CN115309830A - Block chain-based asset inventory method, system, device, equipment and medium - Google Patents

Block chain-based asset inventory method, system, device, equipment and medium Download PDF

Info

Publication number
CN115309830A
CN115309830A CN202211237143.5A CN202211237143A CN115309830A CN 115309830 A CN115309830 A CN 115309830A CN 202211237143 A CN202211237143 A CN 202211237143A CN 115309830 A CN115309830 A CN 115309830A
Authority
CN
China
Prior art keywords
active
identity
carrier module
mobile robot
identification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211237143.5A
Other languages
Chinese (zh)
Inventor
尹子航
池程
杨鹏
张钰雯
刘阳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Academy of Information and Communications Technology CAICT
Original Assignee
China Academy of Information and Communications Technology CAICT
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Academy of Information and Communications Technology CAICT filed Critical China Academy of Information and Communications Technology CAICT
Priority to CN202211237143.5A priority Critical patent/CN115309830A/en
Publication of CN115309830A publication Critical patent/CN115309830A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]

Abstract

The embodiment of the disclosure discloses an asset checking method, system, device, equipment and medium based on a block chain, relating to the field of block chains, wherein the method comprises the following steps: acquiring a first industrial internet identification of a target object by using a movable robot; the method comprises the steps that a first industrial internet identification is sent to a preset analysis server by using an active identification carrier module built in the mobile robot, so that the analysis server determines asset information of a target object by analyzing the first industrial internet identification; receiving asset information sent by an analysis server by using an active identification carrier module; generating encrypted data by using the active identity carrier module based on the asset information; and storing the encrypted data to the block chain by utilizing the active identification carrier module. In the process of combining the industrial internet and the block chain to the asset inventory through the movable robot, the automation of acquisition, encryption and evidence-storing chain linking of the asset inventory data can be realized, and the intelligence, safety and efficiency of the asset inventory can be improved.

Description

Block chain-based asset inventory method, system, device, equipment and medium
Technical Field
The present disclosure relates to the field of blockchain technologies, and in particular, to a method, a system, an apparatus, a device, and a storage medium for asset inventory based on blockchain.
Background
In practice, an enterprise usually encodes asset data according to its own requirements and encoding rules, generates a two-dimensional code or a barcode according to the encoding result, and attaches the two-dimensional code or barcode to the surface of the asset. When the assets are checked, a checking person can obtain the checking data of the assets by scanning the two-dimensional codes or the bar codes of the assets, and transfer and store the checking data.
Therefore, the process of asset checking highly depends on manual operation, the intelligent degree is low, and the labor cost is high and the efficiency is low.
Disclosure of Invention
The embodiment of the disclosure provides an asset checking method, system, device, equipment and storage medium based on a block chain.
In one aspect of the embodiments of the present disclosure, an asset checking method based on a block chain is provided, including: acquiring a first industrial internet identification of a target object by using a movable robot; the method comprises the steps that a first industrial internet identification is sent to a preset analysis server by using an active identification carrier module built in the mobile robot, so that the analysis server determines asset information of a target object by analyzing the first industrial internet identification; receiving asset information sent by an analysis server by using an active identification carrier module; generating encrypted data by using the active identity carrier module based on the asset information; and storing the encrypted data to the block chain by utilizing the active identification carrier module.
In some embodiments, the method further comprises: acquiring position information of the movable robot by using a positioning module preset in the movable robot; generating, based on the asset information, encrypted data with an active identity bearer module, comprising: binding the asset information with the position information by using an active identification carrier module; and encrypting the bound asset information and position information by using the active identification carrier module to generate encrypted data.
In some embodiments, the method further comprises: and interacting with the active identification carrier security authentication service platform by using the active identification carrier module to receive the instruction sent by the active identification carrier security authentication service platform and execute the received instruction.
In some embodiments, interacting with the active identity carrier security authentication service platform using the active identity carrier module includes: receiving an identification editing instruction sent by an active identification carrier safety certification service platform by using an active identification carrier module; and editing the second industrial internet mark of the movable robot by using the active mark carrier module according to the mark editing instruction.
In some embodiments, the mobile robot has a trusted credential pre-stored therein; the method further comprises the following steps: the identity of the active identification carrier module and the information of the enterprise to which the mobile robot belongs are sent to an active identification carrier security authentication service platform, so that the active identification carrier security authentication service platform can carry out identity verification on the mobile robot; when the verification passes, generating a credible certificate based on the identity of the active identification carrier module and the information of the enterprise to which the mobile robot belongs; and sending the trusted voucher to the mobile robot.
In some embodiments, the sending the first industrial internet identity to a preset resolution server by using an active identity carrier module built in the mobile robot includes: sending an identity verification request to an analysis server by using an active identification carrier module so that the analysis server can verify the identity of the mobile robot, wherein the identity verification request comprises a trusted certificate and an identity of the active identification carrier module; and when the verification is passed, the active identification carrier module is utilized to send a first industrial Internet identification to the analysis server.
According to another aspect of an embodiment of the present disclosure, there is provided a block chain-based inventory system, including: the mobile robot is used for acquiring a first industrial Internet mark of a target object and sending the first industrial Internet mark to the analysis server by using the active mark carrier module; the analysis server is used for analyzing the first industrial Internet identification to determine the asset information of the target object and sending the asset information to the movable robot; the movable robot is also used for generating encrypted data by utilizing the active identification carrier module based on the asset information and storing the encrypted data to the block chain; the blockchain is used to store encrypted data.
In some embodiments, the system further comprises an active identification carrier security certification service platform used for data interaction with the mobile robot and the enterprise to which the mobile robot belongs, and performing trusted certification on the mobile robot.
According to still another aspect of an embodiment of the present disclosure, there is provided a block chain-based asset inventory apparatus including: an acquisition unit configured to acquire a first industrial internet identification of a target object using a mobile robot; the mobile robot comprises an analysis unit and a control unit, wherein the analysis unit is configured to utilize an active identification carrier module built in the mobile robot to send a first industrial internet identification to a preset analysis server so that the analysis server can determine asset information of a target object by analyzing the first industrial internet identification; the receiving unit is configured to receive the asset information sent by the analysis server by using the active identification carrier module; an encryption unit configured to generate encrypted data using the active identity bearer module based on the asset information; a storage unit configured to store the encrypted data to the blockchain using the active identification carrier module.
According to still another aspect of an embodiment of the present disclosure, there is provided an electronic device including: a memory for storing a computer program product; a processor for executing the computer program product stored in the memory, and when the computer program product is executed, the method of any of the above embodiments is implemented.
According to yet another aspect of an embodiment of the present disclosure, there is provided a computer-readable storage medium having stored thereon computer program instructions, which, when executed by a processor, implement the method in any of the above embodiments.
According to the asset checking method based on the block chain, a movable robot acquires a first industrial Internet identification of a target object, and the first industrial Internet identification is sent to an analysis server through a built-in active identification carrier module so as to acquire analyzed asset information; and then, encrypting the asset information by using the active identification carrier module, and storing the encrypted data to the block chain. In the process of combining the industrial internet and the block chain to the asset inventory through the movable robot, the automation of acquisition, encryption and evidence-storing chain linking of the asset inventory data can be realized, the cost consumption is reduced, and the intelligence, safety and efficiency of the asset inventory are improved.
The technical solution of the present disclosure is further described in detail by the accompanying drawings and examples.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments of the disclosure and together with the description, serve to explain the principles of the disclosure.
The present disclosure may be more clearly understood from the following detailed description, taken with reference to the accompanying drawings, in which:
FIG. 1 is a schematic diagram of a scenario in which the blockchain-based asset inventory method of the present disclosure is applicable;
FIG. 2 is a schematic flow chart diagram illustrating one embodiment of a blockchain-based asset inventory method of the present disclosure;
FIG. 3 is a schematic flow chart diagram illustrating yet another embodiment of a blockchain-based asset inventory method of the present disclosure;
FIG. 4 is a schematic flow chart diagram illustrating trusted authentication in one embodiment of a blockchain-based asset inventory method of the present disclosure;
FIG. 5 is an architectural diagram of a blockchain-based asset inventory system of the present disclosure;
FIG. 6 is a block chain based asset inventory apparatus in accordance with one embodiment of the present disclosure;
fig. 7 is a schematic structural diagram of an application embodiment of the electronic device of the present disclosure.
Detailed Description
Various exemplary embodiments of the present disclosure will now be described in detail with reference to the accompanying drawings. It should be noted that: the relative arrangement of parts and steps, numerical expressions and numerical values set forth in these embodiments do not limit the scope of the present disclosure unless specifically stated otherwise.
It will be understood by those of skill in the art that the terms "first," "second," and the like in the embodiments of the present disclosure are used merely to distinguish one element from another, and are not intended to imply any particular technical meaning, nor is the necessary logical order between them.
It is also understood that in embodiments of the present disclosure, "a plurality" may refer to two or more and "at least one" may refer to one, two or more.
It is also to be understood that any reference to any component, data, or structure in the embodiments of the present disclosure may be generally understood as one or more, unless explicitly defined otherwise or indicated to the contrary hereinafter.
In addition, the term "and/or" in the present disclosure is only one kind of association relationship describing an associated object, and means that three kinds of relationships may exist, for example, a and/or B may mean: a exists alone, A and B exist simultaneously, and B exists alone. In addition, the character "/" in the present disclosure generally indicates that the former and latter associated objects are in an "or" relationship.
It should also be understood that the description of the various embodiments of the present disclosure emphasizes the differences between the various embodiments, and the same or similar parts may be referred to each other, so that the descriptions thereof are omitted for brevity.
Meanwhile, it should be understood that the sizes of the respective portions shown in the drawings are not drawn in an actual proportional relationship for the convenience of description.
The following description of at least one exemplary embodiment is merely illustrative in nature and is in no way intended to limit the disclosure, its application, or uses.
Techniques, methods, and apparatus known to those of ordinary skill in the relevant art may not be discussed in detail but are intended to be part of the specification where appropriate.
It should be noted that: like reference numbers and letters refer to like items in the following figures, and thus, once an item is defined in one figure, it need not be discussed further in subsequent figures.
The disclosed embodiments may be applied to electronic devices such as terminal devices, computer systems, servers, etc., which are operational with numerous other general purpose or special purpose computing system environments or configurations. Examples of well known terminal devices, computing systems, environments, and/or configurations that may be suitable for use with electronic devices, such as terminal devices, computer systems, servers, and the like, include, but are not limited to: personal computer systems, server computer systems, thin clients, thick clients, hand-held or laptop devices, microprocessor-based systems, set-top boxes, programmable consumer electronics, networked personal computers, minicomputer systems, mainframe computer systems, distributed cloud computing environments that include any of the above, and the like.
Electronic devices such as terminal devices, computer systems, servers, etc. may be described in the general context of computer system-executable instructions, such as program modules, being executed by a computer system. Generally, program modules may include routines, programs, objects, components, logic, data structures, etc. that perform particular tasks or implement particular abstract data types. The computer system/server may be practiced in distributed cloud computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed cloud computing environment, program modules may be located in both local and remote computer system storage media including memory storage devices.
In the process of implementing the present disclosure, the inventor finds that, in the current asset inventory process, there are many links that require manual operation, for example, links of acquiring, transferring, and storing asset information, which all require consumption of more human resources, resulting in higher human cost and time cost, and the complex operation process results in lower efficiency of asset inventory.
The blockchain-based asset inventory method of the present disclosure is exemplarily described below with reference to fig. 1, and fig. 1 shows a schematic view of a scenario to which the blockchain-based asset inventory method of the present disclosure is applicable. As shown in fig. 1, the scenario includes: mobile robot 100, resolution server 110, blockchain 120, device to be inventoried 130, and first industrial internet identity 140 attached to device 130. The mobile robot 100 may be an AGV (Automated Guided Vehicle) or an unmanned aerial Vehicle (drone) provided with an active identification carrier module and a scanner.
The active identity carrier module has an active networking communication capability, in which an industrial internet identity (i.e. a second industrial internet identity), an industrial Application APP (Application), an active identity carrier SDK (Software Development Kit) of the mobile robot, and necessary security certificates (e.g. trusted credentials of an active identity carrier security authentication service platform), an encryption algorithm, a secret key, and the like are preloaded. The active identification carrier module can interact with a server of an enterprise by means of industrial application software, such as receiving operation instructions of the server, uploading data to the server and the like. Meanwhile, the active identification carrier module can also receive data or an operation instruction issued by the identification carrier security authentication service platform through the active identification carrier SDK, for example, receive a trusted certificate, an editing instruction for the second industrial internet identification, and the like. For another example, the id carrier security authentication service platform may further write information such as an IP address or a URL address of the resolution server into the active id carrier module, so that the active id carrier module communicates with the resolution server. In addition, the active identifier carrier module may further encrypt data by using a key, and store the encrypted data to the blockchain 120. By way of example, the active identification carrier module may take the form of an integrated circuit card, a secure chip, a communication module, or the like.
The resolution server 110 may belong to a secondary identifier resolution node in an industrial internet system, and generally refers to an identifier resolution public service node in an industry or a region, each secondary identifier resolution node is assigned with a unique secondary node identifier prefix by a national top node, and can provide industrial internet identifier registration and resolution services for the industry or the region, and complete related identifier service management, identifier application docking and the like.
The resolution server 110 may also belong to an enterprise node in the industrial internet system, each enterprise node may be assigned a unique enterprise node identifier prefix by the secondary identification resolution node, the content of the identifier suffix may be defined and assigned by the enterprise itself, and the enterprise node identifier prefix and the identifier suffix constitute an industrial internet identifier of the enterprise, for example, the first industrial internet identifier 140 of the device 130. The enterprise nodes can be independently deployed, can also be used as the constituent elements of an enterprise information system, and can provide industrial internet identification registration and identification analysis services for specific enterprises.
Blockchain 120 may include a service node and at least one backbone node, where the backbone node may supervise the service node and the service node may store on-chain data.
In the system shown in fig. 1, the mobile robot 100 may scan the first industrial internet identity 140 attached to the surface of the device 130 by using the scanner, and then transmit the scanned first industrial internet identity 140 to the resolution server 110 through the active identity carrier module, and the resolution server 110 resolves the first industrial internet identity 140 to determine asset information of the device 130, which may include, for example, a production date, a name, a model number, and the like of the device 130. After the analysis server 110 sends the asset information to the mobile robot 100, the mobile robot 100 may encrypt the asset information by using an encryption algorithm and a key pre-stored in the active identity carrier module, and store the encrypted data to the block chain 120, so as to implement trusted certification of the asset inventory data. The mobile robot 100 may move in the scene according to the instruction or the pre-planned path, and perform the above operations on the device or other target objects in the scene, that is, may implement automatic inventory of the target objects in the scene.
The blockchain-based asset inventory method of the present disclosure is exemplarily described below with reference to fig. 2, and fig. 2 shows a flowchart of an embodiment of the blockchain-based asset inventory method of the present disclosure, and as shown in fig. 2, the flowchart includes the following steps.
Step 210, acquiring a first industrial internet identification of the target object by using the movable robot.
In the present embodiment, the target object represents an item to be inventoried, and may be, for example, a device, a product, or the like. The first industrial internet identity may represent a unique identity of the target object, and generally consists of an industrial internet identity prefix of the enterprise node and an enterprise-defined identity suffix. As an example, the first industrial internet identity may be encoded into a two-dimensional code and attached to the surface of the target object in the form of a picture. The mobile robot may obtain a first industrial internet identification of the target object via the scanner. For another example, the first industrial internet identifier may also be carried by using a Radio Frequency Identification (RFID).
In the embodiment, industrial internet is used as the identification of the target object, and by means of an industrial internet system, cross-industry and cross-enterprise information intercommunication can be realized, a data island image can be avoided, and accurate butt joint of a global supply chain system and an enterprise production system, full life cycle management of products and intelligent service can be realized.
And step 220, sending the first industrial internet identification to a preset analysis server by using an active identification carrier module built in the mobile robot, so that the analysis server determines asset information of the target object by analyzing the first industrial internet identification.
In this embodiment, the mobile robot may interact with the resolution server through an industrial application APP preset in the active identifier carrier module, so as to send the first industrial internet identifier obtained in step 210 to the resolution server. And the analysis server analyzes the first industrial Internet identification according to a predetermined data model, determines asset information of the target object and returns the asset information to the active identification carrier module.
As an example, the resolution server may be a resolution server of an enterprise node in an industrial internet system of an enterprise to which the mobile robot belongs, or may be a resolution server of a secondary identification resolution node. The asset information may include a production date, name, model number, etc. of the target object.
In some optional embodiments of this embodiment, before the mobile robot sends the first industrial internet identifier to the resolution server by using the active identifier carrier module, the mobile robot may first initiate a data reporting request to the resolution server through the active identifier carrier module, where the data reporting request may include an identity identifier of the mobile robot, so that the resolution server verifies the identity of the mobile robot. When the verification is passed, the mobile robot is allowed to send the first industrial Internet identification to the analysis server, and information leakage can be avoided. As an example, the identity of the mobile robot may be a second industrial internet identity of the mobile robot, a unique identity of an active identification carrier configured by the mobile robot, a trusted credential, and/or the like.
And step 230, receiving asset information sent by the analysis server by using the active identification carrier module.
Step 240, generating encrypted data by using the active identity carrier module based on the asset information.
In this embodiment, the encrypted data represents data obtained by the mobile robot performing inventory on the target object, and the active identifier module may encrypt the asset information according to a preset encryption algorithm and a key to generate encrypted data capable of being linked.
Step 250, storing the encrypted data to the block chain by using the active identification carrier module.
In this embodiment, the mobile robot may send the encrypted data to the node device of the blockchain by using the active identity carrier module, and the node device completes the uplink operation of the encrypted data, so that the asset information of the target object may be stored in the blockchain.
According to the asset checking method based on the block chain, a movable robot obtains a first industrial internet mark of a target object, and the first industrial internet mark is sent to an analysis server through a built-in active mark carrier module so as to obtain analyzed asset information; and then, encrypting the asset information by using the active identification carrier module, and storing the encrypted data to the block chain. In the process of combining the industrial internet and the block chain to the asset checking through the movable robot, the automation of acquisition, encryption and evidence storage and chaining of the asset checking data can be realized, the information intercommunication between industries and enterprises can be realized, the cost consumption is reduced, and the intelligence, the safety and the efficiency of the asset checking are improved.
Referring next to fig. 3, fig. 3 illustrates a flow chart of yet another embodiment of a blockchain-based asset inventory method of the present disclosure, as shown in fig. 3, including the following steps.
Step 310, a first industrial internet identification of a target object is obtained by the movable robot.
And 320, sending the first industrial internet identification to a preset analysis server by using an active identification carrier module built in the mobile robot, so that the analysis server determines the asset information of the target object by analyzing the first industrial internet identification.
And step 330, receiving asset information sent by the analysis server by using the active identification carrier module.
It should be noted that steps 310 to 330 correspond to steps 210 to 230, and are not described herein again.
And 340, acquiring the position information of the movable robot by using a preset positioning module in the movable robot.
In practice, the mobile robot is generally closer to the target object when performing the inventory task, and thus, the position of the target object may be characterized by the position of the mobile robot. As an example, the mobile robot is preset with a GPS module or a beidou module for acquiring the position information of the mobile robot in real time.
It should be noted that, in this embodiment, the order between step 340 and step 310, step 320, and step 330 is not limited, for example, step 340 may be located before step 310, or may be located between step 310, step 320, and step 330.
And step 350, binding the asset information with the position information by using the active identification carrier module.
In this embodiment, the mobile robot may utilize the active identification carrier module to bind the asset information obtained in step 330 and the location information obtained in step 340, so as to associate the inventory data and the location in the inventory process.
As an example, the active identification carrier module may directly combine the asset information of the target object and the position information of the mobile robot, and the obtained information may indicate the position of the target object when the asset information is obtained. In this way, the position tracking of the target object can be realized.
In one particular example, the mobile robot may be a drone, which may be positioned in real-time using its preset positioning module. When the target object is in the transportation process, the asset information of the target object can be determined by the unmanned aerial vehicle, and then the asset information is bound with the position information of the unmanned aerial vehicle, so that the association between the asset information of the target object and the real-time position can be realized, and the transportation process of the target device can be monitored.
And step 360, encrypting the bound asset information and position information by using the active identification carrier module to generate encrypted data.
Step 370, store the encrypted data to the blockchain using the active identity carrier module.
In this embodiment, steps 360 and 370 correspond to steps 240 and 250, which are not described herein again.
The embodiment shown in fig. 3 can bind the position information of the mobile robot with the asset information of the target object, encrypt the bound information, uplink the encrypted information, combine asset inventory with real-time positioning, and realize positioning and tracking of the whole industrial chain of the target object while realizing cross-domain and cross-enterprise information intercommunication.
In some optional implementation manners of the foregoing embodiment, the mobile robot may further utilize the active identification carrier module to interact with the active identification carrier security authentication service platform, so as to receive an instruction sent by the active identification carrier security authentication service platform, and execute the received instruction.
As an example, the active identity carrier module may be preloaded with an active identity carrier SDK, when an enterprise needs to operate the mobile robot, an operation request may be sent to the active identity carrier security authentication service platform through an enterprise node, and the active identity carrier security authentication service platform may issue a corresponding instruction to the active identity carrier module through the active identity carrier SDK.
In addition, the active identification carrier security authentication service platform can issue data to the active identification carrier module through the active identification carrier SDK, such as a communication address of the resolution server, a security certificate, and the like.
The movable robot interacts with the active identification carrier safety certification service platform through the active identification carrier module, the active identification carrier module of the movable robot can be operated in a trusted environment, malicious tampering can be effectively avoided, reliability of the movable robot is guaranteed, and accordingly safety of asset inventory is improved.
Further, the mobile robot may receive an identifier editing instruction of the active identifier carrier security authentication service platform by using the active identifier carrier module, and edit the second industrial internet identifier of the mobile robot according to the identifier editing instruction by using the active identifier carrier module.
In this embodiment, an active identification carrier is further disposed in the active identification carrier module, and the active identification carrier is used for carrying the second industrial internet identification. The second industrial internet identity is typically generated by the enterprise to which the mobile robot belongs and serves as the identity of the mobile robot. The active identification carrier security authentication service platform issues an identification editing instruction to the active identification carrier module, and can instruct the active identification carrier module to edit the second industrial internet identification, for example, the second industrial internet identification can be added, deleted, inquired and modified, so that the management and control of the identity of the mobile robot can be realized, the second industrial internet identification of the mobile robot can be prevented from being maliciously tampered, and the security of the mobile robot and the asset inventory can be improved.
In some embodiments, the mobile robot passes the trusted certification of the active identity carrier security certification service platform in advance, wherein trusted credentials are prestored. Process of trusted authentication referring to fig. 4, fig. 4 shows a flowchart of trusted authentication in one embodiment of a blockchain-based asset inventory method of the present disclosure, as shown in fig. 4, the flowchart includes the following steps.
And step 410, sending the identity of the active identity carrier module and the information of the enterprise to which the mobile robot belongs to the active identity carrier security authentication service platform so that the active identity carrier security authentication service platform can carry out identity verification on the mobile robot.
In this embodiment, the enterprise node sends an authentication request of the mobile robot to the active identity carrier security authentication service platform, and sends the identity identifier and the enterprise information of the active identity carrier module in the mobile robot to the active identity carrier security authentication service platform. The active identification carrier security authentication service platform can perform identity verification on the mobile robot based on the received information.
As an example, the identity of the active identification carrier module may be a third industrial internet identity generated for the active identification carrier module by a manufacturer of the active identification carrier module or by an enterprise to which the mobile robot belongs, or may be a second industrial internet identity of the mobile robot, or may be other identifying data for characterizing the identity. The information of the enterprise to which the robot belongs may include an industrial internet identification of the enterprise node, a CA (certificate Authority) certificate of the enterprise.
And step 420, when the verification is passed, generating a trusted certificate based on the identity of the active identification carrier module and the information of the enterprise to which the mobile robot belongs.
In this embodiment, when the verification passes, the active identity carrier security authentication service platform may generate a trusted credential according to the received information.
In some optional implementations of this embodiment, when the verification passes, the active identity carrier security authentication service platform may further generate a new identity for the active identity carrier module based on the enterprise information, and write the new identity into the trusted credential.
Step 430, the trusted credential is sent to the mobile robot.
The embodiment shown in fig. 4 embodies a trusted authentication process of the mobile robot, and the active identity carrier security authentication service platform performs identity verification on the mobile robot, so as to ensure that the mobile robot is trusted, which is beneficial to improving the security of asset inventory.
In some optional implementations of this embodiment shown in fig. 4, sending the first industrial internet identity to the preset resolution server by using an active identity bearer module built in the mobile robot may further include: sending an identity verification request to an analysis server by using an active identification carrier module so that the analysis server can verify the identity of the mobile robot, wherein the identity verification request comprises a trusted certificate and an identity of the active identification carrier module; and when the verification is passed, the active identification carrier module is utilized to send a first industrial Internet identification to the analysis server.
As an example, the identity of the active identification carrier module may be a third industrial internet identity generated for the active identification carrier module by a manufacturer of the active identification carrier module or an enterprise to which the mobile robot belongs, or may be a second industrial internet identity of the mobile robot.
In this embodiment, when the mobile robot obtains asset information from the resolution server, the resolution server needs to verify the identity of the mobile robot before passing the verification, and only when the verification is passed, the resolution server receives the first industrial internet identifier sent by the mobile robot, so as to avoid revealing the asset information.
Referring next to fig. 5, fig. 5 illustrates an architectural schematic diagram of an embodiment of the blockchain-based inventory system of the present disclosure, as shown in fig. 5, the system includes: the method comprises the steps that a movable robot 510 with an active identification carrier module, an analysis server 520 and a block chain 530 are preset, wherein the movable robot 510 is used for obtaining a first industrial internet identification of a target object and sending the first industrial internet identification to the analysis server 520 by using the active identification carrier module; the parsing server 520 is configured to parse the first industrial internet identity to determine asset information of the target object, and send the asset information to the mobile robot 510; mobile robot 510 is further configured to generate encrypted data using the active identity carrier module based on the asset information and store the encrypted data to blockchain 530; blockchain 530 is used to store encrypted data.
The industrial internet identification resolution system is a basic system of the industrial internet, is an important component of the industrial internet, is also an important facility for constructing human-machine-object comprehensive interconnection, and has the function similar to a Domain Name System (DNS) which can inquire website addresses and mailbox addresses in the internet. The industrial internet identification analysis system mainly comprises an identification distribution management system and an identification analysis system, wherein the identification is an 'identity card' of a machine and an article, has uniqueness, and is managed in a layered mode of step-by-step distribution. The identification analysis system utilizes the identification to position and inquire information of the machine and the article, which is the premise and the basis for realizing the accurate butt joint of the global supply chain system and the enterprise production system, the full life cycle management of the product and the intelligent service. By building a set of perfect identification system, powerful support can be provided for industrial system interconnection and industrial data transmission and exchange, interconnection and intercommunication of industrial elements such as design, research, development, production, sales and service of industrial products are really realized, and the cooperation efficiency is improved.
In China, in order to realize the overall goal of unified management and interconnection, a national top-level node is established, is externally used as a unified export participating in the development of a global industrial internet identification analysis system, is communicated with various industrial internet identification analysis systems, and realizes the butt joint with an international root node. The construction of the domestic industrial internet identification analysis system and the ecological cultivation development are guided from the dimensions such as technical standard specifications, infrastructure construction and the like, and the integral framework of the domestic industrial internet identification analysis system is created.
National top level node: the key of the industrial internet mark analysis system in China is not only an international gateway for external interconnection, but also a core hub for internal planning. The system can provide top-level identification code registration and identification analysis service, and management capabilities such as identification filing and identification authentication for the nationwide. The national top level node is not only communicated with international root nodes of various identification systems, but also communicated with various domestic second level and other identification analysis service nodes below. Secondary identification analysis node: the method is an identification analysis public service node in an industry or region, and can provide identification code registration and identification analysis services for the industry or region, complete relevant identification service management, identification application docking and the like. Each secondary node is assigned a unique secondary node identification prefix by the national top level node. And (3) enterprise nodes: the method is an identification analysis service node in an enterprise, and can provide identification code registration and identification analysis service for a specific enterprise. The system can be independently deployed and can also be used as a component element of an enterprise information system. Each enterprise node is assigned a unique enterprise node identification prefix by the secondary node, and the content of the identification suffix is defined and assigned by the enterprise.
In this embodiment, the resolution server 520 may be a resolution server of an enterprise node, and in other embodiments, the resolution server may also be a resolution server of a secondary identification resolution node.
Blockchain 530 includes service nodes and at least one backbone node, where the backbone node may supervise the service nodes and the service nodes may store data on the chain.
The asset checking system based on the blockchain provided by this embodiment may utilize the mobile robot to automatically acquire the first industrial internet identifier of the target object, then utilize the active identifier carrier module to interact with the parsing server and the blockchain to acquire asset information, and store the asset information to the blockchain. The intelligent movement and automatic interaction of the mobile robot, and the reliability of an industrial internet system and a block chain can be combined into the asset checking process, so that the automation and the intelligence of the asset checking are realized, and the reliability and the safety of the asset checking are improved.
In some optional implementations of this embodiment, the system further includes an active identification carrier security authentication service platform 540 for performing data interaction with mobile robot 510 and its affiliated enterprise, and performing trusted authentication on mobile robot 510.
As shown in fig. 5, the enterprise node may provide data, such as an enterprise CA, a resolution server address, an industrial internet identity (which may be a second industrial internet identity, for example), a carrier unique identity (which may be a third industrial internet identity of an active identification carrier module, for example), and the like, to the active identification carrier security authentication service platform 540. An operation request may also be sent to the active identification carrier security authentication service platform 540 to operate on the second industrial internet identity of the mobile robot 510.
The active identification carrier module of the mobile robot 510 may be preloaded with an industrial application APP and an active identification carrier SDK, and perform data interaction with the resolution server 520 and an enterprise node through the industrial application APP, for example, may initiate data reporting to the resolution server 520; the data and the instruction issued by the active identification carrier security authentication service platform 540 can be received through the active identification carrier SDK, and the data and the instruction can also interact with the industrial application APP and the active identification carrier through the active identification carrier SDK, such as receiving and sending operation instructions and signatures, and can also operate the data (such as industrial internet identification, trusted certificates, keys, and the like) pre-stored in the active identification carrier.
In the embodiment, the mobile robot is subjected to credible authentication by using the active identification carrier safety authentication service platform, so that the credible identity of the mobile robot can be ensured, and the reliability of asset inventory can be further improved.
Referring now to fig. 6, fig. 6 illustrates a block chain based asset inventory apparatus of one embodiment of the present disclosure, as shown in fig. 6, the apparatus comprising: an acquisition unit 610 configured to acquire a first industrial internet identity of a target object using a mobile robot; a parsing unit 620 configured to transmit the first industrial internet identity to a preset parsing server using an active identity bearer module built in the mobile robot, so that the parsing server determines asset information of the target object by parsing the first industrial internet identity; a receiving unit 630 configured to receive asset information sent by the resolution server by using the active identity bearer module; an encryption unit 640 configured to generate encrypted data with the active identity bearer module based on the asset information; a storage unit 650 configured to store the encrypted data to the blockchain using the active identification bearer module.
In one embodiment, the apparatus further comprises a positioning unit configured to: acquiring position information of the movable robot by using a positioning module preset in the movable robot; the encryption unit 640 is further configured to: binding the asset information with the position information by using an active identification carrier module; and encrypting the bound asset information and position information by using the active identification carrier module to generate encrypted data.
In one embodiment, the apparatus further includes an interaction unit configured to: and the active identification carrier module is used for interacting with the active identification carrier security authentication service platform so as to receive the instruction sent by the active identification carrier security authentication service platform and execute the received instruction.
In one embodiment, the interaction unit is further configured to: receiving an identification editing instruction sent by an active identification carrier safety certification service platform by using an active identification carrier module; and editing the second industrial internet identifier of the movable robot by using the active identifier carrier module according to the identifier editing instruction.
In one embodiment, the mobile robot is pre-stored with a trusted voucher; the apparatus also includes an authentication unit configured to: the identity of the active identification carrier module and the information of the enterprise to which the mobile robot belongs are sent to an active identification carrier security authentication service platform, so that the active identification carrier security authentication service platform can carry out identity verification on the mobile robot; when the verification passes, generating a credible certificate based on the identity of the active identification carrier module and the information of the enterprise to which the mobile robot belongs; and sending the trusted voucher to the mobile robot.
In one embodiment, the parsing unit is further configured to: sending an identity verification request to an analysis server by using an active identification carrier module so that the analysis server can verify the identity of the mobile robot, wherein the identity verification request comprises a trusted certificate and an identity of the active identification carrier module; and when the verification is passed, the active identification carrier module is utilized to send a first industrial Internet identification to the analysis server.
In addition, an embodiment of the present disclosure further provides an electronic device, including: a memory for storing a computer program; a processor configured to execute the computer program stored in the memory, and when the computer program is executed, the method for block chain-based asset inventory according to any of the above embodiments of the present disclosure is implemented.
Fig. 7 is a schematic structural diagram of an embodiment of an electronic device according to the present disclosure. Next, an electronic apparatus according to an embodiment of the present disclosure is described with reference to fig. 7.
As shown in fig. 7, the electronic device includes one or more processors and memory.
The processor may be a Central Processing Unit (CPU) or other form of processing unit having data processing capabilities and/or instruction execution capabilities, and may control other components in the electronic device to perform desired functions.
The memory may include one or more computer program products that may include various forms of computer-readable storage media, such as volatile memory and/or non-volatile memory. The volatile memory may include, for example, random Access Memory (RAM), cache memory (cache), and/or the like. The non-volatile memory may include, for example, read Only Memory (ROM), hard disk, flash memory, etc. One or more computer program instructions may be stored on the computer readable storage medium and executed by a processor to implement the blockchain-based asset inventory method of the various embodiments of the present disclosure described above and/or other desired functionality.
In one example, the electronic device may further include: an input device and an output device, which are interconnected by a bus system and/or other form of connection mechanism (not shown).
The input device may also include, for example, a keyboard, a mouse, and the like.
The output device may output various information including the determined distance information, direction information, and the like to the outside. The output devices may include, for example, a display, speakers, printer, and a communication network and its connected remote output devices, among others.
Of course, for simplicity, only some of the components of the electronic device relevant to the present disclosure are shown in fig. 7, omitting components such as buses, input/output interfaces, and so forth. In addition, the electronic device may include any other suitable components, depending on the particular application.
In addition to the above-described methods and apparatus, embodiments of the present disclosure may also be a computer program product comprising computer program instructions that, when executed by a processor, cause the processor to perform the steps in a blockchain-based asset inventory method according to various embodiments of the present disclosure described in the above section of this specification.
The computer program product may write program code for carrying out operations for embodiments of the present disclosure in any combination of one or more programming languages, including an object oriented programming language such as Java, C + + or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computing device, partly on the user's device, as a stand-alone software package, partly on the user's computing device and partly on a remote computing device, or entirely on the remote computing device or server.
Furthermore, embodiments of the present disclosure may also be a computer-readable storage medium having stored thereon computer program instructions that, when executed by a processor, cause the processor to perform the steps in a blockchain-based asset inventory method described in the above section of this specification according to various embodiments of the present disclosure.
The computer-readable storage medium may take any combination of one or more readable media. The readable medium may be a readable signal medium or a readable storage medium. A readable storage medium may include, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or a combination of any of the foregoing. More specific examples (a non-exhaustive list) of the readable storage medium include: an electrical connection having one or more wires, a portable disk, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
Those of ordinary skill in the art will understand that: all or part of the steps of implementing the method embodiments may be implemented by hardware related to program instructions, and the program may be stored in a computer-readable storage medium, and when executed, executes the steps including the method embodiments; and the aforementioned storage medium includes: various media that can store program codes, such as ROM, RAM, magnetic or optical disks.
The foregoing describes the general principles of the present disclosure in conjunction with specific embodiments, however, it is noted that the advantages, effects, etc. mentioned in the present disclosure are merely examples and are not limiting, and they should not be considered essential to the various embodiments of the present disclosure. Furthermore, the foregoing disclosure of specific details is for the purpose of illustration and description and is not intended to be limiting, since the disclosure will be described in detail with reference to specific details.
In the present specification, the embodiments are described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same or similar parts in the embodiments are referred to each other. For the system embodiment, since it basically corresponds to the method embodiment, the description is relatively simple, and for the relevant points, reference may be made to the partial description of the method embodiment.
The block diagrams of devices, apparatuses, devices, systems involved in the present disclosure are only given as illustrative examples and are not intended to require or imply that the connections, arrangements, configurations must be made in the manner shown in the block diagrams. These devices, apparatuses, devices, systems may be connected, arranged, configured in any manner, as will be appreciated by those skilled in the art. Words such as "including," "comprising," "having," and the like are open-ended words that mean "including, but not limited to," and are used interchangeably therewith. The words "or" and "as used herein mean, and are used interchangeably with, the word" and/or, "unless the context clearly dictates otherwise. The word "such as" is used herein to mean, and is used interchangeably with, the phrase "such as but not limited to".
The method and apparatus of the present disclosure may be implemented in a number of ways. For example, the methods and apparatus of the present disclosure may be implemented by software, hardware, firmware, or any combination of software, hardware, and firmware. The above-described order for the steps of the method is for illustration only, and the steps of the method of the present disclosure are not limited to the order specifically described above unless specifically stated otherwise. Further, in some embodiments, the present disclosure may also be embodied as programs recorded in a recording medium, the programs including machine-readable instructions for implementing the methods according to the present disclosure. Thus, the present disclosure also covers a recording medium storing a program for executing the method according to the present disclosure.
It is also noted that in the devices, apparatuses, and methods of the present disclosure, each component or step can be decomposed and/or recombined. These decompositions and/or recombinations are to be considered equivalents of the present disclosure.
The previous description of the disclosed aspects is provided to enable any person skilled in the art to make or use the present disclosure. Various modifications to these aspects will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other aspects without departing from the scope of the disclosure. Thus, the present disclosure is not intended to be limited to the aspects shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.
The foregoing description has been presented for purposes of illustration and description. Furthermore, the description is not intended to limit embodiments of the disclosure to the form disclosed herein. While a number of example aspects and embodiments have been discussed above, those of skill in the art will recognize certain variations, modifications, alterations, additions and sub-combinations thereof.

Claims (11)

1. A block chain-based asset inventory method is characterized by comprising the following steps:
acquiring a first industrial internet identification of a target object by using a movable robot;
sending the first industrial internet identification to a preset analysis server by using an active identification carrier module built in the mobile robot, so that the analysis server determines asset information of the target object by analyzing the first industrial internet identification;
receiving the asset information sent by the resolution server by using the active identification carrier module;
generating encrypted data with the active identity carrier module based on the asset information;
storing the encrypted data to a blockchain using the active identity carrier module.
2. The method of claim 1, further comprising: acquiring the position information of the movable robot by utilizing a preset positioning module in the movable robot;
the generating of encrypted data with the active identity bearer module based on the asset information comprises:
binding the asset information with the location information using the active identity carrier module;
and encrypting the bound asset information and the position information by using the active identification carrier module to generate the encrypted data.
3. The method of claim 2, further comprising:
and interacting with an active identification carrier security authentication service platform by using the active identification carrier module to receive the instruction sent by the active identification carrier security authentication service platform and execute the received instruction.
4. The method of claim 3, wherein the interacting with an active identity bearer security authentication service platform by using the active identity bearer module comprises:
receiving an identification editing instruction sent by the active identification carrier security authentication service platform by using the active identification carrier module;
and editing the second industrial internet identifier of the mobile robot by using the active identifier carrier module according to the identifier editing instruction.
5. The method of claim 4, wherein the mobile robot has a trusted credential pre-stored therein; the method further comprises the following steps:
sending the identity of the active identification carrier module and the information of the enterprise to which the mobile robot belongs to the active identification carrier security authentication service platform so that the active identification carrier security authentication service platform can carry out identity verification on the mobile robot;
when the verification is passed, generating the credible certificate based on the identity of the active identification carrier module and the information of the enterprise to which the mobile robot belongs;
sending the trusted credential to the mobile robot.
6. The method of claim 5, wherein the sending the first industrial internet identity to a preset resolution server by using an active identity carrier module built in the mobile robot comprises:
sending an identity verification request to the analysis server by using the active identification carrier module so that the analysis server can verify the identity of the mobile robot, wherein the identity verification request comprises the trusted certificate and the identity of the active identification carrier module;
and when the verification is passed, the active identification carrier module is utilized to send the first industrial Internet identification to the analysis server.
7. A blockchain-based asset inventory system, comprising: a resolution server, a block chain and a mobile robot with a preset active identification carrier module, wherein,
the mobile robot is used for acquiring a first industrial internet mark of a target object and sending the first industrial internet mark to the analysis server by utilizing the active mark carrier module;
the analysis server is used for analyzing the first industrial Internet identification to determine asset information of the target object and sending the asset information to the movable robot;
the mobile robot is further configured to generate encrypted data using the active identity carrier module based on the asset information and store the encrypted data to the blockchain;
the blockchain is used for storing the encrypted data.
8. The system of claim 7, further comprising an active identity carrier security authentication service platform for data interaction with the mobile robot and its enterprise, and for trusted authentication of the mobile robot.
9. An asset checking device based on a blockchain, comprising:
an acquisition unit configured to acquire a first industrial internet identification of a target object using a mobile robot;
an analysis unit configured to transmit the first industrial internet identity to a preset analysis server by using an active identity carrier module built in the mobile robot, so that the analysis server determines asset information of the target object by analyzing the first industrial internet identity;
a receiving unit configured to receive the asset information sent by the resolution server by using the active identity bearer module;
an encryption unit configured to generate encrypted data with the active identity carrier module based on the asset information;
a storage unit configured to store the encrypted data to a blockchain using the active identity carrier module.
10. An electronic device, comprising: a memory for storing a computer program product; a processor for executing the computer program product stored in the memory, and when executed, implementing the method of any of the preceding claims 1-6.
11. A computer-readable storage medium having computer program instructions stored thereon, the computer program instructions when executed by a processor performing the method of any of claims 1-6.
CN202211237143.5A 2022-10-11 2022-10-11 Block chain-based asset inventory method, system, device, equipment and medium Pending CN115309830A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211237143.5A CN115309830A (en) 2022-10-11 2022-10-11 Block chain-based asset inventory method, system, device, equipment and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211237143.5A CN115309830A (en) 2022-10-11 2022-10-11 Block chain-based asset inventory method, system, device, equipment and medium

Publications (1)

Publication Number Publication Date
CN115309830A true CN115309830A (en) 2022-11-08

Family

ID=83868254

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211237143.5A Pending CN115309830A (en) 2022-10-11 2022-10-11 Block chain-based asset inventory method, system, device, equipment and medium

Country Status (1)

Country Link
CN (1) CN115309830A (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110490514A (en) * 2019-08-01 2019-11-22 深圳市珍久库科技有限公司 A kind of assets digitlization of the intelligent repository based on block chain management and device
CN112150072A (en) * 2020-09-27 2020-12-29 北京海益同展信息科技有限公司 Asset checking method and device based on intelligent robot, electronic equipment and medium
CN112416002A (en) * 2020-11-17 2021-02-26 深圳市优必选科技股份有限公司 Robot asset checking method, device, equipment and storage medium
US20210329067A1 (en) * 2020-08-28 2021-10-21 Alipay (Hangzhou) Information Technology Co., Ltd. Matching methods, apparatuses, and devices based on trusted asset data
CN113759918A (en) * 2021-09-10 2021-12-07 南京猫眼智能科技有限公司 Inventory service robot control method
CN115062740A (en) * 2022-06-14 2022-09-16 中国信息通信研究院 Extensible identification analysis method and device

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110490514A (en) * 2019-08-01 2019-11-22 深圳市珍久库科技有限公司 A kind of assets digitlization of the intelligent repository based on block chain management and device
US20210329067A1 (en) * 2020-08-28 2021-10-21 Alipay (Hangzhou) Information Technology Co., Ltd. Matching methods, apparatuses, and devices based on trusted asset data
CN112150072A (en) * 2020-09-27 2020-12-29 北京海益同展信息科技有限公司 Asset checking method and device based on intelligent robot, electronic equipment and medium
CN112416002A (en) * 2020-11-17 2021-02-26 深圳市优必选科技股份有限公司 Robot asset checking method, device, equipment and storage medium
CN113759918A (en) * 2021-09-10 2021-12-07 南京猫眼智能科技有限公司 Inventory service robot control method
CN115062740A (en) * 2022-06-14 2022-09-16 中国信息通信研究院 Extensible identification analysis method and device

Similar Documents

Publication Publication Date Title
CN110941611B (en) Identification analysis system implementation method based on block chain technology and identification coding technology
US10642969B2 (en) Automating internet of things security provisioning
US20220108266A1 (en) Secure shipment receive apparatus with delegation-chain
JP6557349B2 (en) Tracking integration that occurs in the supply chain
CN112417037B (en) Block chain construction method for distributed identity authentication in industrial field
US20170093700A1 (en) Device platform integrating disparate data sources
JP2018506128A (en) Cryptographic verification of locations in the supply chain
US11706017B2 (en) Integration of blockchain-enabled readers with blockchain network using machine-to-machine communication protocol
Khan et al. Blockchain and edge computing–based architecture for participatory smart city applications
WO2020041728A1 (en) Methods, apparatuses, and computer program products for frictionless custody chain management
WO2019161285A1 (en) Devices and systems for industrial internet of things security
US20130028411A1 (en) Simple Group Security for Machine-to-Machine Networking (SGSM2M)
CN110601896A (en) Data processing method and equipment based on block chain nodes
CN111488372A (en) Data processing method, device and storage medium
EP2973296B1 (en) Method and apparatus for translation of business messages
CN105976141A (en) Networked logistics inventory method and device
Wang et al. Scalable identifier system for industrial internet based on multi-identifier network architecture
US10735304B2 (en) System and method for remote management of sale transaction data
CN115309830A (en) Block chain-based asset inventory method, system, device, equipment and medium
CN115982247A (en) Block chain based account information query method and device, equipment and medium
CN114826719A (en) Trusted terminal authentication method, system, device and storage medium based on block chain
CN116743850A (en) Equipment self-discovery system based on Internet of things platform and implementation method thereof
Morariu et al. Policy-based security for distributed manufacturing execution systems
CN115708119A (en) Cross-chain transaction system, method, device and storage medium
WO2015149530A1 (en) M2m application service method, device and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20221108

RJ01 Rejection of invention patent application after publication