the monitoring data exceeds the standard, generating alarm information; and inputting the alarm information into the enterprise node, and synchronizing the alarm information to other nodes in the block chain.
According to the embodiment of the invention, the automatic and transparent execution processes of registering the contract, recording the contract and evaluating the contract are intelligently monitored through the accurate and reliable data sensing of the sensor and the safe and tamper-proof storage mode of the block chain, so that the safety and credibility of the monitored data from the source to the storage process are ensured, the flow of manually analyzing the data is simplified, the expenditure of manpower is reduced, and the management efficiency is improved.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the provided drawings without creative efforts.
FIG. 1 is a monitoring method based on smart sensing and trusted storage according to an embodiment of the present invention;
FIG. 2 is a flow diagram of an intelligent contract application in one embodiment of the invention;
FIG. 3 is a schematic diagram of a distributed system according to an embodiment of the present invention;
FIG. 4 is a block structure diagram of a blockchain according to an embodiment of the present invention;
FIG. 5 is a diagram illustrating a data storage structure in a node according to an embodiment of the present invention;
FIG. 6 is a schematic flow chart of a coal mine monitoring method based on intelligent sensing and trusted storage according to an embodiment of the present invention;
fig. 7 is a schematic structural diagram of a monitoring device based on smart sensing and trusted storage according to an embodiment of the present invention.
Description of reference numerals:
701-enterprise node verification module; 702-a data entry module; 703-evaluation agency node monitoring module.
Detailed Description
In order to make the aforementioned objects, features and advantages of the present invention comprehensible, embodiments accompanied with figures are described in detail below. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
With the intelligent development of the functions of the sensors, the intelligent sensors provide the functions of error compensation, data storage, remote synchronization and the like on the basis of the traditional sensors. The block chain technology provides an excellent solution to the problem of trusted storage of data. Therefore, the embodiment of the invention provides a monitoring method based on intelligent sensing and trusted storage by combining the two technologies.
Illustratively, the present embodiment is based on accurate, reliable data perception by smart sensors; a secure, tamper-resistant storage mode of the blockchain; the automatic and transparent execution process of the intelligent contract provides an efficient and credible monitoring and processing method.
Fig. 1 is a monitoring method based on smart sensing and trusted storage, which is applied to a node in a block chain, in an embodiment of the present invention, and includes the following steps:
and S102, when the enterprise node receives the monitoring data uploaded by the sensor, the identity address of the sensor is verified.
The sensor can be a gas sensor, a camera, a gyroscope and other environment sensing devices. The monitoring data is obtained by processing at least one of the following raw data periodically acquired by the sensor: data analysis, image recognition and data denoising. The identity address comprises an account address of the enterprise node corresponding to the sensor and a unique identifier of the sensor.
Taking an enterprise node as a coal mine enterprise as an example, the coal mine enterprise uses the intelligent sensor, which has a certain information processing function, can modify various deterministic system errors (such as nonlinear errors of input and output of the sensor, zero errors and the like) through software, and can properly compensate random errors and reduce noise, thereby improving the accuracy of the sensor. Meanwhile, the system has the functions of diagnosis, calibration and data storage, and also has the self-adaptive function to the intelligent structure system. The intelligent sensor can also enlarge the measuring and using range through programming, has certain self-adapting capability, correspondingly changes the form of the program reverse output data according to the change of the detected object or condition, has the function of a digital communication interface, is directly sent to a remote computer for processing, has various data output forms, and is suitable for various application systems.
When a new intelligent sensor accesses the blockchain network, a unique and exclusive representation can be generated through the account address of the corresponding enterprise node and the unique identifier (such as hardware identifier and the like) of the intelligent sensor, and the unique representation can be used as the identity address of the intelligent sensor in the blockchain network.
Each node can inquire the corresponding enterprise through the identity address of the intelligent sensor. The intelligent sensor can periodically collect environmental information, remove noise from the collected data through the error compensation function of the intelligent sensor, and send the data to a node in the block chain network, and after the data is collected by the node, the data is uplink-stored after the identity verification of a data source passes.
And S104, if the identity address passes the verification, calling a recording contract to record monitoring data in the enterprise node, and synchronizing data to other nodes in the block chain.
Specifically, the record contract contains the account address of the enterprise node that registered the record contract, and the identity address of the smart sensor belonging to the enterprise. And when data is input, the identity address of the contract judgment sensor and the effective time of the contract are called and recorded. After the verification is passed, the sensor data is stored in the record contract account according to the corresponding format, and the data is synchronized to other nodes in the block chain through a consensus algorithm.
And S106, the evaluation mechanism node calls the monitoring data stored in the record contract and executes risk evaluation according to the monitoring data.
Optionally, the evaluation contract is obtained by conversion according to a related evaluation algorithm preset by an evaluator. Then, the evaluation mechanism node calls monitoring data in the record contract, and risk analysis and safety assessment are automatically executed through design rules in the evaluation contract.
The evaluators can be industry experts hired or invited by enterprises and professionals of evaluation organizations, and comprehensive risk evaluation rules, production safety new rules and the like are designed according to the evaluators. The evaluation contract is, for example, an intelligent contract for evaluating the safety of the coal mine production environment, an intelligent contract for evaluating the comprehensive risk, or the like. For example, a risk assessment contract, environmental monitoring data in the recording contract is called, and an algorithm is executed to calculate a risk coefficient.
The evaluator can design a plurality of different evaluation contracts aiming at different problems in different time periods, and the same evaluation contract can be repeatedly called by the evaluation mechanism node for a plurality of times to calculate the evaluation results under different data volumes.
According to the monitoring method based on intelligent sensing and trusted storage, the monitoring data is intelligently monitored from the source to the storage process through accurate and reliable data sensing of the sensor, the safe and tamper-proof storage mode of the block chain, and the automatic and transparent execution processes of contract registration, contract recording and contract evaluation, so that the monitoring data is ensured to be safe and trusted, the flow of manually analyzing the data is simplified, the expenditure of manpower is reduced, and the management efficiency is improved.
Taking a coal mine enterprise as an example, after being verified by an admission authority, the coal mine enterprise can register and issue a recording contract for recording sensor data and an evaluation contract for evaluating the safety of the coal mine production environment. When the intelligent sensor sends the environmental data regularly, the data can be recorded into a recording contract as the basis of safety evaluation. Evaluating contracts may invoke recording of sensor data in the contract, with its designed assessment rules to automate the execution of risk analysis and security assessments.
Intelligent contracts in blockchains can be divided into registry contracts, recording contracts, and evaluation contracts. Referring to the intelligent contract application flow diagram shown in fig. 2, registration contracts are established and issued by the admission authority onto the chain. The registration contract includes an address account of an admission authority issuing the registration contract and a list of enterprise accounts that allow registration of the registration contract. The registration contract comprises two functions of authority management and recording contract registration, the authority management function only accepts the request sent by the account address corresponding to the admission mechanism, and provides a function of adding the enterprise account address allowing the recording contract to be registered into the enterprise account list.
Based on the recording contract registration function of the registration contract, the method can comprise the following steps:
the admission mechanism node establishes a registration contract and issues the registration contract to the block chain; the admission mechanism node calls a registration contract to add an enterprise account address allowing the registration of the record contract into the enterprise account list; when the enterprise node calls a recording contract, verifying whether the account address of the node exists in an enterprise account list or not; and if the account address exists in the enterprise account list, creating a recording contract corresponding to the enterprise node. The record contract includes the identity address of the sensor to which the enterprise node corresponds.
When an enterprise node calls a contract registration function, a registration contract date firstly checks whether an account address of a sent message exists in an enterprise account list, and if not, service is refused; if the contract is registered, the next process is carried out, wherein the next process comprises setting the effective time of the registered recording contract, inputting data into the identity address of the intelligent sensor for recording the contract, the category of the environment data corresponding to the sensor and the like. After the registration is completed, the registration contract creates a recording contract of the enterprise, and initializes the state of the recording contract according to the entered information.
The method is based on a alliance chain, and a government-related department can be used as an admission mechanism of the alliance chain. When a new member of the coalition chain (such as a new coal mine enterprise) is added, auditing can be carried out through an admission authority. And after the audit is passed, issuing a certificate of the organization based on the alliance chain for the member. When communication is performed between the participating nodes, the public key in the certificate is used as the identity. And if the verification is passed, confirming the member in the alliance chain. Based on this, the above method may further include: when a new node sends a joining request to an admission mechanism node, the admission mechanism node audits the joining request; and if the access request passes the verification, the admission authority node issues a certificate for authenticating the identity of the new node.
As also shown in FIG. 2, a perception device of the enterprise may record data into a contract. When the data is input into the recording contract, the identity of the recording contract is verified according to the identity address of the sensing equipment, after the verification is passed, the data is stored in the recording contract account according to a corresponding format, and the data is synchronized to other nodes through a consensus algorithm. The recording contract provides the functions of querying sensor data and entering the sensor data. The record contract contains the account address of the enterprise that registered the contract, and the identity address of the aware devices belonging to the enterprise.
As also shown in fig. 2, the evaluation contract makes relevant evaluation rules by the corresponding evaluation organization, and calls the stored data in the recording contract to calculate the result through the evaluation rules.
It is considered that each node in the alliance chain can check the current state of the intelligent contract in real time and can trace the source of the data used by the contract. Based on this, the above method further comprises: the evaluation organization node receives query requests of other nodes; and the evaluation mechanism node feeds back the current state information of the evaluation contract to other nodes according to the query request, and/or evaluates the monitoring data called by the contract and the identity address of the corresponding sensor. The safety and the credibility of the monitoring data from the source to the storage process can be ensured.
Optionally, when the sensor detects that the corresponding environmental data exceeds the standard, the corresponding prevention system can also be remotely connected to trigger the prevention system to execute the prevention means. For example, when the intelligent gas sensor detects that the gas content exceeds the standard, the intelligent gas sensor can be connected to the ventilation system to trigger the ventilation system to start and discharge the gas in time. Furthermore, the enterprise node can alarm the exceeding of the detected data, and when the enterprise node monitors that the monitored data exceeds the standard, alarm information is generated; and then, inputting the alarm information into the enterprise node, and synchronizing the alarm information to other nodes in the block chain.
The embodiment of the present invention is implemented based on a distributed system formed by a plurality of nodes through network communication, and refer to a schematic structural diagram of the distributed system shown in fig. 3. The nodes communicate with each other through P2P protocol, and P2P protocol is application layer protocol running on top of TCP protocol. In a distributed system, any terminal can join the network to become a node. The functions of the node include: a route for supporting inter-node communications; the application is used for providing specific services according to actual application requirements; and, consensus algorithms.
Taking a node in the blockchain as an example, the node may send the local current transaction to other nodes in the blockchain system, and after the other nodes are successfully verified, the transaction records are stored in respective local blockchain accounts. And the block chain system ensures the correctness and consistency of the accounts of each node through a consensus algorithm. In order to support the joining and the exiting of new members in the federation, dynamic node addition or deletion needs to be realized through consensus, and in this example, the node addition or deletion is realized by using a Robust Byzantine fault-tolerant algorithm (RBFT).
Assuming that the total node number of the system is | R | ═ 3f +1, the RBFT algorithm can tolerate an invalid or malicious node number of f, and 2f +1 normal nodes are required. That is, the RBFT algorithm can tolerate less than 1/3 invalid or malicious nodes. RBFT is a state machine copy replication algorithm, all copies operate in a view rotation process, and the master node is determined by the view number and the node number set, i.e., the master node p ═ v mod | R |, where v is the view number, | R | is the node number, and p is the master node number. The RBFT algorithm needs 5 stages for each client request, and the client request is executed after the server agrees in a two-by-two interaction mode. Because the client cannot obtain the running state of any server from the server, whether the master node in the RBFT has an error or not can be monitored only by the server. If the server fails to complete the client's request within a period of time, a view change protocol is triggered.
The process of message consensus in the protocol is as follows:
1. the client sends a request to the master node to activate the service operation of the master node;
2. the main node assigns a sequence number n to the request, broadcasts a sequence number distribution message and a request message m of the client, and sends a constructed pre-prepare message to each node;
3. receiving the pre-part message from the node, and broadcasting the pre-part message to other service nodes;
4. after each node verifies the request and the sequence in the attempt, broadcasting Commit information, executing the received client request and giving the client a response;
5. the client side waits for responses from different nodes, and if m +1 responses are the same, the responses are the operation results.
The process of adding nodes in the protocol is as follows:
1. the newly added node actively initiates connection to the existing node by reading the configuration file information, updates the routing table of the newly added node after confirming that all the nodes are successfully connected, and initiates recovery information;
2. other nodes in the network confirm to agree to the node to join after receiving the connection request of the newly added node, and then broadcast an AddNode message to the whole network to indicate that the other nodes agree to join the new node in the whole consensus network;
3. when the existing node receives | R | AddNode messages, updating a routing table of the existing node, and then starting to respond to the consensus message request of the newly added node (before the consensus message of the newly added node is not processed);
4. after the newly-added node completes recovery, broadcasting a Ready request to the existing nodes of the whole network;
5. after receiving the Ready request, the existing node recalculates the information of | R |, p and the like after the newly added node is added, and then encapsulates the information into an AgreeUpdate message for whole network broadcasting;
6. after the newly added node is added, the consensus network generates a new main node, and after the main node receives 2f +1 AgreeUpdate messages, the main node sends Update (Update) messages by the identity of the new main node;
7. all nodes in the whole network confirm the correctness of the message after receiving the Update message, and Update the routing table;
8. after each node finishes updating the routing table, broadcasting a Finishupdate message (upgrade end) in the whole network;
9. and after receiving the 2f +1 Finishupdate messages, the node processes the subsequent request and completes the process of adding the node.
The dynamic addition of the alliance members does not affect the normal service process, and the expandability is provided on the premise of ensuring the high robustness of the system.
See fig. 4 for a block structure diagram of a block chain. The blocks are arranged according to the time sequence, each block comprises a timestamp, a hash value of the previous block and a hash value of the block, transactions in the blocks are stored in a Merkle tree mode, and the blocks are connected with each other through the hash value of the previous block to form a chain structure. The block chain is a decentralized storage structure essentially, and the public, transparent, traceable and unforgeable data are guaranteed through technologies such as cryptography, consensus algorithm and the like.
In this embodiment, an encryption method based on an Elliptic curve encryption system (ECC) may be adopted, and in consideration of the limitation of the block chain storage capacity, faster encryption speed and ciphertext volume may be provided by using ECC-based public key encryption and digital signature on the premise of ensuring the security degree. The address of the intelligent sensor is generated by splicing the hardware unique identifier of the intelligent sensor with the enterprise identity identifier of the intelligent sensor and processing the address by the private key of the enterprise. When receiving the sensor data, the node can verify the identity of the sensor through a public key issued by the enterprise.
The intelligent contract refers to a code deployed on a block chain account book, can be automatically executed when a certain condition is met, and is used for completing automatic transaction according to actual business requirements. For example, a risk assessment contract, may execute an algorithm to calculate a risk factor by automatically sending environmental monitoring data to the contract. When a node creates an intelligent contract, a 0 address transaction is issued to the blockchain system to represent a command to create the contract. The system returns an address of an intelligent contract account under which the contract code and variables within the contract are stored. When the node calls the contract, the function and the related parameters contained in the contract are input and are sent to the account address corresponding to the contract as the transaction content. The system parses function operations within the transaction and executes code for corresponding functions within the contract, modifying variable values within the contract.
Fig. 5 shows a schematic diagram of a data storage structure in a node. Since an intelligent contract is used, an account-based storage mode is required, and data is organized and stored in the form of Merkle Patricia Tree (MPT). MPT is formed by combining a traditional Merkle tree and a Patricia tree. The method has the characteristics of convenient retrieval of the former and saving storage space of the latter. Further, the MPT is a tree-shaped storage structure, and is composed of leaf nodes, expansion nodes, and branch nodes. Specifically, the leaf node is responsible for storing data in the form of key value pairs, wherein the key value is coded as a special 16-bit code; the expansion node also stores indexes of other nodes in a key-value pair mode and is used for being linked to other nodes; the branch node is a length-17 list, in which the first 16 bits correspond to the 16-bit code of the key value, and the last bit is used as a termination flag, and the branch node is used to connect the extension node and the leaf node. When updating data, firstly searching whether a corresponding key value exists in a branch node, and if not, updating the value of the branch node; if so, the subtree is recursively updated along the key value. Compared with a Merkle tree, the content of the tree node can be modified to a smaller extent when the account content is updated by using the storage structure, the contract data needs to be modified frequently in the scene of using the contract, and the operation of updating the data can be completed more efficiently by using the MPT.
Referring to fig. 6, a schematic flow chart of a coal mine monitoring method based on intelligent sensing and trusted storage includes the following steps:
1. and the industry experts score the experts, provide comprehensive risk evaluation rules, convert the rules into risk evaluation contracts and issue the risk evaluation contracts to the blockchain network.
2. And verifying the transaction where the risk evaluation contract is located and recording the information of the new contract by the node.
3. The intelligent sensor collects environmental data.
4. And uplink of the environmental data. The intelligent sensor carries out denoising operation on the collected environmental data, improves the accuracy of the data, and then issues the data to the block chain network through the communication module.
5. The nodes synchronize data on the chain. After receiving the data, the nodes verify the identity of the intelligent sensor issuing the data, after the verification is passed, the data are packaged into a new block and issued, and the nodes synchronize the data on the link through a consensus algorithm.
6. And (6) uplink of alarm data. And a risk alarm system in the data monitoring module monitors the on-chain state in real time, and once the situation that the environmental data on the chain exceeds the standard is found, the alarm is automatically triggered, and relevant response and alarm data chaining are performed on the accident.
7. Historical alarms, alarm statistics are written into risk assessment contracts. The data monitoring module collects historical alarm information and environmental data, provides data for a risk evaluation contract and is used for risk evaluation.
8. The coalition members can check the risk evaluation contract in real time and provide reference basis for accident prevention service. The evaluation result of the risk evaluation contract can provide reference and basis for the risk analysis and prevention module to perform accident prevention service.
In the above process, after the intelligent contract is released to the chain, the participant node can track and check the current state of the contract in real time, and the intelligent contract can receive the messages sent by each node, convert the messages into the regulation rules in the contract and perform uplink processing. Various information generated by the above process is recorded in the blockchain, and other nodes synchronously record the information through a consensus algorithm, so that the content on the chain and in the contract cannot be tampered.
Fig. 7 is a schematic structural diagram of a monitoring apparatus based on smart sensing and trusted storage in an embodiment of the present invention, which is applied to nodes in a block chain, where the nodes include a registration contract, a recording contract, and an evaluation contract, and the nodes are connected with sensors, and the apparatus includes:
the enterprise node verification module 701 is used for verifying the identity address of the sensor when monitoring data uploaded by the sensor is received;
a data entry module 702, configured to call a record to enter the monitoring data at the enterprise node and synchronize data with other nodes in the block chain if the identity address is verified;
and the evaluation mechanism node monitoring module 703 is configured to invoke an evaluation contract to invoke the monitoring data stored in the enterprise node, and execute risk evaluation according to the monitoring data.
The monitoring device based on intelligent perception and credible storage provided by the embodiment carries out intelligent monitoring through accurate and reliable data perception of the sensor, the safe and tamper-proof storage mode of the block chain, the automatic and transparent execution process of registering the contract, recording the contract and evaluating the contract, ensures that the monitoring data is safe and credible from the source to the storage process, simplifies the flow of manually analyzing the data, reduces the expenditure of manpower, and improves the management efficiency.
Optionally, as an embodiment, the apparatus further includes an admission authority node registration module, configured to: establishing a registration contract and issuing the registration contract to the block chain; calling the registration contract to add an enterprise account address allowing registration of a recording contract into an enterprise account list; when the enterprise node calls the recording contract, verifying whether the account address of the enterprise node exists in the enterprise account list; if the account address exists in the enterprise account list, creating a recording contract corresponding to the enterprise node; the record contract includes an identity address of a sensor corresponding to the enterprise node.
Optionally, as an embodiment, the apparatus further includes an enterprise node alarm module, configured to: when monitoring that the monitoring data exceeds the standard, generating alarm information; and inputting the alarm information into the enterprise node, and synchronizing the alarm information to other nodes in the block chain.
Optionally, as an embodiment, the apparatus further includes a contract query module, configured to: the evaluation organization node receives query requests of other nodes; and the evaluation mechanism node feeds back the current state information of the evaluation contract and/or the monitoring data called by the evaluation contract and the identity address of the corresponding sensor to other nodes according to the query request.
Optionally, as an embodiment, the apparatus further includes a node auditing module, configured to: when a new node sends a joining request to an admission mechanism node, the admission mechanism node audits the joining request; and if the addition request passes the verification, the admission authority node issues a certificate for authenticating the identity of the new node.
Optionally, as an embodiment, the identity address includes an account address of an enterprise node corresponding to the sensor and a unique identifier of the sensor.
Optionally, as an embodiment, the monitoring data is obtained by processing at least one of the following raw data periodically collected by the sensor: data analysis, image recognition and data denoising.
The monitoring device based on intelligent sensing and trusted storage provided by the above embodiment can implement each process in the above embodiment of the monitoring method based on intelligent sensing and trusted storage, and is not described here again to avoid repetition.
The embodiment of the present invention further provides a computer-readable storage medium, where a computer program is stored on the computer-readable storage medium, and when the computer program is executed by a processor, the computer program implements each process of the monitoring method embodiment based on intelligent sensing and trusted storage, and can achieve the same technical effect, and is not described herein again to avoid repetition. The computer-readable storage medium may be a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk.
Of course, those skilled in the art will understand that all or part of the processes in the methods of the above embodiments may be implemented by instructing the control device to perform operations through a computer, and the programs may be stored in a computer-readable storage medium, and when executed, the programs may include the processes of the above method embodiments, where the storage medium may be a memory, a magnetic disk, an optical disk, and the like.
In this document, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
The embodiments in the present description are described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments are referred to each other.
The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present invention. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the invention. Thus, the present invention is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.

Claims (10)

1. A monitoring method based on intelligent perception and trusted storage is applied to nodes in a block chain, and comprises the following steps:
when the enterprise node receives monitoring data uploaded by a sensor, the identity address of the sensor is verified;
if the identity address passes the verification, calling a record to be recorded and recording the monitoring data in the enterprise node, and synchronizing data to other nodes in the block chain;
the evaluation organization node calls an evaluation contract to call monitoring data stored in the enterprise node, and carries out risk evaluation according to the monitoring data.
2. The method of claim 1, further comprising:
the admission mechanism node establishes a registration contract and issues the registration contract to the block chain;
the admission mechanism node calls the registration contract to add an enterprise account address allowing registration of a recording contract into an enterprise account list;
when the enterprise node calls the recording contract, verifying whether the account address of the enterprise node exists in the enterprise account list;
if the account address exists in the enterprise account list, creating a recording contract corresponding to the enterprise node; the record contract includes an identity address of a sensor corresponding to the enterprise node.
3. The method of claim 1, further comprising:
when monitoring that the monitoring data exceeds the standard, the enterprise node generates alarm information;
and inputting the alarm information into the enterprise node, and synchronizing the alarm information to other nodes in the block chain.
4. The method of claim 1, further comprising:
the evaluation organization node receives query requests of other nodes;
and the evaluation mechanism node feeds back the current state information of the evaluation contract and/or the monitoring data called by the evaluation contract and the identity address of the corresponding sensor to other nodes according to the query request.
5. The method of claim 1, further comprising:
when a new node sends a joining request to an admission mechanism node, the admission mechanism node audits the joining request;
and if the addition request passes the verification, the admission authority node issues a certificate for authenticating the identity of the new node.
6. The method of any one of claims 1-5, wherein the identity address comprises an account address of the sensor corresponding to the enterprise node and a unique identifier of the sensor.
7. The method according to any one of claims 1 to 5, wherein the monitoring data is obtained by processing at least one of the following raw data acquired periodically by the sensor: data analysis, image recognition and data denoising.
8. A monitoring device based on intelligent perception and trusted storage is applied to nodes in a block chain, and the device comprises:
the enterprise node verification module is used for verifying the identity address of the sensor when monitoring data uploaded by the sensor is received;
the data entry module is used for calling, recording and closing the enterprise node to enter the monitoring data and synchronizing data to other nodes in the block chain if the identity address passes the verification;
and the evaluation mechanism node monitoring module is used for calling an evaluation contract to call the monitoring data stored in the enterprise node and executing risk evaluation according to the monitoring data.
9. The apparatus of claim 8, further comprising an admission authority node registration module to:
establishing a registration contract and issuing the registration contract to the block chain;
calling the registration contract to add an enterprise account address allowing registration of a recording contract into an enterprise account list;
when the enterprise node calls the recording contract, verifying whether the account address of the enterprise node exists in the enterprise account list;
if the account address exists in the enterprise account list, creating a recording contract corresponding to the enterprise node; the record contract includes an identity address of a sensor corresponding to the enterprise node.
10. The apparatus of claim 8, further comprising an enterprise node alert module to:
when monitoring that the monitoring data exceeds the standard, generating alarm information;
and inputting the alarm information into the enterprise node, and synchronizing the alarm information to other nodes in the block chain.
CN202110045101.0A 2021-01-13 2021-01-13 Monitoring method and device based on intelligent sensing and trusted storage Active CN112822279B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110045101.0A CN112822279B (en) 2021-01-13 2021-01-13 Monitoring method and device based on intelligent sensing and trusted storage

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110045101.0A CN112822279B (en) 2021-01-13 2021-01-13 Monitoring method and device based on intelligent sensing and trusted storage

Publications (2)

Publication Number Publication Date
CN112822279A true CN112822279A (en) 2021-05-18
CN112822279B CN112822279B (en) 2023-03-24

Family

ID=75869256

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110045101.0A Active CN112822279B (en) 2021-01-13 2021-01-13 Monitoring method and device based on intelligent sensing and trusted storage

Country Status (1)

Country Link
CN (1) CN112822279B (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170109735A1 (en) * 2015-07-14 2017-04-20 Fmr Llc Computationally Efficient Transfer Processing and Auditing Apparatuses, Methods and Systems
US20180078843A1 (en) * 2016-02-02 2018-03-22 Bao Tran Smart device
CN109274768A (en) * 2018-11-02 2019-01-25 陕西科技大学 A kind of power battery state monitoring apparatus and method based on block chain
CN110061838A (en) * 2019-04-28 2019-07-26 广州大学 A kind of the decentralization storage system and its realization, information retrieval method of DNS resource record
CN110059470A (en) * 2019-04-12 2019-07-26 沈阳东软智睿放疗技术有限公司 A kind of verification method of part of appliance, device and equipment
US20190372770A1 (en) * 2018-06-04 2019-12-05 Syniverse Technologies, Llc System and method for blockchain-based consent and campaign management
CN111314363A (en) * 2020-02-25 2020-06-19 深圳市亿道信息股份有限公司 Enterprise mobile equipment management method and system based on block chain
CN111767583A (en) * 2020-07-02 2020-10-13 创新链科技有限公司 Block chain-based enterprise internal information security guarantee method and system
CN111968000A (en) * 2020-07-09 2020-11-20 南京邮电大学 Intelligent agricultural data monitoring and automatic control method based on double-chain mechanism

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170109735A1 (en) * 2015-07-14 2017-04-20 Fmr Llc Computationally Efficient Transfer Processing and Auditing Apparatuses, Methods and Systems
US20180078843A1 (en) * 2016-02-02 2018-03-22 Bao Tran Smart device
US20190372770A1 (en) * 2018-06-04 2019-12-05 Syniverse Technologies, Llc System and method for blockchain-based consent and campaign management
CN109274768A (en) * 2018-11-02 2019-01-25 陕西科技大学 A kind of power battery state monitoring apparatus and method based on block chain
CN110059470A (en) * 2019-04-12 2019-07-26 沈阳东软智睿放疗技术有限公司 A kind of verification method of part of appliance, device and equipment
CN110061838A (en) * 2019-04-28 2019-07-26 广州大学 A kind of the decentralization storage system and its realization, information retrieval method of DNS resource record
CN111314363A (en) * 2020-02-25 2020-06-19 深圳市亿道信息股份有限公司 Enterprise mobile equipment management method and system based on block chain
CN111767583A (en) * 2020-07-02 2020-10-13 创新链科技有限公司 Block chain-based enterprise internal information security guarantee method and system
CN111968000A (en) * 2020-07-09 2020-11-20 南京邮电大学 Intelligent agricultural data monitoring and automatic control method based on double-chain mechanism

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
李明: "《区块链在病人远程智能监测系统的应用设计》", 《中国卫生信息管理杂志》 *

Also Published As

Publication number Publication date
CN112822279B (en) 2023-03-24

Similar Documents

Publication Publication Date Title
WO2021036545A1 (en) Smart contract-based data processing method, and device and storage medium
CN112765245A (en) Electronic government affair big data processing platform
JP2021524088A (en) Resource migration data management method and equipment, and computer programs
CN112861190B (en) Data cross-chain cooperation method, system and device
CN110598434B (en) House information processing method and device based on blockchain network, electronic equipment and storage medium
US11593316B2 (en) Database snapshot for managing state synchronization
WO2022166637A1 (en) Blockchain network-based method and apparatus for data processing, and computer device
EP3709568A1 (en) Deleting user data from a blockchain
CN110061887B (en) Block chain-based traffic statistical method, device and equipment
CN112970020A (en) Monitoring device components using distributed ledger
CN110597918A (en) Account management method and device and computer readable storage medium
CN110929229A (en) Block chain-based office document credibility verification method and system
CN113037492B (en) Sensor data processing method and device
CN112800129A (en) Block state updating method, device and system and electronic equipment
CN109951490A (en) Webpage integrity assurance, system and electronic equipment based on block chain
CN113326165B (en) Data processing method and device based on block chain and computer readable storage medium
CN111339551B (en) Data verification method and related device and equipment
JP2020190874A (en) Document management system
CN111931220A (en) Consensus processing method, device, medium and electronic equipment for block chain network
US20220237326A1 (en) System and method for certifying integrity of data assets
CN112822279B (en) Monitoring method and device based on intelligent sensing and trusted storage
CN112926981B (en) Transaction information processing method, device and medium for block chain and electronic equipment
CN112416981A (en) Data processing method and device based on block chain, electronic equipment and storage medium
CN112600874B (en) Node joining method and device, electronic equipment and readable storage medium
CN117692149B (en) Method, equipment and medium for checking integrity of log transparent entity

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant