CN113037754A - Block chain-based safety management system and management method for specific crowd aggregation - Google Patents

Block chain-based safety management system and management method for specific crowd aggregation Download PDF

Info

Publication number
CN113037754A
CN113037754A CN202110259488.XA CN202110259488A CN113037754A CN 113037754 A CN113037754 A CN 113037754A CN 202110259488 A CN202110259488 A CN 202110259488A CN 113037754 A CN113037754 A CN 113037754A
Authority
CN
China
Prior art keywords
management system
security
safety management
security management
gateway
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110259488.XA
Other languages
Chinese (zh)
Inventor
程希冀
崔照阳
罗骁
陈柏臻
徐振明
潘政恺
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Vastchain Technology Co ltd
Original Assignee
Hangzhou Vastchain Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Vastchain Technology Co ltd filed Critical Hangzhou Vastchain Technology Co ltd
Priority to CN202110259488.XA priority Critical patent/CN113037754A/en
Publication of CN113037754A publication Critical patent/CN113037754A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16YINFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
    • G16Y40/00IoT characterised by the purpose of the information processing
    • G16Y40/50Safety; Security of things, users, data or systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/66Arrangements for connecting between networks having differing types of switching systems, e.g. gateways
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/08Protocols for interworking; Protocol conversion
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/18Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computing Systems (AREA)
  • Multimedia (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention belongs to the technical field of block chains, and relates to a safety management system and a safety management method for specific crowd gathering based on a block chain, which integrates the frontier technologies of multiple fields such as the block chain, the Internet of things, big data, artificial intelligence and the like, has obvious application value in multiple aspects such as equipment expansibility, high efficiency, collaboration, distrust removal and the like, promotes the safety management of specific crowds such as doctors, policemen, fire fighting and the like to develop to a new more intelligent, diversified and popularized state, constructs a safety management application platform by using the block chain technology, can effectively connect and integrate various safety management related equipment, gateways, capability systems, applications, services and the like in a decentralized manner, promotes mutual collaboration, gets through physical and virtual world, reduces the cost, monitors the track, operation and field conditions of workers in real time by using a distributed system, the management efficiency of safety management is effectively improved.

Description

Block chain-based safety management system and management method for specific crowd aggregation
Technical Field
The invention belongs to the technical field of block chains, and relates to a safety management system and a safety management method for specific crowd aggregation based on a block chain.
Background
When a specific crowd is gathered at a specific place, for example, when a fire fighter is in a fire scene, a plurality of doctors are in a casualty accident treatment scene, a plurality of polices are in a case handling scene, an airport station and other transportation hubs work as cooperative work, various unforeseeable situations can exist during man-machine cooperation, and a hidden danger accident is easy to occur, so that safety management and safety early warning for the gathering point of the specific crowd are necessary.
The blockchain is a decentralized electronic accounting technology, can safely store transaction or other data, and information cannot be forged or falsified. The transaction may be digital currency such as bitcoin, digital assets such as a debt, a stock right, a copyright, and the like, and may be any digital information in a broad sense. Its presence greatly reduces the cost of trust and accounting for real economies. By means of the block chain structure and the timestamp technology, information on the chain is only allowed to be newly added and cannot be modified or replaced, the data on the chain cannot be tampered in content and time, and the evidence storage record can be permanently traced and audited.
The block chain technology has the advantages that the information cannot be tampered, the information on the chain is only allowed to be newly added and cannot be modified and replaced by relying on the block chain structure and the timestamp technology, the data on the chain cannot be tampered in content and time, and the evidence storage record is permanently traceable and auditable. The block chain technology has distributed management, data accounts on the block chain are stored in a distributed mode through all the participating nodes, all the block chain nodes store the full data on the chain through a preset consensus algorithm, and the data on the chain are maintained together. The block chain technology has a consensus mechanism and a data review mechanism with the public transparency and through multi-party agreement, the data processing flow on the chain is opened and audited for the participating nodes, and all users can inquire the evidence storage data through a block chain browser. The block chain technology is also autonomous, multiple parties on the chain can agree on the operation rules and evidence storage rules applied on the chain, the subsequent chain application can strictly operate according to the agreement, and any third party cannot privately tamper with the operation rules, so that the safe operation of the chain application is guaranteed.
The above advantages of the block chain technology provide a new idea for realizing safe and effective management of specific crowd gathering intelligently, credibly and lightweight, and the applicant proposes the technical scheme of the invention.
Disclosure of Invention
In order to solve the technical problems, the invention provides a safety management system and a safety management method for specific crowd gathering based on a block chain.
In order to achieve the purpose, the technical scheme of the invention is as follows:
a block chain based security management system for specific crowd aggregation, the security management system comprising a user layer, a hardware layer, a software layer, a network layer and a contract layer; the user layer comprises service participants in the use process of the security management system; the hardware layer comprises functional entities participating in the security management system; the software layer comprises decentralized software or programs running on the hardware layer; the network layer comprises a plurality of security management system nodes which are distributed, and the nodes are used for information transmission in the security management system; the contract layer includes protocol codes issued in the security management system by the service participants in the user layer.
Preferably, the user layer does not include a node master of the security management system participating in consensus, verification and storage of the block chain in the security management system.
Preferably, the hardware layer comprises a full-function security system device, a security system gateway, an end user device, a security system server, and a security system service gateway.
Preferably, the full-function security system device, the security system gateway, the end user device, the security system server, and the security system service gateway in the hardware layer are connected to each other; the full-function safety system equipment is an independent unit in the safety management system, can generate information data in the working process, and interacts with other functional entities through the safety management system; the security system gateway accesses the full-function security system equipment with limited capability into a security management system through a code conversion protocol; the end user device has a visual user interface; the safety system server is used for receiving information data issued by other functional entities; the security system service gateway accesses a functional entity which cannot be connected with the security management system into the security management system through a code conversion protocol.
Preferably, the interconnection means includes internet connection and local connection based on wireless local area network, bluetooth and near field communication.
Preferably, the decentralized software or program comprises software or program on a gateway class functional entity and software or program on a non-gateway class functional entity; software or program on the gateway functional entity provides a program interface, and the functional entity which can not be connected with the security management system is accessed into the security management system through a code conversion protocol; and the software or the program on the non-gateway functional entity comprises a product and a program operated by equipment, and performs information interaction with the safety management system.
Preferably, the end user device includes a gateway terminal device or a non-gateway terminal device, and the end user device has a visual user interaction interface.
The invention also discloses a safety management method for the specific crowd gathering based on the block chain, which is realized by the safety management system.
Compared with the prior art, the technical scheme of the invention has the following technical effects:
the invention integrates the forward-end technologies of the fields such as a block chain, the Internet of things, big data, artificial intelligence and the like, and has obvious application value in the aspects of equipment expansibility, high efficiency, collaboration, distrust and the like. And the blockchain may also provide a way for the privacy of the user to technically ensure that the potential for asset verifications provided therein may in turn provide profits for the user's assets and data. The safety management of specific crowds such as doctors, policemen, fire fighting and the like is promoted to develop to a new state of more intellectualization, diversification and popularization, a safety management application platform is constructed by using a block chain technology, and effective connection and fusion of various safety management related devices, gateways, capability systems, applications, services and the like can be realized in a decentralized mode, so that mutual cooperation of the devices, the gateways, the capability systems, the applications, the services and the like is promoted, a physical world and a virtual world are opened, the cost is reduced, and meanwhile, the requirements of trust establishment, transaction acceleration, mass connection and the like can be met to the maximum extent.
The invention utilizes the distributed system to acquire the environmental information, the monitoring video information, the identity information, the position information and the equipment operation video information, monitors the track, the operation and the field condition of the working personnel in real time, and effectively improves the management efficiency of safety management.
Detailed Description
For further understanding of the present invention, embodiments of the present invention will be described in further detail below with reference to examples and comparative examples, but embodiments of the present invention are not limited thereto.
In order to make the purpose and technical solution of the present invention more apparent, the present invention is further described in detail with reference to the following examples. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention. The following describes the application of the present invention in detail.
A block chain based security management system for specific crowd aggregation, the security management system comprising a user layer, a hardware layer, a software layer, a network layer and a contract layer; the user layer comprises service participants in the use process of the security management system; the hardware layer comprises functional entities participating in the security management system; the software layer comprises decentralized software or programs running on the hardware layer; the network layer comprises a plurality of security management system nodes which are distributed, and the nodes are used for information transmission in the security management system; the contract layer includes protocol codes issued in the security management system by the service participants in the user layer.
According to the user type participating in the safety management system, the user layer does not comprise a safety management system node master participating in block chain consensus, verification and storage in the safety management system.
In order to exert the efficacy of the safety management system, corresponding hardware facilities are needed, and the hardware layers comprise full-function safety system equipment, a safety system gateway, end user equipment, a safety system server and a safety system service gateway.
The full-function security system equipment, the security system gateway, the end user equipment, the security system server and the security system service gateway in the hardware layer are connected with each other; the full-function safety system equipment is an independent unit in the safety management system, can generate information data in the working process, and interacts with other functional entities through the safety management system; the security system gateway accesses the full-function security system equipment with limited capability into a security management system through a code conversion protocol; the end user device has a visual user interface; the safety system server is used for receiving information data issued by other functional entities; the security system service gateway accesses a functional entity which cannot be connected with the security management system into the security management system through a code conversion protocol.
The full-function safety system equipment is an ideal independent unit in a safety management system, and has the product efficacy and the capability of a safety management system node. The information data can be generated in the working process and is interacted with other network user entities through the safety management system so as to realize the lookup, storage, integration, authority control and the like of the information data. Compared with the traditional safety management system product, the full-function safety system equipment is provided with electronic components for participating in block chain consensus and storing related networking, calculation, storage and the like.
The security system gateway accesses the full-function security system equipment with limited capability to the security management system through a code conversion protocol, wherein the full-function security system equipment with limited capability is compared with the full-function security system equipment, mainly means that the full-function security system equipment only has the efficacy of a general product, but cannot have electronic components and capabilities related to security management system nodes due to the factors of size, structure, cost limitation and the like, so that the security system gateway is required to be accessed to a security management system network. Theoretically, most products or devices in the security management system belong to full-function security system devices with limited capabilities, such as police law enforcement recorders, fire recorders, intelligent building devices, intelligent physiological detection watches, and the like.
The end user device has a visual user interface, and the end user device refers to a client product or device facing a specific user in the security management system. Besides the function of the safety management system node, the main function of the system is to have a visual interactive interface, help a user to receive and look up information data of other functional entities, and provide the user to input and issue information or control authority to other functional entities. For example, a personal computer that is a security management system node and that has decentralized software or programs installed may be referred to as an end-user device.
The safety system server is used for receiving information data issued by other functional entities, is oriented to a service party, has the main functions of receiving the information data issued by other functional entities and performing purposeful service operations such as processing, integration, storage and the like on the information data besides playing the functions of the safety management system node, and can send the service information data generated by the self service or the third party to a specific functional entity through the safety management system.
The safety system service gateway accesses a functional entity which can not be connected with the safety management system into the safety management system through a code conversion protocol, is oriented to a service party, and has the main function of accessing the functional entity which can not be connected with the safety management system into the safety management system mainly through a specific code conversion protocol except for exerting the function of a safety management system node. The functional entity which can not be connected with the security management system refers to the existing common security management service which does not have the capability of being connected with the security management system, so that data conversion needs to be carried out through the intermediary of the security system service gateway to match and connect with the security management system. For example, in a fire scene situation provided by a fire fighter, the equipment itself cannot perform the functions of issuing and receiving the blockchain information and identifying and storing the blockchain related to the security management system node, but can access the security management system through the security system service gateway to provide the information service based on the blockchain technology.
The interconnection means include internet connection and local connection based on wireless lan, bluetooth, near field communication, as required. The reasonable connection mode can be matched according to different specific service scenes and different specific requirements of different links of the service, so that the cost is lower, the efficiency is higher while the service operation quality is ensured, and the maximization of resources and benefits is achieved.
For the local connection mode, the user can use the terminal user device (such as a smart phone, a personal computer, a smart watch, and the like) to realize local connection with the functional entity which cannot be connected with the security management system, the connection mode is realized by technologies such as WLAN, bluetooth, NFC, and the like, and the functional entity which cannot be connected with the security management system can access the security management system or the internet through the terminal user device. It should be noted that the functional entity that cannot connect to the security management system may also access the security management system by relying on the security system service gateway of the security management system alone.
For the network connection mode. From a user perspective, a typical user typically participates in a security management system through a specific end-user device. User A can carry out network interaction with user B or other functional entities through the terminal user equipment, and the network interaction mode in the process comprises the following steps: a security management system and the conventional internet. The traditional internet connection method needs to transmit information through a corresponding central (cloud) server.
In the security management system, when some data is transmitted through the traditional internet, a hash check is also needed. For example, the user A sends the larger data to the user B through the Internet, meanwhile, the Hash value of the larger data is sent to the user B through the safety management system, the user B performs appointed Hash operation on the larger data after receiving the larger data transmitted through the Internet, the larger data is compared with the Hash value received through the safety management system, if the two Hash values are the same, the transmitted data is credible, and if the two Hash values are not consistent, the data is tampered or damaged in the traditional Internet transmission process.
The decentralized software or programs comprise software or programs on gateway functional entities and software or programs on non-gateway functional entities; software or program on the gateway functional entity provides a program interface, and the functional entity which can not be connected with the security management system is accessed into the security management system through a code conversion protocol; and the software or the program on the non-gateway functional entity comprises a product and a program operated by equipment, and performs information interaction with the safety management system.
The decentralized software or program is a software program based on the block chain technology and installed on the functional entity, and includes a program code for the hardware device to perform its own function, and a program or protocol for information interaction with the security management system.
Software or programs that are decentralized over different types of functional entities may be classified into gateway classes and non-gateway classes, depending on the functionality they perform. The gateway type internet of things entity generally has decentralized software or program interface files. After the equipment without the node capability of the safety management system is provided with the decentralized software or program interface file, the equipment can be connected to the decentralized software or program of the corresponding gateway equipment, and then information interaction with the safety management system is realized.
The contract layer includes agreement code issued in the security management system by the business participants in the user layer, the agreement code being a computer transaction agreement that automatically executes the contract terms without mediation. The protocol codes are issued to the whole safety management system through the safety management system nodes, and then run on the safety management system virtual machines of the safety management system nodes relatively independently. If the protocol code receives a certain transaction or information transmission and meets the corresponding trigger condition, each safety management system node executes the corresponding protocol code to perform preset work, obtains the consensus verification of each safety management system node, and records the execution process on the block chain.
The terminal user equipment comprises gateway terminal equipment or non-gateway terminal equipment, and the terminal user equipment is provided with a visual user interaction interface.
The invention also provides a block chain-based specific crowd gathering safety management method.
The working process of the safety management system comprises the following steps: when specific people gather in a specific place, for example, when a fire fighter is in a fire scene, a plurality of doctors are in a sudden casualty accident treatment scene, a plurality of polices are in a case handling scene, an airport station and other traffic hubs work as cooperative work, and the like, a plurality of working personnel (specific personnel) hold a plurality of terminal user equipment, acquire environmental information, monitoring video information, identity information, position information and equipment operation video information in real time, monitor the track, operation and scene conditions of the working personnel in real time and upload the information to a block chain, and the block chain-based technology can ensure the accuracy and efficiency of acquiring data and provide a basis for subsequent early warning and monitoring. Meanwhile, safety prediction is carried out through a safety prediction model, protective measures are taken through event response in time and early, the whole process is monitored, and once an accident happens, the whole accident record is taken as a complete accident record.
The invention integrates the forward-end technologies of the fields such as a block chain, the Internet of things, big data, artificial intelligence and the like, and has obvious application value in the aspects of equipment expansibility, high efficiency, collaboration, distrust and the like. And the blockchain may also provide a way for the privacy of the user to technically ensure that the potential for asset verifications provided therein may in turn provide profits for the user's assets and data. The safety management of specific crowds such as doctors, policemen, fire fighting and the like is promoted to develop to a new state of more intellectualization, diversification and popularization, a safety management application platform is constructed by using a block chain technology, and effective connection and fusion of various safety management related devices, gateways, capability systems, applications, services and the like can be realized in a decentralized mode, so that mutual cooperation of the devices, the gateways, the capability systems, the applications, the services and the like is promoted, a physical world and a virtual world are opened, the cost is reduced, and meanwhile, the requirements of trust establishment, transaction acceleration, mass connection and the like can be met to the maximum extent.
The invention utilizes the distributed system to acquire the environmental information, the monitoring video information, the identity information, the position information and the equipment operation video information, monitors the track, the operation and the field condition of the working personnel in real time, and effectively improves the management efficiency of safety management.
In addition, it should be noted that the specific examples described in the present specification may differ in terms of formulation, process name, and the like. All equivalent or simple changes of the structure, the characteristics and the principle of the invention which are described in the patent conception of the invention are included in the protection scope of the patent of the invention. Various modifications, additions and substitutions for the specific embodiments described may be made by those skilled in the art without departing from the scope of the invention as defined in the accompanying claims.
Although the present invention has been described with reference to the above embodiments, it should be understood that the scope of the present invention is not limited thereto, and that various changes and modifications can be made by those skilled in the art without departing from the spirit and scope of the present invention.

Claims (8)

1. A safety management system for specific crowd gathering based on a block chain is characterized in that the safety management system comprises a user layer, a hardware layer, a software layer, a network layer and a contract layer; the user layer comprises service participants in the use process of the security management system; the hardware layer comprises functional entities participating in the security management system; the software layer comprises decentralized software or programs running on the hardware layer; the network layer comprises a plurality of security management system nodes which are distributed, and the nodes are used for information transmission in the security management system; the contract layer includes protocol codes issued in the security management system by the service participants in the user layer.
2. The system of claim 1, wherein the user layer does not include a security management system node master involved in block chain consensus, authentication, and storage in the security management system.
3. The security management system of claim 2, wherein the hardware layer comprises a full function security system device, a security system gateway, an end user device, a security system server, a security system service gateway.
4. The security management system of claim 3, wherein the full function security system devices, security system gateways, end user devices, security system servers, security system service gateways in the hardware layer are interconnected; the full-function safety system equipment is an independent unit in the safety management system, can generate information data in the working process, and interacts with other functional entities through the safety management system; the security system gateway accesses the full-function security system equipment with limited capability into a security management system through a code conversion protocol; the end user device has a visual user interface; the safety system server is used for receiving information data issued by other functional entities; the security system service gateway accesses a functional entity which cannot be connected with the security management system into the security management system through a code conversion protocol.
5. The security management system of claim 3, wherein the interconnection means comprises an Internet connection and a local connection based on a wireless local area network, Bluetooth, or near field communication.
6. The security management system of claim 3, wherein the decentralized software or program comprises software or program on a gateway class functional entity and software or program on a non-gateway class functional entity; software or program on the gateway functional entity provides a program interface, and the functional entity which can not be connected with the security management system is accessed into the security management system through a code conversion protocol; and the software or the program on the non-gateway functional entity comprises a product and a program operated by equipment, and performs information interaction with the safety management system.
7. The security management system of claim 3, wherein the end-user device comprises a gateway-class terminal device or a non-gateway-class terminal device, and wherein the end-user device has a visual user interaction interface.
8. A safety management method for specific crowd gathering based on block chains, which is implemented based on the safety management system of any one of claims 1 to 7.
CN202110259488.XA 2021-03-10 2021-03-10 Block chain-based safety management system and management method for specific crowd aggregation Pending CN113037754A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110259488.XA CN113037754A (en) 2021-03-10 2021-03-10 Block chain-based safety management system and management method for specific crowd aggregation

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110259488.XA CN113037754A (en) 2021-03-10 2021-03-10 Block chain-based safety management system and management method for specific crowd aggregation

Publications (1)

Publication Number Publication Date
CN113037754A true CN113037754A (en) 2021-06-25

Family

ID=76469060

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110259488.XA Pending CN113037754A (en) 2021-03-10 2021-03-10 Block chain-based safety management system and management method for specific crowd aggregation

Country Status (1)

Country Link
CN (1) CN113037754A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113779547A (en) * 2021-09-17 2021-12-10 北京安天网络安全技术有限公司 Management method and device of mobile storage equipment and electronic equipment

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110572617A (en) * 2019-09-24 2019-12-13 腾讯科技(深圳)有限公司 environment monitoring processing method and device and storage medium
CN110908786A (en) * 2019-11-19 2020-03-24 腾讯科技(深圳)有限公司 Intelligent contract calling method, device and medium
CN110930023A (en) * 2019-11-20 2020-03-27 满江(上海)软件科技有限公司 Public safety early warning system of specific crowd gathering point based on block chain
US20200358782A1 (en) * 2018-01-12 2020-11-12 Siemens Healthcare Gmbh Storing and accessing medical datasets on the blockchain
CN112464190A (en) * 2020-12-17 2021-03-09 深圳市飞思捷跃科技有限公司 Block chain-based high-availability high-safety method for Internet of things platform

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20200358782A1 (en) * 2018-01-12 2020-11-12 Siemens Healthcare Gmbh Storing and accessing medical datasets on the blockchain
CN110572617A (en) * 2019-09-24 2019-12-13 腾讯科技(深圳)有限公司 environment monitoring processing method and device and storage medium
CN110908786A (en) * 2019-11-19 2020-03-24 腾讯科技(深圳)有限公司 Intelligent contract calling method, device and medium
CN110930023A (en) * 2019-11-20 2020-03-27 满江(上海)软件科技有限公司 Public safety early warning system of specific crowd gathering point based on block chain
CN112464190A (en) * 2020-12-17 2021-03-09 深圳市飞思捷跃科技有限公司 Block chain-based high-availability high-safety method for Internet of things platform

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
李赫: "《区块链技术金融应用实践》", 30 September 2017, pages: 25 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113779547A (en) * 2021-09-17 2021-12-10 北京安天网络安全技术有限公司 Management method and device of mobile storage equipment and electronic equipment

Similar Documents

Publication Publication Date Title
CN109729180B (en) Whole system intelligent community platform
Swamy et al. Security threats in the application layer in IOT applications
US11463241B2 (en) Transmitting or receiving blockchain information
Xu et al. Constructing trustworthy and safe communities on a blockchain-enabled social credits system
CN110032545A (en) File memory method, system and electronic equipment based on block chain
CN109886037B (en) Electronic evidence auditing method based on blockchain
JP2018516419A (en) A computerized system that securely delivers and exchanges cyber threat information in a standardized format
CN105247529A (en) Synchronizing credential hashes between directory services
CN103957203B (en) A kind of network security protection system
CN104166812A (en) Database safety access control method based on independent authorization
CN103283202A (en) System and method for network level protection against malicious software
CN102111440A (en) Real-time information safety service method and system for supporting dynamic interaction
CN104378365A (en) Safety management center capable of conducting collaborative analysis
CN109587174A (en) Composite defense method and system for network protection
CN109462599A (en) A kind of honey jar management system
CN111405001A (en) Node monitoring system applied to block chain
CN109951490A (en) Webpage integrity assurance, system and electronic equipment based on block chain
CN113034857A (en) Urban natural disaster monitoring emergency management scheduling platform based on block chain
CN115225406A (en) Security protection linkage information sharing system in wisdom garden
CN106326736A (en) Data processing method and system
CN113037754A (en) Block chain-based safety management system and management method for specific crowd aggregation
CN104378364A (en) Collaborative analysis method of information security operation centers
CN107209820A (en) Electronics is tried to be the first the evidentiary hosted platform of formula
CN101577651A (en) Method for constructing enterprise management information system compositive platform
CN102254235A (en) Enterprise information management system integrated platform

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20210625

RJ01 Rejection of invention patent application after publication