CN113595737A - Agile finger control system based on block chain - Google Patents

Agile finger control system based on block chain Download PDF

Info

Publication number
CN113595737A
CN113595737A CN202110853816.9A CN202110853816A CN113595737A CN 113595737 A CN113595737 A CN 113595737A CN 202110853816 A CN202110853816 A CN 202110853816A CN 113595737 A CN113595737 A CN 113595737A
Authority
CN
China
Prior art keywords
task
nodes
node
block chain
agile
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110853816.9A
Other languages
Chinese (zh)
Other versions
CN113595737B (en
Inventor
魏巍
苏耀峰
王博
伍洋
李强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
National University of Defense Technology
Original Assignee
National University of Defense Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by National University of Defense Technology filed Critical National University of Defense Technology
Priority to CN202110853816.9A priority Critical patent/CN113595737B/en
Publication of CN113595737A publication Critical patent/CN113595737A/en
Application granted granted Critical
Publication of CN113595737B publication Critical patent/CN113595737B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • H04L9/3268Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate validation, registration, distribution or revocation, e.g. certificate revocation list [CRL]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02PCLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
    • Y02P90/00Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
    • Y02P90/02Total factory control, e.g. smart factories, flexible manufacturing systems [FMS] or integrated manufacturing systems [IMS]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention discloses an agile finger control system based on a block chain, which comprises: the information resource nodes are basic support nodes for establishing an agile finger control system based on the block chain and are used as carriers for the agile finger control-oriented block chain system to operate, and the rest nodes are accessed to the system by establishing connection relations with the information resource nodes; the command control node is used as a main body for implementing command control functions, and communicates information flow and command control flow with information resources and an execution terminal after accessing the system; the task terminal nodes are used as carriers for executing various tasks, and specifically comprise various equipment with data processing and communication capabilities and the like; the task terminal node accesses the agile finger block chain system through the information resource node; each node is added into the block chain network based on the digital identity certificate to realize identity identification and control of various authorities. The invention has the advantages of more reasonable system structure, strong functional adaptability, better expandability and the like.

Description

Agile finger control system based on block chain
Technical Field
The invention mainly relates to the technical field of command information systems, in particular to an agile finger control system based on a block chain.
Background
As a command and control concept, the concept of "agile finger control" was originally proposed in 2003 by Alberts and Hayes, and the basic idea is to implement rapid deployment and configuration of various organization entities by a dynamic and flexible organization strategy so as to cope with unpredictable and rapidly changing environmental situations and work tasks. Under ideal conditions, the agile finger control process should realize accurate and fast perception of environment situation and work task, reasonably allocate various required resources in a grid network environment, and flexibly coordinate the relationship among command subjects to achieve work goals.
Various command information systems (such as various command information systems for police, military or civil use) are main carriers for implementing the agile command and control process under the informatization condition, however, most of the existing command information systems have three disadvantages:
in the aspect of system structure, the current command information system is usually organized into structure development and deployment according to execution units, each command control unit mostly has a hierarchical longitudinal command control relationship, a perfect design for getting through various different execution unit systems is lacking, and reasonable allocation of overall resources on the global level and horizontal cooperation activities among multiple command control main bodies are not easy to realize.
In the aspect of function implementation, the current command information system is usually designed and constructed based on a structural method, most functions of the current command information system are basically determined in demand planning at the initial stage of system establishment, and the current command information system is solidified after development, shaping and deployment, and is difficult to meet complex and variable real environments and diversified demands.
In the aspect of a deployment mode, a C/S (client/server) framework based on a centralized server is usually adopted in the current command information system, so that a small number of core servers gather greater risks, and the situation of global failure caused by single-point failure is easy to occur; and due to the restriction of performance bottleneck, the expandability of the system is not strong.
Therefore, it is necessary to perfect and optimize the command information system, so as to reduce the problems and hidden troubles caused by the above disadvantages as much as possible from the technical point of view.
Disclosure of Invention
The technical problem to be solved by the invention is as follows: aiming at the technical problems in the prior art, the invention provides the agile finger control system based on the block chain, which has more reasonable system structure, strong functional adaptability and better expandability.
In order to solve the technical problems, the invention adopts the following technical scheme:
an agile finger control system based on a blockchain, comprising:
the information resource nodes are basic support nodes for establishing an agile finger control system based on the block chain and are used as carriers for the agile finger control-oriented block chain system to operate, and the rest nodes are accessed to the system by establishing connection relations with the information resource nodes;
the command control node is used as a main body for implementing command control functions, and communicates information flow and command control flow with information resources and an execution terminal after accessing the system;
the task terminal nodes are used as carriers for executing various tasks, and specifically comprise various equipment with data processing and communication capabilities and the like; the task terminal node accesses the agile finger block chain system through the information resource node;
each node is added into the block chain network based on the digital identity certificate to realize identity identification and control of various authorities.
As a further improvement of the invention: the information resource node system is used for providing computing resources for operation and intelligent contract execution, providing storage and reading services for various data of the system, and keeping network connection and communication with other nodes of the system.
As a further improvement of the invention: the task terminal nodes are used for reporting respective spatial position, running state and environment information in real time, receiving scheduling and control instructions of node users with corresponding authorities and calling information resources according to the instruction control information and the authority intelligent contract strategy request.
As a further improvement of the invention: and the command control nodes call information resources under the regulation and control of the intelligent contract and are used for issuing command control instructions to the task execution unit and the execution equipment to coordinate the relationship with other command control nodes.
As a further improvement of the invention: in the system operation, except that the information resource nodes are kept on line stably, the command control stage and the task terminal nodes are added or withdrawn from the block chain network as required.
As a further improvement of the invention: and the task channel is used for establishing a dedicated data communication connection, and the mechanism of the task channel is used for realizing the autonomous definition of the task and the calling of each node according to the requirement.
As a further improvement of the invention: the intelligent contract execution system further comprises an intelligent contract unit, wherein the intelligent contract unit is a carrier for executing application and function realization on the chain, and comprises a task contract compiling module, a task channel establishing module and a task execution module.
As a further improvement of the invention: the task contract compiling module is used for carrying out standardized setting on task connotations, participators and operation rule contents in the block chain system and compiling by command control nodes with authorities.
As a further improvement of the invention: the task channel establishing module executes the following processes: 1) signing the contract with a digital identity by an instruction node of the contract; 2) encrypting and submitting the encrypted data to corresponding nodes according to a preset approval rule; 3) the control nodes with corresponding authorities decrypt the contracts and approve the contracts, and the approved task contracts are issued to the block chain network; 4) forcibly establishing an encrypted communication link between nodes specified by seats, and initially establishing a task channel; 5) the open seat receives the node application in the system, and after the application passes or is specified again by the command control node, the task channel is established; 6) and the nodes in the task channel synchronize the task contract content and initialize the task storage.
As a further improvement of the invention: the execution flow of the task execution module plays a role in both the intelligence flow and the finger control flow by setting the task execution logic and the operation rule so as to realize the on-demand calling of the information resources in the agile finger control and the dynamic adjustment of the finger control relationship.
Compared with the prior art, the invention has the advantages that:
1. the agile finger control system based on the block chain establishes a network model meeting agile finger control application and block chain architecture requirements based on node task differentiation, thereby achieving the advantages of more reasonable system structure, strong functional adaptability, better expandability and the like.
2. The agile finger control system based on the block chain further establishes a service model of the agile finger control core process based on the flexible and extensible intelligent contract unit. Meanwhile, an instruction control event recording model supporting disk replication and audit is established based on block chain trusted data recording. The whole system builds a prototype system based on the alliance chain frame, and tests and analyzes the system performance.
Drawings
FIG. 1 is a schematic of the topology of the system of the present invention.
Fig. 2 is a schematic diagram of a task channel in a specific application example of the invention.
FIG. 3 is a schematic diagram of an intelligence flow model in an embodiment of the invention.
FIG. 4 is a schematic diagram of a flow model controlled in a specific application example of the present invention.
FIG. 5 is a schematic diagram of an event logging model in a specific application example of the present invention.
FIG. 6 is a schematic diagram of an event block model in an embodiment of the present invention.
Detailed Description
The invention will be described in further detail below with reference to the drawings and specific examples.
The invention adopts the block chain as the key technology of the agility finger control system, and the block chain is a novel technical system combining peer-to-peer network, distributed storage, encryption algorithm, consensus algorithm and virtual machine technology. The typical block chain system is a peer-to-peer network which is widely interconnected and intercommunicated by a plurality of computer nodes, and the nodes jointly determine which data are approved and recorded through encryption communication and a consensus mechanism; the approved data records form a chain structure connected in front and back on the basis of a Hash algorithm, and distributed backups are stored in all nodes; by means of a code execution environment established by a virtual machine technology, an intelligent contract can be flexibly deployed in a block chain system according to requirements to support various decentralized applications, and the running data of the intelligent contract also retains traceable and hard-to-tamper records in the system. From the practical effect, the block chain avoids the defects in the traditional linear and centralized system architecture through the proper design of the mutual relation between the system flow and the network nodes, builds a safe, reliable, flexible and extensible distributed application execution environment with high reliability and good adaptability, and well responds to various requirements of the agile finger control information system. Therefore, the agile finger control system and the block chain technology are innovatively combined, firstly, the composition architecture of the agile finger control system is innovatively designed, and the traditional block chain technology is further improved and perfected by combining the characteristics of the agile finger control system, so that the agile finger control system meets the actual requirement of the agile finger control system.
As shown in fig. 1, the agile finger control system based on block chain of the present invention comprises:
the information resource node is a basic support node for establishing an agile finger control system based on a block chain and is used as a main calculation, storage and communication carrier for the operation of the agile finger control-oriented block chain system, and the rest nodes are accessed to the system by establishing a connection relation with the information resource node;
the command control node is used as a main body for implementing command control functions, and communicates information flow and command control flow with information resources and an execution terminal after accessing the system;
the task terminal nodes are used as carriers for executing various tasks, and specifically comprise various equipment with data processing and communication capabilities and the like; and the task terminal node is accessed to the agile finger-controlled block chain system through the information resource node.
And each node added into the system realizes identity identification and control of various authorities based on the digital identity certificate.
According to the technical characteristics and the functional positioning of different subjects in the agile finger control activity, all the participating nodes of the system can be divided into three major classes, namely information resource nodes, command control nodes and task terminal nodes. The nodes are widely interconnected in a peer-to-peer network on a physical level, as shown in fig. 1.
In a specific application example, the information resource node is usually established by a host which has high reliability and reliability, strong operation and storage performance and can run for a long time; by writing the operation logic of the agile finger control block chain system into the information resource node, the information resource node mainly realizes the following functions: 1) sufficient computing resources are provided for system operation and intelligent contract execution. 2) And stable and efficient storage and reading services are provided for various data of the system. 3) Maintaining a persistent and fast network connection and communication with the rest of the system.
In a specific application example, the task terminal node realizes the following functions under the regulation and control of an intelligent contract in the processes of command control and task execution: 1) and reporting the respective spatial position, running state, environmental information and other key information in real time. 2) And receiving scheduling and control instructions of node users with corresponding authorities. 3) And calling information resources according to the command information and the intelligent contract strategy request of the authority.
In a specific application example, the command control node realizes the following functions under the regulation and control of an intelligent contract: 1) information resources such as information data and processing computing power are called. 2) And issuing command control instructions to the task execution unit and the execution equipment. 3) And coordinating the relationship with the rest command control nodes.
In a specific application example, the present invention can refer to a Public Key Infrastructure (PKI) system, and enable each node added to the system to realize identification of identity and management and control of various permissions based on a digital identity certificate.
In a specific application example, in the operation of the system, except that the information resource nodes need to be kept stably online, the command control and task terminal nodes can be added into or withdrawn from the block chain network as required.
In a specific application example, when a plurality of nodes aim at specific task requirements, a special data communication connection can be established as a task channel. For example, when a task needs to be executed, the relevant node determines an encryption method, a consensus rule, and the like according to a task contract, establishes a task channel, and maintains corresponding task data, as shown in fig. 2.
Further, the mechanism of the task channel can realize the autonomous definition of the task and the calling of each node according to the requirements, and ensures the flexibility of the system function and the confidentiality of the task information.
Based on the task channel, in a preferred embodiment, the invention further comprises an intelligent contract unit, wherein the intelligent contract unit is a main carrier for executing application and function realization on the chain, and the agile finger control service is mainly developed around three core links of compiling the task contract, establishing the task channel and executing the task. Wherein:
and (3) task contract compilation: the task in the agility control concept refers to the series of goal states that each participant needs to achieve and the corresponding actions to be paid. The task contract is the standardized setting of the content such as task connotation, participators, operation rules and the like in the block chain system, and is usually compiled by a command control node with authority.
In particular embodiments, a typical task contract contains the following: 1) task number [ Task _ id ]; 2) task content [ Task _ content ]: defining the object, time, target state, execution region and the like of the task; 3) task rule [ Task _ rule ]: the authority setting and operation rules of each node in the current task channel specifically comprise two aspects of a directive control Rule [ Rule _ C2] and an intelligence Rule [ Rule _ inteligence ]. 4) Mandatory seat [ Node _ directory ]: a system node list which needs to be forced to participate in the current task is specified in a digital identity form; 5) open seat [ Node _ optinal ]: the seats of the nodes which are not appointed temporarily can receive the application of the nodes meeting the conditions in the system or remain for subsequent appointments; 6) encryption communication method [ Encrypt _ method ]: an encryption algorithm adopted by the current task channel; 7) consensus rule [ Consensus ]: and each node in the current task channel forms a network consensus method mechanism. The task content and the task rule are encrypted in an asymmetric mode and are only visible to the nodes with the specified identities.
Establishing a task channel: the method comprises the following specific steps: 1) signing the contract with a digital identity by an instruction node of the contract; 2) encrypting and submitting the encrypted data to corresponding nodes according to a preset approval rule; 3) the control nodes with corresponding authorities decrypt the contracts and approve the contracts, and the approved task contracts are issued to the block chain network; 4) forcibly establishing an encrypted communication link between nodes specified by seats, and initially establishing a task channel; 5) the open seat receives the node application in the system, and after the application passes or is specified again by the command control node, the task channel is established; 6) and the nodes in the task channel synchronize the task contract content and initialize the task storage.
And (3) executing the tasks: task execution is the process of combining subjective initiative and system informatization assistance of participants. In the agile guidance system based on the block chain, a task contract plays a role in both the information flow and the guidance flow mainly by setting task execution logic and operation rules so as to realize the on-demand calling of information resources and the dynamic adjustment of the guidance relation in agile guidance.
Intelligence requests are usually made by task end nodes or command control nodes, and here, the task end nodes are taken as an example to describe the system intelligence flow. Referring to fig. 3, the method specifically includes the following steps: 1) a task terminal node provides an intelligence request, wherein intelligence data to be accessed needs to be appointed to be hashed, and the intelligence data is signed by the digital identity of the task terminal node; 2) according to the information rule defined by the task contract, requesting to submit each node with authority in the system for verification; 3) if the verification is valid, the information resource node inquires information data in an information library; 4) returning to the task node which provides the request after the data query is successful; 5) after the data is returned, the contract generates an information data event, submits the system consensus process and writes the information data event into a system event recording block.
The command control instruction is sent by a command control node in the system, and another command control node or a task terminal node executes the command control instruction. In order to meet the requirement of constructing a dynamic command control relationship, the system does not limit the forced corresponding relationship between the command control node and the task node, but judges and defines the forced corresponding relationship by the command control rule in the task contract, so that any command control node of the command control instruction can flow to other command control nodes or any task terminal node under the verification of the system. Referring to fig. 4, taking the example that the command control node sends a command instruction to the task terminal node, the main flow is as follows: 1) the method comprises the steps that an instruction control node makes an instruction control instruction, wherein a task terminal node needing to complete a current instruction needs to be specified, and a signature is made according to the digital identity of the instruction control node; 2) verifying each node with authority in the instruction submitting system according to an instruction control rule defined by a task contract; 3) if the verification is valid, the task terminal node starts to execute the instruction control instruction; 4) after the execution is finished, the task terminal node returns an execution result; 5) and generating an instruction control event by the task contract, submitting the system consensus process, and writing the instruction control event into a system event recording block. In the two processes, the communication between the nodes is completed by means of the task channel. The node-node consensus mechanism can adopt Raft of a alliance chain, a PBFT algorithm and the like.
As a preferred embodiment, the present invention is based on block-chain technology, and therefore differs from the conventional database recording model. The transaction data in the blockchain system is stored and packaged in a hash chain structure after being confirmed by a system consensus process, and distributed backup is kept in system nodes. Therefore, the stored command control and information event data are difficult to tamper and easy to verify, and can better support the requirements of disk duplication and audit.
In this embodiment, the event record model in the system mainly includes two types, namely, an intelligence event and a command event. Referring to fig. 5, the intelligence event mainly includes timestamp information, intelligence event tags, request to provide node digital signatures, verify node digital signature lists, intelligence data hash values, and other information; the command event mainly comprises information such as timestamp information, a command event label, a digital signature of an instruction sending node, a verification node digital signature list, a digital signature of an instruction execution node, an instruction execution result and the like. The event records are arranged according to the time sequence, and the next record contains the hash value of the previous record, so that the close relation of front and back links is formed.
After a certain number of event records are stored, the system packs them into a tile. As shown in fig. 6, each chunk contains several event records, and the chunk header records information such as a timestamp for chunk packing, a chunk number, and Merkle roots of all event records. Similar to event logging, the blocks are also linked together by a hash value that contains the previous block header.
The above is only a preferred embodiment of the present invention, and the protection scope of the present invention is not limited to the above-mentioned embodiments, and all technical solutions belonging to the idea of the present invention belong to the protection scope of the present invention. It should be noted that modifications and embellishments within the scope of the invention may be made by those skilled in the art without departing from the principle of the invention.

Claims (10)

1. An agile finger control system based on a blockchain, comprising:
the information resource nodes are basic support nodes for establishing an agile finger control system based on the block chain and are used as carriers for the agile finger control-oriented block chain system to operate, and the rest nodes are accessed to the system by establishing connection relations with the information resource nodes;
the command control node is used as a main body for implementing command control functions, and communicates information flow and command control flow with information resources and an execution terminal after accessing the system;
the task terminal nodes are used as carriers for executing various tasks, and specifically comprise various equipment with data processing and communication capabilities and the like; the task terminal node accesses the agile finger block chain system through the information resource node;
each node is added into the block chain network based on the digital identity certificate to realize identity identification and control of various authorities.
2. The blockchain-based agile guidance system of claim 1 wherein the information resource node system is configured to provide computing resources for run and intelligent contract execution, storage and read services for various types of data in the system, and maintain network connections and communications with the rest of the system nodes.
3. The block chain-based agile guidance system according to claim 1, wherein the task terminal nodes are configured to report respective spatial location, operating state, and environmental information in real time, receive scheduling and control instructions of node users with corresponding permissions, and invoke information resources according to guidance information and permission intelligent contract policy requests.
4. The block chain based agile guidance system according to claim 1 wherein the guidance control nodes invoke information resources under intelligent contract regulation and are used to issue guidance control commands to task execution units and execution equipment to coordinate the relationship with the rest of the guidance control nodes.
5. The blockchain-based agile finger control system according to any one of claims 1-4 wherein in operation of the system, except for information resource nodes remaining stably online, command control phases and task end nodes join or leave the blockchain network as needed.
6. The block chain based agile guidance system according to any one of claims 1-4 further comprising a task channel for the established dedicated data communication connection, the mechanism of the task channel being used to enable the autonomous definition of tasks and the on-demand invocation of nodes.
7. The block chain based agility guidance system according to claim 6 further comprising an intelligent contract unit, wherein the intelligent contract unit is a carrier for executing on-chain applications and function implementations, and the intelligent contract unit comprises a task contract compilation module, a task channel establishment module, and a task execution module.
8. The blockchain-based agility guidance system according to claim 7, wherein the task contract compilation module is configured to perform standardized setting on task connotations, participants and operation rule contents in the blockchain system, compiled by a command control node with authority.
9. The block chain based agility guidance system according to claim 7, wherein the task channel establishing module performs the following steps: 1) signing the contract with a digital identity by an instruction node of the contract; 2) encrypting and submitting the encrypted data to corresponding nodes according to a preset approval rule; 3) the control nodes with corresponding authorities decrypt the contracts and approve the contracts, and the approved task contracts are issued to the block chain network; 4) forcibly establishing an encrypted communication link between nodes specified by seats, and initially establishing a task channel; 5) the open seat receives the node application in the system, and after the application passes or is specified again by the command control node, the task channel is established; 6) and the nodes in the task channel synchronize the task contract content and initialize the task storage.
10. The system according to claim 7, wherein the task execution module performs an action in both the intelligence flow and the finger flow by setting task execution logic and operation rules, so as to realize on-demand calling of information resources and dynamic adjustment of finger relationship in agile finger control.
CN202110853816.9A 2021-07-27 2021-07-27 Agile control system based on block chain Active CN113595737B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110853816.9A CN113595737B (en) 2021-07-27 2021-07-27 Agile control system based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110853816.9A CN113595737B (en) 2021-07-27 2021-07-27 Agile control system based on block chain

Publications (2)

Publication Number Publication Date
CN113595737A true CN113595737A (en) 2021-11-02
CN113595737B CN113595737B (en) 2023-10-13

Family

ID=78250731

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110853816.9A Active CN113595737B (en) 2021-07-27 2021-07-27 Agile control system based on block chain

Country Status (1)

Country Link
CN (1) CN113595737B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116760637A (en) * 2023-08-16 2023-09-15 中国人民解放军军事科学院系统工程研究院 High-safety command control system and method based on double-chain architecture

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016183969A1 (en) * 2015-05-19 2016-11-24 中兴通讯股份有限公司 Emergency processing method, emergency commanding and dispatching station, and emergency commanding and dispatching system
KR101728479B1 (en) * 2017-01-16 2017-05-02 엘아이지넥스원 주식회사 Sensor node arrangement and management method for unattended ground sensor node system
CN108540507A (en) * 2017-03-02 2018-09-14 北京好扑信息科技有限公司 One kind conveying traceability system and retroactive method based on block chain digitlization command control information
CN109450856A (en) * 2018-10-12 2019-03-08 西安电子科技大学 Data-link information flow control system and method based on block chain
KR102044396B1 (en) * 2018-05-25 2019-11-13 서강대학교산학협력단 System and method for managing national disaster safety based on a blockchain
CN112417480A (en) * 2020-11-25 2021-02-26 中国传媒大学 Data storage system and method based on block chain

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016183969A1 (en) * 2015-05-19 2016-11-24 中兴通讯股份有限公司 Emergency processing method, emergency commanding and dispatching station, and emergency commanding and dispatching system
KR101728479B1 (en) * 2017-01-16 2017-05-02 엘아이지넥스원 주식회사 Sensor node arrangement and management method for unattended ground sensor node system
CN108540507A (en) * 2017-03-02 2018-09-14 北京好扑信息科技有限公司 One kind conveying traceability system and retroactive method based on block chain digitlization command control information
KR102044396B1 (en) * 2018-05-25 2019-11-13 서강대학교산학협력단 System and method for managing national disaster safety based on a blockchain
CN109450856A (en) * 2018-10-12 2019-03-08 西安电子科技大学 Data-link information flow control system and method based on block chain
CN112417480A (en) * 2020-11-25 2021-02-26 中国传媒大学 Data storage system and method based on block chain

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
DU XING-ZHOU: "Research on Blockchain-based Information Transmission and Tracing Pattern in Digitized Command-and-Control System", 《COMPUTER SCIENCE》 *
中国指挥与控制学会: "面向敏捷C2的区块链赋能跨域服务", 《中国指挥与控制学报》 *
杜行舟: "基于区块链的数字化指挥控制系统信息传输与追溯模式研究", 《计算机科学》 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116760637A (en) * 2023-08-16 2023-09-15 中国人民解放军军事科学院系统工程研究院 High-safety command control system and method based on double-chain architecture
CN116760637B (en) * 2023-08-16 2023-11-03 中国人民解放军军事科学院系统工程研究院 High-safety command control system and method based on double-chain architecture

Also Published As

Publication number Publication date
CN113595737B (en) 2023-10-13

Similar Documents

Publication Publication Date Title
CN109040271B (en) Network equipment integrity protection method under distributed environment
CN111930851B (en) Control data processing method, device, medium and electronic equipment of block chain network
CN111461723B (en) Data processing system, method and device based on block chain
CN110502927B (en) Information processing method and related device
CN102170440B (en) Method suitable for safely migrating data between storage clouds
CN110032545A (en) File memory method, system and electronic equipment based on block chain
CN114978638B (en) Block chain cross-chain supervision method based on shared node
CN114445010B (en) Block chain-based multi-mode intermodal system and method
CN112835977B (en) Database management method and system based on block chain
CN111950019A (en) Block chain-based Internet of things access control system and method
CN113821564A (en) Heterogeneous parallel block chain and on-chain data and under-chain contract cooperation method thereof
Bhattacharjee et al. Blockchain-based secure and reliable manufacturing system
CN112491804A (en) ICS (Internet connection sharing) security policy method based on block chain
CN115065690A (en) Decentralized system and method based on different heterogeneous instruction sets
CN111177766B (en) Block chain management system and management method applied to pipeline integrity management
CN109474706B (en) data security centralized service method and system
CN113595737A (en) Agile finger control system based on block chain
Şafak et al. Hybrid database design combination of blockchain and central database
Li et al. Controlled sharing mechanism of data based on the consortium blockchain
KR20190086301A (en) System and method for distributed database using block chain
CN113420083B (en) System with heterogeneous parallel block chain structure of extensible distributed ledger
CN113449014B (en) Selective cloud data query system based on block chain
KR20200048708A (en) Method for providing encryption communication in a distributed computing resource shring system based on block chain
KR20200048722A (en) Method for providing encryption communication using the same key within a working group in a distributed computing resource shring system based on block chain
Zhu A survey on mobile edge platform with blockchain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant