CN117669897A - Carbon emission list collection and presentation method based on industrial Internet identification analysis - Google Patents

Carbon emission list collection and presentation method based on industrial Internet identification analysis Download PDF

Info

Publication number
CN117669897A
CN117669897A CN202410139076.6A CN202410139076A CN117669897A CN 117669897 A CN117669897 A CN 117669897A CN 202410139076 A CN202410139076 A CN 202410139076A CN 117669897 A CN117669897 A CN 117669897A
Authority
CN
China
Prior art keywords
node
data
identification
message
list
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202410139076.6A
Other languages
Chinese (zh)
Other versions
CN117669897B (en
Inventor
赵冬昶
赵明楠
孙锌
张妍
程明
林宇
焦显辉
宿睿
李建新
吴金龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Automotive Carbon Beijing Digital Technology Center Co ltd
Automotive Data of China Tianjin Co Ltd
Original Assignee
China Automotive Carbon Beijing Digital Technology Center Co ltd
Automotive Data of China Tianjin Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Automotive Carbon Beijing Digital Technology Center Co ltd, Automotive Data of China Tianjin Co Ltd filed Critical China Automotive Carbon Beijing Digital Technology Center Co ltd
Priority to CN202410139076.6A priority Critical patent/CN117669897B/en
Publication of CN117669897A publication Critical patent/CN117669897A/en
Application granted granted Critical
Publication of CN117669897B publication Critical patent/CN117669897B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention provides a carbon emission list collection and display method based on industrial Internet identification analysis, wherein a plurality of member nodes perform balance and decentralization on emission lists in a balance data network through the collection and display method, a collection and display system comprises member nodes and a node storage device, and a storage area of the node storage device comprises node key storage, an identification node member catalog, a node data list time sequence index and node list data. The invention has the beneficial effects that: solves various difficulties caused by timeliness, non-centering or weak centering problems in the collection of emission lists and the public social activities.

Description

Carbon emission list collection and presentation method based on industrial Internet identification analysis
Technical Field
The invention belongs to the technical field of information collection and management, and particularly relates to a carbon emission list collection and display system and method.
Background
The LCI list collection link defined in ISO14040/44 is a key basic step for realizing carbon digital management, and the carbon emission list collection work has the characteristics of strong timeliness, cross industry and no membership of general plain rights among subjects. Therefore, there is a need for a means of collecting, storing and sharing a flat, de-centralized emission list. The industrial internet is a new infrastructure in which an identification resolution system provides an industrial site oriented name service infrastructure. The identification password provides an asymmetric encryption, signature algorithm with the identification itself as the public key. The industrial Internet identification analysis system and the identification password technology theoretically provide an infrastructure and a technical theoretical basis for constructing a cross-industry decentralised list collection and release system from the infrastructure and the algorithm.
Disclosure of Invention
In view of the above, the present invention is directed to a system and a method for collecting and displaying carbon emission list based on industrial internet identification analysis, so as to solve various difficulties caused by timeliness, no center or weak center in the collection and displaying of emission list and the social activities.
In order to achieve the above purpose, the technical scheme of the invention is realized as follows:
a carbon emission list collection and disclosure method based on industrial Internet identification analysis.
Further, the plurality of member nodes perform balancing and decentralizing collection, storage and sharing on the emission list in the balancing data network through a collection and disclosure method, wherein the collection and disclosure method comprises the following steps:
t1, member node registration: when a member node prepares to join a flat-weighted data network, registering the member node, acquiring a unique identifier of the member node, and generating a private key for encryption and signature;
t2, organizing emission list data: collecting local emission list data by member nodes, and compiling uniform identification and different timing marks for the local emission list data;
and T3, collecting an emission list: the member node initiates a request for collecting emission list data through other member nodes in the plain data network;
t4, responding to an emission list: the requested member node responds to the emission list data requests of other member nodes, verifies the correctness of the requests and provides the required emission list data information;
t5, public emission list: the member node verifies and credits the emissions list data information provided by the requested member node.
Further, the collecting and displaying system comprises member nodes and a node storage device, wherein a plurality of member nodes are in communication connection with the node storage device, and each member node has a unique identifier;
the storage area of the node storage device comprises node key storage, an identification node member catalog, a local node data list time sequence index and local node clear data;
the node key storage stores an encryption private key and a signature private key of the node;
the identification node member catalog stores network access addresses, node device versions and communication protocol information of other node devices which are acquired by the identification analysis system;
the node data list time sequence index stores the physical position of different time sequence state data of the same list in the node list data as an index;
the node list data storage section stores specific data of different time sequences of list data, and the storage section can be a low-speed storage device.
Further, the T1 includes the following substeps:
t11, the member node A is connected to the plain-weight data network, and accesses an industrial Internet identification analysis system in the plain-weight data network to obtain a unique identification A (a) of the member node A;
t12, writing the identification A (a) into the node identification area of the member node A at one time;
and T13, taking the identifier A (a) as a public key, and obtaining two groups of private keys through the operation of an identifier password generation center analyzed by the industrial Internet identifier, wherein the two groups of private keys are divided into a signature private key A (j) and an encryption private key A (i) which are respectively used for signature and encryption.
Further, the T2 includes the following substeps:
t21, compiling an identification A (b) of emission list data of the member node A, wherein the compiling rule is as follows: for emission list data generated by the same equipment or the same service at different time, adopting the same identification, but marking different time sequences;
t22, writing the emission list data, the identification A (b) and the time sequence into a storage device connected with the member node A;
t23, writing the identification A (b), the time sequence and the index position into a storage device connected with the member node A.
Further, when the other member nodes need to acquire the emission list data, the data message structures are used for the system data request and response by executing T3, T4 and T5, and the structures comprise node identification sections and node encryption data sections, wherein the node encryption data sections consist of data sections and signature sections, and the T3 comprises the following sub-steps:
t31, determining target node and position information: querying an identification member catalog in a storage device connected with a member node A to determine network position information of a target member node B identification B (a), if the network position information does not exist, acquiring the network position information by querying an industrial Internet identification analysis infrastructure, and writing the network position information into the identification member catalog in the storage device connected with the member node A;
t32, compiling and encrypting data requests: compiling a request of emission list data to be accessed, wherein the request comprises a data identifier B (B) and a time sequence section, then signing the message data section by using a signature private key A (j) to obtain a message signature section, and encrypting the message data section and the message signature section by using the identifier B (a) as a public key to form a message node encrypted data section;
t33, sending a request: and combining the identifier A (a) and the encrypted data segment of the message node into a list collection request message N according to the network position information of the identifier B (a), and transmitting the list collection request message N to the target member node B.
Further, the T4 is a response flow of T3, and when receiving a request for collecting the emission list of other nodes, the T4 is executed, where the T4 includes the following sub-steps:
t41, receiving a request: the target member node B receives and reads the member node A request message N and simultaneously acquires the network position of the identifier A (a) carried by the node identifier section in the request message N;
t42, decryption and audit request: decrypting the message encrypted data segment by utilizing the target member node B encryption private key B (i), obtaining the data segment and the signature segment of the request message N, confirming the validity of the request, ending the T4 public emission list flow if invalid, and executing the T43 if valid;
t43, processing a public request: inquiring the time sequence index of the data list of the node in the storage device connected with the target member node B according to the data identifier B (B) and the time sequence in the request message N so as to determine the position of the list data Z in the storage of the node list, and then reading the corresponding list data Z, and marking the corresponding list data Z as null data if the list data Z does not exist;
t44, compiling and sending a response message: the data identification B (B), the time sequence information and the list data Z of the request message N are programmed into a response message data segment, the signature private key B (j) is used for signing the message data segment to obtain a message signature segment, the node identification A (a) in the request message N is used as an encryption public key to encrypt the message data segment and the message signature segment to obtain a message node encryption data segment, the identification B (a) and the message node encryption data segment form a response message M, and the response message M is sent to the member node A.
Further, the step of obtaining the network location of the identifier B (a) carried by the node identifier section in the request packet N in the T41 includes the following steps:
t411, inquiring a member catalog in a storage device connected with a target member node B, checking whether network position information of an identifier A (a) carried by a node identifier section in a public request message N exists, executing T412 if the network position information exists, and turning to T413 if the network position information does not exist;
t412, reading the network location information and going to said T42;
and T413, querying an industrial Internet identification analysis infrastructure, acquiring the network position of the identification A (a) carried by the N node identification section of the request message, and writing the network position into an identification member catalog of a storage device connected with the target member node B.
Further, the checking principle of the validity of the confirmation request in the T42 is as follows: and using the node identification A (a) in the request message as a public key to verify whether the message data segment and the signature segment are matched, if so, considering the request to be valid, and if not, considering the request to be invalid.
Further, the T5 verification and signaling data includes: the member node A decrypts the message encrypted data segment of the response message M by using the encrypted private key A (i) to obtain the message data segment and the message signature segment of the response message M, and then uses the identifier B (a) as a public key to verify whether the message data segment and the message signature segment of the response message M are consistent, if so, the list data Z is adopted, if not, the list data Z is considered to be incorrect, and the collection flow of the target member node B is ended.
Further, a server includes at least one processor, and a memory communicatively coupled to the processor, the memory storing instructions executable by the at least one processor to cause the at least one processor to perform the industrial internet identification resolution based carbon emission inventory collection publication method.
Compared with the prior art, the carbon emission list collection and display method based on industrial Internet identification analysis has the following beneficial effects:
(1) From the angles of emission list collection and public activity organization, different from the traditional centralized reporting and tree-shaped recursion progressive summarization system structure, the invention builds a system organization architecture mode of right-of-way decentralization, is more suitable for cross-industry and weak attribution scenes of emission list collection public work, and is easier to build and form an emission list collection safety data space;
(2) From the aspect of infrastructure, the invention adopts an industrial Internet identification analysis system, is different from name service infrastructures such as DNS and the like, and is more suitable for the characteristics of the Internet of things for collecting emission data;
(3) From the data organization perspective, the invention adopts time sequence index, and more accords with the timeliness characteristic of emission data;
(4) From the aspect of data security, the invention adopts the identification password technology, takes the identification as the public key, does not depend on public key infrastructure CA any more, reduces the dependence of the system on the infrastructure, and reduces the cost of constructing the trusted system and the network communication overhead required by the encryption signature step of the system.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the description serve to explain the invention. In the drawings:
FIG. 1 is a schematic illustration of a collection of emissions manifests according to an embodiment of the present invention;
FIG. 2 is a schematic diagram of a work flow diagram of a method for collecting and disclosing an emissions list in accordance with an embodiment of the present invention;
FIG. 3 is a schematic diagram of a data message structure according to an embodiment of the present invention;
FIG. 4 is a schematic flow chart diagram of a collection, response and public emission list according to an embodiment of the present invention.
Detailed Description
It should be noted that, without conflict, the embodiments of the present invention and features of the embodiments may be combined with each other.
The invention will be described in detail below with reference to the drawings in connection with embodiments.
The collection and disclosure method for the carbon emission list based on industrial Internet identification analysis is shown in fig. 1, wherein a plurality of member nodes perform balancing and decentralizing collection, storage and sharing on the emission list in a balancing data network through the collection and disclosure method, and the collection and disclosure method shown in fig. 2 comprises the following steps:
t1, member node registration: when a member needing data acquisition prepares to join the plain-weight data network, the process is executed once, a member node joins the plain-weight data network, registers for the member node, acquires a unique identifier of the member node, generates a private key for encryption and signature, and stores the private key into a node key storage area in a node storage device;
t2, organizing emission list data: after the member node joins the plain data network, the member node needs to organize local list data, collects the local discharge list data, compiles uniform identification and different timing marks for the local discharge list data and stores the local discharge list data in the node list area in the node storage device;
and T3, collecting an emission list: the member node initiates a request for collecting emission list data through other member nodes in the plain data network;
t4, responding to an emission list: the requested member node responds to the emission list data requests of other member nodes, verifies the correctness of the requests and provides the required emission list data information;
t5, public emission list: the member node verifies and credits the emissions list data information provided by the requested member node.
The specific shown in figure 3, the collecting and displaying system comprises member nodes and a node storage device, wherein a plurality of member nodes are in communication connection with the node storage device, and each member node has a unique identifier; the storage area of the node storage device comprises node key storage, an identification node member catalog, a local node data list time sequence index and local node clear data; the node key storage stores an encryption private key and a signature private key of the node; the identification node member catalog stores network access addresses, node device versions and communication protocol information of other node devices which are acquired by the identification analysis system; the node data list time sequence index stores the physical position of different time sequence state data of the same list in the node list data as an index; the node list data storage section stores specific data of different time sequences of list data, and the storage section can be a low-speed storage device.
Specifically, T1 comprises the following sub-steps:
t11, the member node A is connected to the plain-weight data network, and accesses an industrial Internet identification analysis system in the plain-weight data network to obtain a unique identification A (a) of the member node A;
t12, writing the identification A (a) into the node identification area of the member node A at one time;
and T13, taking the identifier A (a) as a public key, obtaining two groups of private keys through the operation of an identifier password generation center (KGC) for industrial Internet identifier analysis, storing the private keys into a node key storage area in a node storage device, and dividing the two groups of private keys into a signature private key A (j) and an encryption private key A (i) which are respectively used for signature and encryption.
Specifically, after the member node accesses the flat-weighted network, the member node needs to organize local manifest data, and then collect and manifest a flow service for a subsequent manifest, and T2 includes the following sub-steps:
t21, compiling an identification A (b) of emission list data of the member node A, wherein the compiling rule is as follows: for emission list data generated by the same equipment or the same service at different time, adopting the same identification, but marking different time sequences;
t22, writing the emission list data, the identification A (b) and the time sequence into a local node bill area in a storage device connected with the member node A, and obtaining an index position;
t23, writing the identification A (b), the time sequence and the index position into a time sequence index area of the data list of the node in the storage device connected with the member node A.
Further, when the emission list data is required to be acquired by other member nodes, a system data message structure is required to be used by the T3, T3 and T4 in the system data request and response, the structure comprises a node identification section and a node encryption data section, wherein the node encryption data section consists of a data section and a signature section, and the collecting, response and message collecting processes of the T3, T4 and T5 are shown in fig. 4. T3 comprises the following substeps:
t31, determining target node and position information: querying an identification member catalog in a storage device connected with a member node A to determine network position information of a target member node B identification B (a), if the network position information does not exist, acquiring the network position information by querying an industrial Internet identification analysis infrastructure, and writing the network position information into the identification member catalog in the storage device connected with the member node A;
t32, compiling and encrypting data requests: compiling a request of emission list data to be accessed, wherein the request comprises a data identifier B (B) and a time sequence section, then signing the message data section by using a signature private key A (j) to obtain a message signature section, and encrypting the message data section and the message signature section by using the identifier B (a) as a public key to form a message node encrypted data section;
t33, sending a request: and combining the identifier A (a) and the encrypted data segment of the message node into a list collection request message N according to the network position information of the identifier B (a), and transmitting the list collection request message N to the target member node B.
Further, T4 is a response flow of T3, and when receiving a request for collecting the emission list of other nodes, executing T4, where T4 includes the following sub-steps:
t41, receiving a request: the target member node B receives and reads the member node A request message N and simultaneously acquires the network position of the identifier A (a) carried by the node identifier section in the request message N;
t42, decryption and audit request: decrypting the message encrypted data segment by utilizing the target member node B encryption private key B (i), obtaining the data segment and the signature segment of the request message N, confirming the validity of the request, ending the T4 public emission list flow if invalid, and executing the T43 if valid;
optionally, in T42, the member node B may determine, according to the data segment of the request packet N and the identifier a (a), a data range and access rights that may be used in the formula, thereby enhancing security of data transmission.
T43, processing a public request: inquiring the time sequence index of the data list of the node in the storage device connected with the target member node B according to the data identifier B (B) and the time sequence in the request message N so as to determine the position of the list data Z in the storage of the node list, and then reading the corresponding list data Z, and marking the corresponding list data Z as null data if the list data Z does not exist;
t44, compiling and sending a response message: the data identification B (B), the time sequence information and the list data Z of the request message N are programmed into a response message data segment, the signature private key B (j) is used for signing the message data segment to obtain a message signature segment, the node identification A (a) in the request message N is used as an encryption public key to encrypt the message data segment and the message signature segment to obtain a message node encryption data segment, the identification B (a) and the message node encryption data segment form a response message M, and the response message M is sent to the member node A.
Finally, the member node A receives the response message M from the member node B to perform a T5 process, and the T5 verification and message collection data process comprises the following steps: the member node A decrypts the message encrypted data segment of the response message M by using the encrypted private key A (i) to obtain the message data segment and the message signature segment of the response message M, and then uses the identifier B (a) as a public key to verify whether the message data segment and the message signature segment of the response message M are consistent, if so, the list data Z is adopted, if not, the list data Z is considered to be incorrect, and the collection flow of the target member node B is ended.
Optionally, the step of obtaining, in T41, the network location of the identifier B (a) carried by the node identifier section in the request packet N includes the following steps:
t411, inquiring a member catalog in a storage device connected with a target member node B, checking whether network position information of an identifier A (a) carried by a node identifier section in a public request message N exists, executing T412 if the network position information exists, and turning to T413 if the network position information does not exist;
t412, reading the network location information and going to said T42;
and T413, querying an industrial Internet identification analysis infrastructure, acquiring the network position of the identification A (a) carried by the N node identification section of the request message, and writing the network position into an identification member catalog of a storage device connected with the target member node B.
Optionally, the auditing principle of validating the request in T42 is as follows: and using the node identification A (a) in the request message as a public key to verify whether the message data segment and the signature segment are matched, if so, considering the request to be valid, and if not, considering the request to be invalid.
A server comprising at least one processor, and a memory communicatively coupled to the processor, the memory storing instructions executable by the at least one processor to cause the at least one processor to perform the industrial internet identification resolution based carbon emission inventory collection publication method.
Best mode for carrying out the invention:
in this embodiment, TCP/IP is adopted as a network protocol, HTTP is adopted as a data exchange application protocol, JSON is adopted as a message representation means, handle is adopted as an identification coding method, SM9 is adopted as an identification cryptographic algorithm, a general computer server is adopted as a physical device of a member node, a general NTFS file system server is adopted as a node storage device, influxDB is adopted as a time sequence data index section to compile and store list data, and the method specifically includes the following steps:
t1, member node registration: taking a general computer server as node equipment, and installing node software, wherein the software is used for executing all logic steps of the invention;
the node software has built in the node device industry internet identification (identification shape is as 88.186.1/device.001), SM9 signature private key, encryption private key and SM9 KGC public key. The node software issues an HTTP service as a response server for the manifest request, and the service IP address and service port of the node software are registered in the industrial Internet representation analysis system.
The node software is installed to finish InfluxDB initialization at the same time, and finish the establishment of the time sequence index of the identification data and the initialization of the inventory data storage. The node software provides a guide for guiding node members to issue local list data and connect emission data acquisition equipment.
T2, organizing emission list data: the method is completed by matching the node software with InfluxDB, other time sequence databases such as IoTDB and the like can be switched in actual operation, and the method can be realized by a traditional relational database.
And T3, collecting an emission list: step 1: the identification of the target node where the list to be collected is located is formulated, and the identification of the target enterprise is usually obtained by a alliance organization on line, and can also be obtained through an alliance public website. Inquiring a node cache or an industrial Internet identification analysis system through node software to obtain a network IP address and a TCP port where a target node identification is located;
step 2: the inventory identifications and required collection timing required to be collected to the target node are formulated, typically by members of both parties, or by providing identification retrieval through a publicizing platform via a federation organization. The node software generates a data segment JSON character string of a data collection request message according to the data list identification and the collection time sequence, signs the character string UTF-8 code through a local signature private key and an SM9 signature algorithm (SM 3 is used as a hash algorithm), and generates a request signature segment;
step 3: the node software organizes the data segment and the signature segment generated in the step 2 into a new JSON character string, takes the target node identifier as a public key, encrypts the character string UTF-8 code by an SM9 encryption algorithm, and obtains a message node encrypted data segment;
step 4: and the node software composes the target node identification and the node encryption data segment into a complete JSON string code collection request message. And waiting for the response of the target node by utilizing the HTTP protocol POST to the network IP address and the TCP port where the target node identifier obtained in the step 1 is located.
T4, responding to an emission list: step 1: node software receives and reads a list data request message of a public request node through HTTP, reads a node identification segment requested by a formula, and queries a node cache or an industrial Internet identification analysis system to obtain a network IP address and a TCP port where a request node identification is located;
step 2: the node software decrypts the encrypted data segment of the message by using the encryption private key of the device and the SM9 encryption algorithm to obtain the data segment and the signature segment of the request message;
step 3: and the node uses the node identification of the request message node identification section as a public key, verifies whether the message point data section accords with the signature section through an SM9 signature algorithm, and if so, acquires the message point request data and continues the follow-up steps. If the data list does not accord with the data list, the data list is considered to be incorrect, and the public flow is ended;
step 4: the node software queries a local authority list according to the identification and the time sequence of the data list of the public request data segment, and judges the data range and the access authority which can be public by the node;
step 5: the node software queries the time sequence index of the data list of the node in the node storage device connected with the node through InfluxDB according to the data identifier and the time sequence section in the public request, acquires the list data, and returns null data if the data does not exist;
step 6: node software compiles a public response message data request, generates a data public response message data segment JSON character string according to the data list identification and collection time sequence and the list data obtained in the step 5, signs the character string UTF-8 code through a local signature private key and an SM9 signature algorithm (SM 3 is used as a hash algorithm), and generates a request signature segment;
step 7: the node software organizes the data segment and the signature segment generated in the step 6 into a new JSON character string, takes the request node identifier as a public key, encrypts the character string UTF-8 code by an SM9 encryption algorithm, and obtains a message node encrypted data segment;
step 8: the node software combines the request node identification and the node encryption data segment into a complete JSON string code collection request message. And completing the list indication response by using the HTTP protocol POST to the network IP address and the TCP port where the target node identification obtained in the step 1 is located.
T5, public emission list: and receiving a response message returned by the target node. The node software judges whether the message node identification section accords with the expectation or not, and decrypts the message encrypted data section by using the node encrypted private key and an SM9 encryption algorithm to obtain a data section and a signature section of the response message;
and the node software uses the response node identification in the node identification section as a public key, verifies whether the message point data section is consistent with the signature section through an SM9 algorithm, if so, acquires the list data of the message book, stores the list data into a local list database, and if not, considers that the data list is incorrect, and ends the collection flow. In this practice, the local manifest database is a relational database to which the node software is connected.
Those of ordinary skill in the art will appreciate that the elements and method steps of each example described in connection with the embodiments disclosed herein may be implemented as electronic hardware, computer software, or combinations of both, and that the elements and steps of each example have been described generally in terms of functionality in the foregoing description to clearly illustrate this interchangeability of hardware and software. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
In the several embodiments provided in this application, it should be understood that the disclosed methods and systems may be implemented in other ways. For example, the above-described division of units is merely a logical function division, and there may be another division manner when actually implemented, for example, a plurality of units or components may be combined or may be integrated into another system, or some features may be omitted or not performed. The units may or may not be physically separate, and components shown as units may or may not be physical units, may be located in one place, or may be distributed over a plurality of network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the embodiment of the present invention.
Finally, it should be noted that: the above embodiments are only for illustrating the technical solution of the present invention, and not for limiting the same; although the invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical scheme described in the foregoing embodiments can be modified or some or all of the technical features thereof can be replaced by equivalents; such modifications and substitutions do not depart from the spirit of the invention, and are intended to be included within the scope of the appended claims and description.
The foregoing description of the preferred embodiments of the invention is not intended to be limiting, but rather is intended to cover all modifications, equivalents, alternatives, and improvements that fall within the spirit and scope of the invention.

Claims (10)

1. The carbon emission list collection and presentation method based on industrial Internet identification analysis is characterized in that: the plurality of member nodes collect, store and share emissions listings for carbon in a peering and decentralizing manner in a peering data network by a collection and publication method comprising the steps of:
t1, member node registration: when a member node prepares to join a flat-weighted data network, registering the member node, acquiring a unique identifier of the member node, and generating a private key for encryption and signature;
t2, organizing emission list data: collecting local emission list data by member nodes, and compiling uniform identification and different timing marks for the local emission list data;
and T3, collecting an emission list: the member node initiates a request for collecting emission list data through other member nodes in the plain data network;
t4, responding to an emission list: the requested member node responds to the emission list data requests of other member nodes, verifies the correctness of the requests and provides the required emission list data information;
t5, public emission list: the member node verifies and credits the emissions list data information provided by the requested member node.
2. The industrial internet identification resolution-based carbon emission inventory collection and publication method of claim 1, wherein: the collecting and displaying system comprises member nodes and a node storage device, wherein a plurality of member nodes are in communication connection with the node storage device, and each member node has a unique identifier;
the storage area of the node storage device comprises node key storage, an identification node member catalog, a local node data list time sequence index and local node clear data;
the node key storage stores an encryption private key and a signature private key of the node;
the identification node member catalog stores network access addresses, node device versions and communication protocol information of other node devices which are acquired by the identification analysis system;
the node data list time sequence index stores the physical position of different time sequence state data of the same list in the node list data as an index;
the node list data storage section stores specific data of different time sequences of list data, and the storage section can be a low-speed storage device.
3. The method for collecting and displaying carbon emission list based on industrial internet identification resolution according to claim 2, wherein the method comprises the following steps: the T1 comprises the following substeps:
t11, the member node A is connected to the plain-weight data network, and accesses an industrial Internet identification analysis system in the plain-weight data network to obtain a unique identification A (a) of the member node A;
t12, writing the identification A (a) into the node identification area of the member node A at one time;
and T13, taking the identifier A (a) as a public key, and obtaining two groups of private keys through the operation of an identifier password generation center analyzed by the industrial Internet identifier, wherein the two groups of private keys are divided into a signature private key A (j) and an encryption private key A (i) which are respectively used for signature and encryption.
4. The industrial internet identification resolution-based carbon emission inventory collection and publication method of claim 3, wherein: the T2 comprises the following substeps:
t21, compiling an identification A (b) of emission list data of the member node A, wherein the compiling rule is as follows: for emission list data generated by the same equipment or the same service at different time, adopting the same identification, but marking different time sequences;
t22, writing the emission list data, the identification A (b) and the time sequence into a storage device connected with the member node A;
t23, writing the identification A (b), the time sequence and the index position into a storage device connected with the member node A.
5. The method for collecting and displaying carbon emission list based on industrial internet identification resolution according to claim 4, wherein the method comprises the following steps: when other member nodes need to acquire emission list data, a data message structure is needed to be used by T3, T4 and T5 in system data request and response, the structure comprises a node identification section and a node encryption data section, wherein the node encryption data section consists of a data section and a signature section, and the T3 comprises the following sub-steps:
t31, determining target node and position information: querying an identification member catalog in a storage device connected with a member node A to determine network position information of a target member node B identification B (a), if the network position information does not exist, acquiring the network position information by querying an industrial Internet identification analysis infrastructure, and writing the network position information into the identification member catalog in the storage device connected with the member node A;
t32, compiling and encrypting data requests: compiling a request of emission list data to be accessed, wherein the request comprises a data identifier B (B) and a time sequence section, then signing the message data section by using a signature private key A (j) to obtain a message signature section, and encrypting the message data section and the message signature section by using the identifier B (a) as a public key to form a message node encrypted data section;
t33, sending a request: and combining the identifier A (a) and the encrypted data segment of the message node into a list collection request message N according to the network position information of the identifier B (a), and transmitting the list collection request message N to the target member node B.
6. The method for collecting and displaying carbon emission list based on industrial internet identification resolution according to claim 5, wherein the method comprises the following steps: t4 is a response flow of T3, and when receiving the collection request of the emission list of other nodes, T4 is executed, wherein T4 comprises the following sub-steps:
t41, receiving a request: the target member node B receives and reads the member node A request message N and simultaneously acquires the network position of the identifier A (a) carried by the node identifier section in the request message N;
t42, decryption and audit request: decrypting the message encrypted data segment by utilizing the target member node B encryption private key B (i), obtaining the data segment and the signature segment of the request message N, confirming the validity of the request, ending the T4 public emission list flow if invalid, and executing the T43 if valid;
t43, processing a public request: inquiring the time sequence index of the data list of the node in the storage device connected with the target member node B according to the data identifier B (B) and the time sequence in the request message N so as to determine the position of the list data Z in the storage of the node list, and then reading the corresponding list data Z, and marking the corresponding list data Z as null data if the list data Z does not exist;
t44, compiling and sending a response message: the data identification B (B), the time sequence information and the list data Z of the request message N are programmed into a response message data segment, the signature private key B (j) is used for signing the message data segment to obtain a message signature segment, the node identification A (a) in the request message N is used as an encryption public key to encrypt the message data segment and the message signature segment to obtain a message node encryption data segment, the identification B (a) and the message node encryption data segment form a response message M, and the response message M is sent to the member node A.
7. The industrial internet identification resolution-based carbon emission inventory collection and publication method of claim 6, wherein: the step of obtaining the network location of the identifier B (a) carried by the node identifier section in the request packet N in the T41 includes the following steps:
t411, inquiring a member catalog in a storage device connected with a target member node B, checking whether network position information of an identifier A (a) carried by a node identifier section in a public request message N exists, executing T412 if the network position information exists, and turning to T413 if the network position information does not exist;
t412, reading the network location information and going to said T42;
and T413, querying an industrial Internet identification analysis infrastructure, acquiring the network position of the identification A (a) carried by the N node identification section of the request message, and writing the network position into an identification member catalog of a storage device connected with the target member node B.
8. The industrial internet identification resolution-based carbon emission inventory collection and publication method of claim 6, wherein: the auditing principle of validating the request in the T42 is as follows: and using the node identification A (a) in the request message as a public key to verify whether the message data segment and the signature segment are matched, if so, considering the request to be valid, and if not, considering the request to be invalid.
9. The industrial internet identification resolution-based carbon emission inventory collection and publication method of claim 6, wherein: the T5 verification and signaling data comprises: the member node A decrypts the message encrypted data segment of the response message M by using the encrypted private key A (i) to obtain the message data segment and the message signature segment of the response message M, and then uses the identifier B (a) as a public key to verify whether the message data segment and the message signature segment of the response message M are consistent, if so, the list data Z is adopted, if not, the list data Z is considered to be incorrect, and the collection flow of the target member node B is ended.
10. A server, characterized by: comprising at least one processor and a memory communicatively coupled to the processor, the memory storing instructions executable by the at least one processor to cause the at least one processor to perform the industrial internet identification resolution based carbon emission inventory collection presentation method of any one of claims 1-9.
CN202410139076.6A 2024-02-01 2024-02-01 Carbon emission list collection and presentation method based on industrial Internet identification analysis Active CN117669897B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202410139076.6A CN117669897B (en) 2024-02-01 2024-02-01 Carbon emission list collection and presentation method based on industrial Internet identification analysis

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202410139076.6A CN117669897B (en) 2024-02-01 2024-02-01 Carbon emission list collection and presentation method based on industrial Internet identification analysis

Publications (2)

Publication Number Publication Date
CN117669897A true CN117669897A (en) 2024-03-08
CN117669897B CN117669897B (en) 2024-04-16

Family

ID=90073503

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202410139076.6A Active CN117669897B (en) 2024-02-01 2024-02-01 Carbon emission list collection and presentation method based on industrial Internet identification analysis

Country Status (1)

Country Link
CN (1) CN117669897B (en)

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109784927A (en) * 2019-01-22 2019-05-21 浙江爱立美能源科技有限公司 Carbon energy conservation transaction system and method based on block chain
CN109861975A (en) * 2018-12-26 2019-06-07 中国科学院计算机网络信息中心 Identifier register information query method and system towards industry internet
CN113704357A (en) * 2021-09-01 2021-11-26 雷长宝 Smart city data sharing method and system based on block chain
CN114531245A (en) * 2022-01-17 2022-05-24 山东大学 Carbon emission trading method based on block chain
CN114610984A (en) * 2022-03-03 2022-06-10 中汽数据(天津)有限公司 Industrial Internet identification issuing and inquiring method and data identification system
CN114629720A (en) * 2022-04-12 2022-06-14 浙江工业大学 Industrial Internet cross-domain authentication method based on block chain and Handle identification
CN114697048A (en) * 2022-06-01 2022-07-01 天津市普迅电力信息技术有限公司 Carbon emission data sharing method and system based on block chain
CN115632777A (en) * 2022-12-12 2023-01-20 中电长城网际系统应用有限公司 Data processing method and electronic equipment
CN117114542A (en) * 2023-07-25 2023-11-24 淮阴工学院 Cold chain logistics carbon emission data monitoring method and device based on block chain and edge calculation
CN117176686A (en) * 2023-07-19 2023-12-05 东南大学 Industrial Internet identification method based on blockchain and enterprise cross-domain data aggregation
CN117348563A (en) * 2023-10-31 2024-01-05 中国钢研科技集团有限公司 Intelligent carbon meter system based on Internet of things and block chain and used for steel industry

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109861975A (en) * 2018-12-26 2019-06-07 中国科学院计算机网络信息中心 Identifier register information query method and system towards industry internet
CN109784927A (en) * 2019-01-22 2019-05-21 浙江爱立美能源科技有限公司 Carbon energy conservation transaction system and method based on block chain
CN113704357A (en) * 2021-09-01 2021-11-26 雷长宝 Smart city data sharing method and system based on block chain
CN114531245A (en) * 2022-01-17 2022-05-24 山东大学 Carbon emission trading method based on block chain
CN114610984A (en) * 2022-03-03 2022-06-10 中汽数据(天津)有限公司 Industrial Internet identification issuing and inquiring method and data identification system
CN114629720A (en) * 2022-04-12 2022-06-14 浙江工业大学 Industrial Internet cross-domain authentication method based on block chain and Handle identification
CN114697048A (en) * 2022-06-01 2022-07-01 天津市普迅电力信息技术有限公司 Carbon emission data sharing method and system based on block chain
CN115632777A (en) * 2022-12-12 2023-01-20 中电长城网际系统应用有限公司 Data processing method and electronic equipment
CN117176686A (en) * 2023-07-19 2023-12-05 东南大学 Industrial Internet identification method based on blockchain and enterprise cross-domain data aggregation
CN117114542A (en) * 2023-07-25 2023-11-24 淮阴工学院 Cold chain logistics carbon emission data monitoring method and device based on block chain and edge calculation
CN117348563A (en) * 2023-10-31 2024-01-05 中国钢研科技集团有限公司 Intelligent carbon meter system based on Internet of things and block chain and used for steel industry

Also Published As

Publication number Publication date
CN117669897B (en) 2024-04-16

Similar Documents

Publication Publication Date Title
AU2021206913B2 (en) Systems and methods for distributed data sharing with asynchronous third-party attestation
CN110138560B (en) Double-proxy cross-domain authentication method based on identification password and alliance chain
WO2018121797A1 (en) Trust network-based decentralized public key management method and management system
US8549588B2 (en) Systems and methods for obtaining network access
CN106487743B (en) Method and apparatus for supporting multi-user cluster identity verification
JP5215476B2 (en) System and method for data authorization in a distributed storage network
EP2798809B1 (en) Dynamic pseudonymization method for user data profiling networks and user data profiling network implementing the method
CN111368230B (en) Processing method and device for industrial Internet identification based on blockchain
US7546454B2 (en) Automated digital certificate discovery and management
CN105229597B (en) Distributed nature collects the method and system with correlation engine
CN103607416B (en) A kind of method and application system of the certification of network terminal machine identity
Yao et al. PBCert: privacy-preserving blockchain-based certificate status validation toward mass storage management
CN111753014B (en) Identity authentication method and device based on block chain
CN112311538B (en) Identity verification method, device, storage medium and equipment
CN106790296B (en) Domain name record verification method and device
CN110417863A (en) Generate method and apparatus, identity authentication method and the device of identity code
WO2008030526A2 (en) Systems and methods for obtaining network access
CN102916811A (en) Multielement entity identity certificate information storage method
CN113392430A (en) Digital resource management method and system based on intelligent contract authentication
Tehrani et al. The missing piece: On namespace management in NDN and how DNSSEC might help
CN101325493B (en) Method and system for authenticating a user
EP3937097A1 (en) System and method for verifiably proving proximity
CN112235290B (en) Block chain-based Internet of things equipment management method and first Internet of things equipment
CN117669897B (en) Carbon emission list collection and presentation method based on industrial Internet identification analysis
JP2004272380A (en) Group authenticating method and system, service providing device, authentication device, service provision program and recording medium with its program recorded and authentication program and recording medium with its program recorded

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant