CN115391832A - Data management method and system based on block chain - Google Patents

Data management method and system based on block chain Download PDF

Info

Publication number
CN115391832A
CN115391832A CN202211012733.8A CN202211012733A CN115391832A CN 115391832 A CN115391832 A CN 115391832A CN 202211012733 A CN202211012733 A CN 202211012733A CN 115391832 A CN115391832 A CN 115391832A
Authority
CN
China
Prior art keywords
data
automobile
standard
enterprise
hash value
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211012733.8A
Other languages
Chinese (zh)
Inventor
王耀
滕添益
韩昭
张琳
童星
赵梓健
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhongde Zhicheng Shanghai Automobile Technology Co ltd
Original Assignee
Zhongde Zhicheng Shanghai Automobile Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhongde Zhicheng Shanghai Automobile Technology Co ltd filed Critical Zhongde Zhicheng Shanghai Automobile Technology Co ltd
Priority to CN202211012733.8A priority Critical patent/CN115391832A/en
Publication of CN115391832A publication Critical patent/CN115391832A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides a data management method based on a block chain, which comprises the following steps: the vehicle-mounted terminal provides the automobile data to the enterprise data center, and the automobile data comprises a timestamp generated by the automobile data; the enterprise data center performs Hash calculation on the automobile data to generate a first Hash value, and uploads the first Hash value, the timestamp and the automobile identification code to the block chain; the enterprise data center screens and converts the format of the automobile data to generate standard data, and the standard data are uploaded to a block chain; and the data access platform verifies the authenticity of the standard data, wherein the step of verifying the authenticity of the standard data comprises judging whether the difference value between the uplink time and the time stamp of the first hash value is smaller than a first threshold value, and if not, the standard data is not authentic. The invention ensures the authenticity of the standard data uploaded by the enterprise data center on the chain by using the uplink data certificate, and promotes the data sharing transaction among enterprises.

Description

Data management method and system based on block chain
Technical Field
The present invention relates to the field of block chain technologies, and in particular, to a data management method and system based on a block chain.
Background
With the accelerated evolution of automobile products towards mobile intelligent terminals, the automobile industry is about to enter the big data era. The automotive data relates to production manufacturing data, usage data, transaction data, maintenance data, and the like. Different data are stored on different management platforms, and the management platforms are isolated from each other. For example, an enterprise data center of an automobile enterprise stores automobile operation data, and other enterprises (e.g., automobile part suppliers) in an automobile supply chain want to access or acquire the automobile operation data to perform data transaction with the automobile enterprise. The enterprise data center of the automobile enterprise generates standard data through format conversion of the automobile data and supplies the standard data to other enterprises in an automobile supply chain, and the standard data can be edited or tampered and needs to be verified in authenticity. And the standard data often relates to the privacy information of the automobile user, and the privacy safety of the user must be ensured during data transaction.
Therefore, a data management method and system for verifying the authenticity of standard data while protecting user privacy is needed.
Disclosure of Invention
The invention aims to provide a data management method and system based on a block chain, so as to solve the problem of authenticity of standard data during data transaction.
In order to solve the technical problem, the invention provides a data management method based on a block chain, which comprises the following steps: the vehicle-mounted terminal provides automobile data to an enterprise data center, wherein the automobile data comprises a timestamp generated by the automobile data; the enterprise data center performs Hash calculation on the automobile data to generate a first Hash value, and uploads the first Hash value, the timestamp and the automobile identification code to a block chain; the enterprise data center screens and converts the automobile data into standard data, and uploads the standard data to a block chain; and the data access platform verifies the authenticity of the standard data, wherein the step of verifying the authenticity of the standard data comprises judging whether the difference value between the uplink time of the first hash value and the timestamp is less than a first threshold value, and if not, the standard data is not authentic.
In an embodiment of the present invention, the step of verifying the authenticity of the standard data further includes: if the difference value between the uplink time of the first hash value and the timestamp is smaller than a first threshold value, acquiring the automobile data from the enterprise data center and carrying out hash calculation on the automobile data to generate a second hash value; and acquiring the first hash value from the block chain, judging whether the second hash value is consistent with the first hash value or not, if so, judging that the automobile data is true and has no falsification, comparing the automobile data with the standard data, and if the values of the data are consistent, judging that the standard data is true.
In an embodiment of the present invention, the data access platform further obtains the standard data from the blockchain.
In an embodiment of the present invention, the enterprise data center and the data access platform perform hash calculation by using the same algorithm, where the algorithm includes SHA256 international hash calculation standard or SM3 cryptographic algorithm.
In an embodiment of the invention, the vehicle-mounted terminal includes any one of a T-Box, a vehicle-mounted unit OBU, or a beacon.
In an embodiment of the present invention, the step of providing, by the vehicle-mounted terminal, the vehicle data and generating the timestamp of the vehicle data to the enterprise data center includes: desensitizing the original data; encrypting the original data after desensitization processing and covering a time stamp to generate automobile data; and sending the automobile data to the enterprise data center.
In an embodiment of the present invention, the data format of the car data includes a file, an image, and a video.
In an embodiment of the invention, the blockchain includes a plurality of nodes including the enterprise data center, the data access platform, a regulatory authority, and a third party authority.
In order to solve the above technical problem, the present invention provides a data management system based on a block chain, which comprises: the vehicle-mounted terminal is used for providing automobile data to the enterprise data center, and the automobile data comprises a timestamp generated by the automobile data; the enterprise data center is used for carrying out Hash calculation on the automobile data to generate a first Hash value, uploading the first Hash value, the timestamp and the automobile identification code to a block chain, carrying out screening and format conversion on the automobile data to generate standard data, and uploading the standard data to the block chain; and the data access platform is used for verifying the authenticity of the standard data, wherein the step of verifying the authenticity of the standard data comprises the steps of judging whether the difference value between the uplink time of the first hash value and the timestamp is smaller than a first threshold value, and if not, the standard data is not authentic.
In an embodiment of the present invention, the data access platform is further configured to obtain the automobile data from the enterprise data center and perform a hash calculation on the automobile data to generate a second hash value; and acquiring the first hash value from the block chain, judging whether the second hash value is consistent with the first hash value, if so, comparing the automobile data with the standard data without falsification, and if so, judging that the standard data is true.
In an embodiment of the present invention, the data access platform is further configured to obtain the standard data from the blockchain.
In an embodiment of the present invention, the enterprise data center and the data access platform perform hash calculation by using the same algorithm, where the algorithm includes SHA256 international hash calculation standard or SM3 cryptographic algorithm.
In an embodiment of the invention, the vehicle-mounted terminal includes any one of a T-Box, a vehicle-mounted unit OBU, or a beacon.
In an embodiment of the present invention, the vehicle-mounted terminal is further configured to: desensitizing the original data; encrypting the original data after desensitization processing and covering a time stamp to generate automobile data; and sending the automobile data to the enterprise data center.
In an embodiment of the present invention, the data format of the car data includes a file, an image, and a video.
In an embodiment of the invention, the blockchain includes a plurality of nodes including the enterprise data center, the data access platform, a regulatory authority, and a third party authority.
Compared with the prior art, the invention has the following advantages:
according to the data management method based on the block chain, the first hash value and the timestamp generated by the automobile data are uploaded to the block chain for evidence storage, and the authenticity of standard data uploaded by an enterprise data center on the chain is guaranteed by using the uplink data evidence, so that data sharing transaction between enterprises is promoted; the vehicle-mounted terminal is replaced by the enterprise data center to perform Hash calculation, so that the problem of insufficient calculation capacity of the vehicle-mounted terminal is solved.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the application and together with the description serve to explain the principle of the invention. In the drawings:
fig. 1 is a schematic flowchart of a block chain-based data management method according to an embodiment of the present application;
FIG. 2 is a flow chart diagram of the optimized blockchain-based data management method of FIG. 1;
fig. 3 is a system block diagram of a data management system based on a blockchain according to an embodiment of the present application.
Detailed Description
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings used in the description of the embodiments will be briefly introduced below. It is obvious that the drawings in the following description are only examples or embodiments of the application, and that for a person skilled in the art the application can also be applied to other similar contexts on the basis of these drawings without inventive effort. Unless otherwise apparent from the context, or otherwise indicated, like reference numbers in the figures refer to the same structure or operation.
As used in this application and the appended claims, the terms "a," "an," "the," and/or "the" are not intended to be inclusive in the singular, but rather are intended to be inclusive in the plural unless the context clearly dictates otherwise. In general, the terms "comprises" and "comprising" merely indicate that steps and elements are included which are explicitly identified, that the steps and elements do not form an exclusive list, and that a method or apparatus may include other steps or elements.
The relative arrangement of the components and steps, the numerical expressions, and numerical values set forth in these embodiments do not limit the scope of the present application unless specifically stated otherwise. Meanwhile, it should be understood that the sizes of the respective portions shown in the drawings are not drawn in an actual proportional relationship for the convenience of description. Techniques, methods, and apparatus known to those of ordinary skill in the relevant art may not be discussed in detail but are intended to be part of the specification where appropriate. In all examples shown and discussed herein, any particular value should be construed as merely illustrative, and not limiting. Thus, other examples of the exemplary embodiments may have different values. It should be noted that: like reference numbers and letters refer to like items in the following figures, and thus, once an item is defined in one figure, it need not be discussed further in subsequent figures.
It should be noted that the terms "first", "second", and the like are used to define the components, and are only used for convenience of distinguishing the corresponding components, and the terms have no special meanings unless otherwise stated, and therefore, the scope of protection of the present application is not to be construed as being limited. Further, although the terms used in the present application are selected from publicly known and used terms, some of the terms mentioned in the specification of the present application may be selected by the applicant at his or her discretion, the detailed meanings of which are described in relevant parts of the description herein. Further, it is required that the present application is understood not only by the actual terms used but also by the meaning of each term lying within.
Also, this application uses specific language to describe embodiments of the application. Reference throughout this specification to "one embodiment," "an embodiment," and/or "some embodiments" means that a particular feature, structure, or characteristic described in connection with at least one embodiment of the present application is included in at least one embodiment of the present application. Therefore, it is emphasized and should be appreciated that two or more references to "an embodiment" or "one embodiment" or "an alternative embodiment" in various places throughout this specification are not necessarily all referring to the same embodiment. Furthermore, some features, structures, or characteristics of one or more embodiments of the present application may be combined as appropriate.
It will be understood that when an element is referred to as being "on," "connected to," "coupled to" or "contacting" another element, it can be directly on, connected or coupled to, or contacting the other element or intervening elements may be present. In contrast, when an element is referred to as being "directly on," "directly connected to," "directly coupled to" or "directly contacting" another element, there are no intervening elements present. Similarly, when a first component is said to be "in electrical contact with" or "electrically coupled to" a second component, there is an electrical path between the first component and the second component that allows current to flow. The electrical path may include capacitors, coupled inductors, and/or other components that allow current to flow even without direct contact between the conductive components.
Flow charts are used herein to illustrate operations performed by systems according to embodiments of the present application. It should be understood that the preceding or following operations are not necessarily performed in the exact order in which they are performed. Rather, various steps may be processed in reverse order or simultaneously. Meanwhile, other operations are added to or removed from these processes.
Fig. 1 is a flowchart illustrating a block chain-based data management method 100 according to an embodiment of the present application. As shown in fig. 1, a block chain-based data management method 100 (hereinafter referred to as data management method 100) includes the following steps:
step S110: the vehicle-mounted terminal provides the automobile data to the enterprise data center, and the automobile data comprises a timestamp generated by the automobile data.
Step S120: the enterprise data center performs hash calculation on the automobile data to generate a first hash value, and uploads the first hash value, the timestamp and the automobile identification code to the block chain.
Step S130: and the enterprise data center screens and converts the automobile data into standard data and uploads the standard data to the block chain.
Step S140: and the data access platform judges whether the difference value of the uplink time and the time stamp of the first hash value is smaller than a first threshold value, and if not, the standard data is not true.
The following describes steps S110 to S140 in detail.
In step S110, the vehicle-mounted terminal may be any one of a telematics terminal (T-Box), an On Board Unit (OBU), or a label maker, and may also be another communication module, which is not limited by the application. The enterprise data center may be a data cloud management platform for an automobile enterprise. The data format of the car data may be files, images, and videos. The vehicle data includes data related to vehicle driving, for example, the vehicle data includes a vehicle operating parameter file during vehicle driving, and the vehicle operating parameters include, but are not limited to, vehicle speed, acceleration, steering wheel deflection angle, and the like. The automobile data also comprises road information images or videos acquired by the vehicle-mounted terminal through the camera. The automobile data may relate to privacy information of the user, so the vehicle-mounted terminal needs to perform user privacy protection before uploading the automobile data to the enterprise data center. In some embodiments, the step of providing the vehicle data to the enterprise data center by the vehicle-mounted terminal comprises: first, desensitization is performed on the raw data. The raw data may be vehicle raw data collected by a vehicle-mounted terminal through a collecting device (e.g., a sensor or a camera), such as a road information image or a video collected by the camera. And the vehicle-mounted terminal carries out desensitization treatment on the acquired original data according to relevant laws and regulations of data safety. For example, mosaic processing is performed on the face of a pedestrian in a road image or video acquired by a vehicle-mounted terminal, and desensitization processing is performed on fields (such as identification numbers or telephone numbers) containing user privacy in acquired files. Then, the desensitized original data is encrypted by cryptography and then time stamped to generate the automobile data. And finally, sending the automobile data to an enterprise data center.
In step S120, the enterprise data center receives the vehicle data sent by the vehicle-mounted terminal, then performs hash calculation on the vehicle data immediately to generate a first hash value, and uploads the first hash value, a timestamp generated by the vehicle data, and a vehicle identification code (such as a license plate number) to the block chain in real time. The enterprise data center can perform hash calculation by adopting SHA256 international hash calculation standard or SM3 national cipher algorithm, and the algorithm adopted by the hash calculation is not limited in the application. The block chain comprises a plurality of nodes, and the plurality of nodes comprise an enterprise data center, a data access platform, a supervision department, a third-party organization and the like. Since the blockchain is a technical scheme for storing, verifying, transmitting and exchanging network data through self distributed nodes without depending on a third party, once information is verified and added to the blockchain, the information can be stored permanently, and modification of a database on a single node is invalid. This means that once the data is uplinked, it is tamper-proof, fully traceable, publicly transparent, and collectively maintained. The first hash value, the time stamp and the standard data are therefore not tamperproof.
In step S130, when data transaction or data sharing is performed, the automobile enterprise may choose not to transaction or share all the automobile data. For example, an automobile enterprise may screen automobile data through an enterprise data center, and screen some key data in the automobile data. And then, converting the format of the key data to generate standard data for different automobile enterprises to share in data transaction. The enterprise data center does not upload the standard data and the first hash value simultaneously. The enterprise data center calculates a first hash value and uploads the first hash value to the block chain in real time, and the standard data is that the enterprise data center can upload the first hash value to the block chain at intervals.
In step S140, the data access platform may be a hardware access device or a data access system constructed by program codes. The data access platform may be any subject hold, for example, may be a government regulatory body, may be another enterprise, may be an evaluation agency, and the like. And the main body of the data access platform verifies the authenticity of the standard data through the data access platform. Illustratively, the data access platform obtains a timestamp generated by the automobile data and a winding time of the first hash value from the blockchain according to the automobile identification code, and then judges whether a difference value between the winding time of the first hash value and the timestamp generated by the automobile data is smaller than a first threshold value. If not, the first hash value is not uploaded in real time by the enterprise data center, and the first hash value uploaded to the block chain by the enterprise data center for a long time is not credible. The enterprise data center can tamper the automobile data for a longer time, and the automobile data is not real. Therefore, the standard data generated from the screening of the automobile data is not real.
In some embodiments, the blockchain-based data management method further comprises the data access platform acquiring standard data from the blockchain. The data access platform can acquire standard data from any node of the blockchain after obtaining the authorization of the enterprise data center. The time for the data access platform to obtain the standard data is not limited, for example, the data access platform may obtain the standard data from the blockchain after verifying that the standard data is authentic. It is also possible to obtain the standard data from the blockchain before verifying it without verifying the authenticity of the standard data.
According to the data management method based on the block chain, the first hash value and the timestamp generated by the automobile data are uploaded to the block chain for evidence storage, and the authenticity and reliability of the standard data uploaded by the enterprise data center on the chain are guaranteed by using the uplink data evidence, so that data sharing transaction between enterprises is promoted; the vehicle-mounted terminal is replaced by the enterprise data center to perform Hash calculation, so that the problem of insufficient calculation capacity of the vehicle-mounted terminal is solved.
Fig. 2 is a flowchart illustrating an optimized blockchain-based data management method 200 of fig. 1. As shown in fig. 2, compared to the data management method 100, the data management method 200 further includes the following steps:
step S150: and obtaining the automobile data from the enterprise data center and carrying out hash calculation on the automobile data to generate a second hash value.
Step S160: a first hash value is obtained from a blockchain.
Step S170: and judging whether the second hash value is consistent with the first hash value, if so, trueness and no modification of the automobile data are realized, and then, turning to the step S180.
Step S180: comparing the automobile data with the standard data, and if the values of the data are consistent, the standard data are real.
The following describes steps S150 to S180 in detail.
If the difference between the uplink time of the first hash value and the timestamp generated by the automobile data is smaller than the first threshold value, it cannot be determined that the standard data is authentic, and further verification needs to be performed on the standard data. In steps S150 to S160, the data access platform obtains the automobile data from the enterprise data center, and performs a hash calculation on the automobile data to generate a second hash value. The data access platform and the enterprise data center must adopt the same algorithm to perform hash calculation. The data access platform acquires a first hash value corresponding to the automobile data from the block chain.
In step S170, the data access platform compares the calculated second hash value with the first hash value obtained from the block chain, and determines whether the two hash values are consistent. If the data are consistent, the data of the automobile are true and have no falsification. For example, the vehicle data of the vehicle with the vehicle identification code of Shanghai AXXX in a certain time period is abc123, and the data access platform obtains the hash value of 6ca13d52ca70c883e0f0bb101e425a89e8624de51db2d2392593af6a84118090 according to the SHA256 international hash calculation standard. The data access platform then obtains the hash value of the vehicle, which is certified in the time period, from the blockchain, and the hash value is 6ca13d52ca70c883e0f0bb101e425a89e8624de51db2d2392593af6a84118090, and comparison and verification show that the two hash values are consistent, which indicates that the automobile data provided by the enterprise data center is true and has no falsification.
In step S180, the authenticity of the standard data provided by the enterprise data center in the node may be checked according to the data that has been checked as real automobile data. Illustratively, the values of the data in the car data are compared with the values of the data in the standard data, and if the values of the data are consistent, the standard data is true.
The data management method based on the block chain in the embodiment checks the authenticity of the standard data provided by the enterprise data center in the node for the real automobile data, so that the authenticity and reliability of the standard data are ensured, and the data transaction among enterprises is promoted.
Fig. 3 is a system block diagram of a blockchain-based data management system 300 according to an embodiment of the present application. As shown in fig. 1, a block chain-based data management system 300 (hereinafter referred to as a data management system 300) includes a vehicle-mounted terminal 31, an enterprise data center 32, and a data access platform 33. Wherein the in-vehicle terminal 31 is used to provide the automobile data including a timestamp of the generation of the automobile data to the enterprise data center 32. The enterprise data center 32 is configured to perform hash calculation on the automobile data to generate a first hash value, upload the first hash value, the timestamp, and the automobile identification code to the block chain B, perform screening and format conversion on the automobile data to generate standard data, and upload the standard data to the block chain B. The data access platform 33 is configured to verify the authenticity of the standard data, wherein the step of verifying the authenticity of the standard data includes determining whether a difference between a uplink time of the first hash value and the timestamp is less than a first threshold, and if not, the standard data is not authentic. The block chain B comprises an enterprise data center node C1, a first data access platform node C2, a second data access platform node C3, a supervision department node C4 and a third party organization node C5. The first data access platform node C2 and the second data access platform node C3 represent different parts suppliers in the automobile supply chain. Once the information is validated and added to blockchain B, it is permanently stored and modifications to the database at individual nodes are invalidated. This means that once the data is uplinked, it is tamper-proof, fully traceable, publicly transparent, and collectively maintained. The first hash value, the time stamp and the standard data are therefore not tamperproof.
The vehicle-mounted terminal 31 may be a vehicle networking intelligent terminal (T-Box), an On Board Unit (OBU), or other communication modules such as a ministerial Unit, and the application does not limit the type of the vehicle-mounted terminal. Enterprise data center 32 may be a data cloud management platform for an automobile enterprise. The data access platform 33 may be a hardware access device or a data access system constructed with program code. The data access platform 33 may be any subject hold, such as a government regulatory body, other enterprise, an evaluation agency, etc.
In some embodiments, the data access platform 33 is further configured to obtain the automobile data from the enterprise data center 32 and perform a hash calculation on the automobile data to generate a second hash value; and acquiring a first hash value from the blockchain B, judging whether the second hash value is consistent with the first hash value, if so, trueness and no modification of the automobile data are realized, comparing the automobile data with standard data, and if the values of the data are consistent, trueness of the standard data is realized. The enterprise data center 32 and the data access platform 33 perform hash calculation by using the same algorithm, where the algorithm includes SHA256 international hash calculation standard or SM3 national cryptographic algorithm.
In some embodiments, the data access platform 33 is also used to obtain standard data from the blockchain B.
In some embodiments, the in-vehicle terminal 31 is further configured to perform desensitization processing on the raw data; encrypting the original data after desensitization processing and covering a time stamp to generate automobile data; the vehicle data is sent to the enterprise data center 32.
In some embodiments, the data format of the car data includes files, images, and videos.
According to the data management system of the block chain, the first hash value and the timestamp generated by the automobile data are uploaded to the block chain through the enterprise data center for evidence storage, and the authenticity and reliability of the standard data uploaded by the enterprise data center on the chain are guaranteed by using the uplink data evidence, so that data sharing transaction between enterprises is promoted.
It should be understood that the above-described embodiments are illustrative only. The embodiments described herein may be implemented in hardware, software, firmware, middleware, microcode, or any combination thereof. For a hardware implementation, the processor may be implemented within one or more Application Specific Integrated Circuits (ASICs), digital Signal Processors (DSPs), digital Signal Processing Devices (DSPDs), programmable Logic Devices (PLDs), field Programmable Gate Arrays (FPGAs), processors, controllers, micro-controllers, microprocessors, and/or other electronic units designed to perform the functions described herein, or a combination thereof.
Aspects of the present application may be embodied entirely in hardware, entirely in software (including firmware, resident software, micro-code, etc.) or in a combination of hardware and software. The above hardware or software may be referred to as "data block," module, "" engine, "" unit, "" component, "or" system. The processor may be one or more Application Specific Integrated Circuits (ASICs), digital Signal Processors (DSPs), digital signal processing devices (DAPDs), programmable Logic Devices (PLDs), field Programmable Gate Arrays (FPGAs), processors, controllers, microcontrollers, microprocessors, or a combination thereof. Furthermore, aspects of the present application may be represented as a computer product, including computer readable program code, embodied in one or more computer readable media. For example, computer-readable media can include, but are not limited to, magnetic storage devices (e.g., hard disk, floppy disk, magnetic strips … …), optical disks (e.g., compact Disk (CD), digital Versatile Disk (DVD) … …), smart cards, and flash memory devices (e.g., card, stick, key drive … …).
Having thus described the basic concept, it will be apparent to those skilled in the art that the foregoing disclosure is by way of example only, and is not intended to limit the present application. Various modifications, improvements and adaptations to the present application may occur to those skilled in the art, although not explicitly described herein. Such modifications, improvements and adaptations are proposed in the present application and thus fall within the spirit and scope of the exemplary embodiments of the present application.

Claims (16)

1. A data management method based on a block chain is characterized by comprising the following steps:
the vehicle-mounted terminal provides vehicle data to an enterprise data center, wherein the vehicle data comprises a timestamp generated by the vehicle data;
the enterprise data center performs Hash calculation on the automobile data to generate a first Hash value, and uploads the first Hash value, the timestamp and the automobile identification code to a block chain;
the enterprise data center screens and converts the automobile data into standard data, and uploads the standard data to a block chain;
and the data access platform verifies the authenticity of the standard data, wherein the step of verifying the authenticity of the standard data comprises judging whether the difference value between the uplink time of the first hash value and the timestamp is less than a first threshold value, and if not, the standard data is not authentic.
2. The method of claim 1, wherein the step of verifying the authenticity of the standard data further comprises:
if the difference value between the uplink time of the first hash value and the timestamp is smaller than a first threshold value, acquiring the automobile data from the enterprise data center and carrying out hash calculation on the automobile data to generate a second hash value;
and acquiring the first hash value from the block chain, judging whether the second hash value is consistent with the first hash value or not, if so, judging that the automobile data is true and has no falsification, comparing the automobile data with the standard data, and if the values of the data are consistent, judging that the standard data is true.
3. The method of claim 1, further comprising the data access platform obtaining the standard data from the blockchain.
4. The method of claim 2, wherein the enterprise data center and the data access platform employ the same algorithm for hash calculations, the algorithm comprising SHA256 international hash calculation standard or SM3 cryptographic algorithm.
5. The method of claim 1, wherein the vehicle terminal comprises any of a T-Box, a vehicle unit OBU, or a beacon.
6. The method of claim 1, wherein the step of the vehicle terminal providing the vehicle data and generating a timestamp of the vehicle data to the enterprise data center comprises:
desensitizing the raw data;
encrypting the original data after desensitization processing and covering a time stamp to generate automobile data;
and sending the automobile data to the enterprise data center.
7. The method of claim 1, wherein the data format of the car data includes files, images, and videos.
8. The method of claim 1, wherein the blockchain includes a plurality of nodes including the enterprise data center, the data access platform, a regulatory authority, and a third party authority.
9. A blockchain-based data management system, comprising:
the vehicle-mounted terminal is used for providing automobile data to the enterprise data center, and the automobile data comprises a timestamp generated by the automobile data;
the enterprise data center is used for carrying out Hash calculation on the automobile data to generate a first Hash value, uploading the first Hash value, the timestamp and the automobile identification code to a block chain, carrying out screening and format conversion on the automobile data to generate standard data, and uploading the standard data to the block chain;
and the data access platform is used for verifying the authenticity of the standard data, wherein the step of verifying the authenticity of the standard data comprises the steps of judging whether the difference value between the uplink time of the first hash value and the timestamp is smaller than a first threshold value, and if not, the standard data is not authentic.
10. The system of claim 9, wherein the data access platform is further to:
acquiring the automobile data from the enterprise data center and carrying out hash calculation on the automobile data to generate a second hash value;
and acquiring the first hash value from the block chain, judging whether the second hash value is consistent with the first hash value or not, if so, judging that the automobile data is true and has no falsification, comparing the automobile data with the standard data, and if the values of the data are consistent, judging that the standard data is true.
11. The system of claim 10, wherein the data access platform is further configured to obtain the standard data from the blockchain.
12. The system of claim 10, wherein the enterprise data center and the data access platform employ the same algorithm for hashing, the algorithm comprising SHA256 international hashing standards or SM3 cryptographic algorithm.
13. The system of claim 9, wherein the vehicle terminal comprises any of a T-Box, a vehicle unit OBU, or a beacon.
14. The system of claim 9, wherein the vehicle mounted terminal is further configured to:
desensitizing the raw data;
encrypting the desensitized original data and covering a timestamp to generate automobile data;
and sending the automobile data to the enterprise data center.
15. The system of claim 9, wherein the data format of the car data includes files, images, and videos.
16. The system of claim 9, wherein the blockchain includes a plurality of nodes including the enterprise data center, the data access platform, a regulatory authority, and a third party authority.
CN202211012733.8A 2022-08-23 2022-08-23 Data management method and system based on block chain Pending CN115391832A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211012733.8A CN115391832A (en) 2022-08-23 2022-08-23 Data management method and system based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211012733.8A CN115391832A (en) 2022-08-23 2022-08-23 Data management method and system based on block chain

Publications (1)

Publication Number Publication Date
CN115391832A true CN115391832A (en) 2022-11-25

Family

ID=84120170

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211012733.8A Pending CN115391832A (en) 2022-08-23 2022-08-23 Data management method and system based on block chain

Country Status (1)

Country Link
CN (1) CN115391832A (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE102016007472A1 (en) * 2016-06-18 2017-12-21 Michael Jeschke Procedure for registering multiple vehicle data in a blockchain and protection against subsequent changes
CN109447809A (en) * 2018-11-14 2019-03-08 成都皓图智能科技有限责任公司 A kind of video active identification method of combination block chain
CN110381145A (en) * 2019-07-22 2019-10-25 长沙理工大学 Exchange method and system between electric car and power grid
CN114189377A (en) * 2021-12-07 2022-03-15 上海机动车检测认证技术研究中心有限公司 Automobile data safety assessment method

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE102016007472A1 (en) * 2016-06-18 2017-12-21 Michael Jeschke Procedure for registering multiple vehicle data in a blockchain and protection against subsequent changes
CN109447809A (en) * 2018-11-14 2019-03-08 成都皓图智能科技有限责任公司 A kind of video active identification method of combination block chain
CN110381145A (en) * 2019-07-22 2019-10-25 长沙理工大学 Exchange method and system between electric car and power grid
CN114189377A (en) * 2021-12-07 2022-03-15 上海机动车检测认证技术研究中心有限公司 Automobile data safety assessment method

Similar Documents

Publication Publication Date Title
CN111277575B (en) Driver identity recognition method and device, computer equipment and storage medium
CN111295862B (en) System and method for cryptographically securing vehicle identity
CN110445617B (en) Vehicle parking image storage method, device and system based on block chain
US20230351375A1 (en) Data distribution method, authentication server, and data structure
CN110634303B (en) Traffic violation monitoring and checking method and device
CN106792681B (en) Intrusion detection method, device and equipment for Internet of vehicles
CN112839040A (en) Identity authentication method, apparatus and medium
Davydov et al. Accident detection in internet of vehicles using blockchain technology
CN111798667A (en) Monitoring method, monitoring server, monitoring system and storage medium of non-motor vehicle
US10607100B2 (en) Device for recognizing vehicle license plate number and method therefor
US20190340850A1 (en) Method and Terminal For Controlling the Establishment of a Vehicle Accident Report
KR20200141402A (en) Method and system for collecting and managing event data which is recorded by vehicle
US20210385408A1 (en) Authentication Module for Sensor Data
US11271971B1 (en) Device for facilitating managing cyber security health of a connected and autonomous vehicle (CAV)
US11544408B2 (en) Method and system for managing vehicle generated data
CN110717770B (en) Anti-counterfeiting detection method, device, equipment and storage medium for vehicle parts
CN111475865A (en) Automobile data verification method and verification device
CN115391832A (en) Data management method and system based on block chain
CN115776396A (en) Data processing method and device, electronic equipment and storage medium
US8850198B2 (en) Method for validating a road traffic control transaction
JP2020141318A (en) In-vehicle control device
CN112003867B (en) Communication method of vehicle-mounted T-BOX and cloud server and related equipment
CN113656842A (en) Data verification method, device and equipment
CN111654591A (en) Picture tamper-proofing method, computer equipment and storage medium
CN115123110A (en) Method, computing unit and system for monitoring the interior of a passenger compartment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination