CN109547408B - Base station dynamic loop information monitoring method based on block chain management - Google Patents

Base station dynamic loop information monitoring method based on block chain management Download PDF

Info

Publication number
CN109547408B
CN109547408B CN201811205472.5A CN201811205472A CN109547408B CN 109547408 B CN109547408 B CN 109547408B CN 201811205472 A CN201811205472 A CN 201811205472A CN 109547408 B CN109547408 B CN 109547408B
Authority
CN
China
Prior art keywords
block chain
machine room
node server
base station
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201811205472.5A
Other languages
Chinese (zh)
Other versions
CN109547408A (en
Inventor
李轶
樊建峰
吴文渊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
University of Chinese Academy of Sciences
Chongqing Institute of Green and Intelligent Technology of CAS
Original Assignee
University of Chinese Academy of Sciences
Chongqing Institute of Green and Intelligent Technology of CAS
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by University of Chinese Academy of Sciences, Chongqing Institute of Green and Intelligent Technology of CAS filed Critical University of Chinese Academy of Sciences
Priority to CN201811205472.5A priority Critical patent/CN109547408B/en
Publication of CN109547408A publication Critical patent/CN109547408A/en
Application granted granted Critical
Publication of CN109547408B publication Critical patent/CN109547408B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1466Active attacks involving interception, injection, modification, spoofing of data unit addresses, e.g. hijacking, packet injection or TCP sequence number attacks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0625Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation with splitting of the data block into left and right halves, e.g. Feistel based algorithms, DES, FEAL, IDEA or KASUMI
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Computer And Data Communications (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a base station dynamic loop information monitoring method based on block chain management, and belongs to the field of information technology monitoring systems. The method comprises a base station monitoring system, a distributed communication network and a cloud storage server, and is characterized by comprising the following steps: the method comprises the following steps: initializing and setting a base station, a network and a server system; step two: a user or equipment initiates a public key encryption transaction request for data storage, authorization control and data monitoring to a machine room node server through a network; step three: the computer room node server synthesizes the authorization condition of the requester; step four: the method comprises the following steps that a machine room node server initiates a public key encryption execution request to a cloud storage server or a base station monitoring system through a network; step five: the cloud storage server performs authority verification on data storage and authorization control transactions; step six: making a corresponding response according to the transaction request, and making feedback to the machine room node server; step seven: and the computer room node server broadcasts and stores the transaction in the local block chain.

Description

Base station dynamic loop information monitoring method based on block chain management
Technical Field
The invention discloses a base station dynamic loop information monitoring method based on block chain management, belongs to the technical field of information safety, and relates to the field of information technology monitoring systems.
Background
With the development of economy, the development of the communication industry shows a strong tendency, and the communication mode is more convenient from 3G to 4G to 5G technology which is not yet officially commercialized. The rapid development of the communication industry has also driven the development of infrastructure to be increasingly prosperous. Especially, the size of a base station for securing the quality of a communication signal is rapidly expanding. In order to ensure the normal operation of the base station, the related companies increase the investment in the operation and maintenance aspects of the base station, especially in the aspect of remote monitoring of the environmental data of the base station. The system mainly integrates sensor signals of various moving rings in the base station, and sends the integrated signals to a server of an operation and maintenance company in real time, and realizes statistics and alarm service of various information.
However, the existing dynamic ring monitoring system mainly adopts a centralized architecture service mode. In the mode, as the number of the base stations is more and more, the load of the central server is increased, and the problem of traffic overload is increasingly highlighted; and the server in the mode is also easily attacked by DDOS of lawless persons, so that the instant paralysis of the monitoring system is caused, and huge economic loss is brought to the society. With the increase of the number of the base stations, the expansibility of the whole system is greatly reduced in the later period, and the service system in the mode is easy to have single point failure to cause the downtime of the whole system.
In addition, as the use of the base station is increased along with the complex performance of the base station (which is represented by mobile, internet, telecommunication, and shared by various operation and maintenance companies), management confusion is caused on the information of the base station and the authorized use of power systems (access control systems, environmental data, and the like). The current dynamic loop monitoring system cannot realize fine-grained management of each system authority, and further cannot realize traceability and auditability of an information management system. In addition, the public key encryption transmission of the transmitted sensitive information of various information systems can not be realized, and hidden danger is brought to information leakage.
In summary, the dynamic ring monitoring system used in the present stage has great defects and hidden dangers in the service architecture level, the authority management level and the information security transmission level, and also becomes a limitation for the development of the base station information system.
Disclosure of Invention
The invention aims to provide a method for monitoring the dynamic ring information of a base station based on block chain management. The technology utilizes the characteristics of non-tamper property and traceability of data on a block chain and the characteristics of guaranteeing the security of the data and the control of user authority based on public key encryption of the block chain technology, and solves the problems of system fine-grained authority control, system information acquisition management confusion, information security and privacy and the like which cannot be realized by the existing system.
In order to achieve the purpose, the invention provides the following technical scheme:
a method for monitoring the dynamic ring information of a base station based on block chain management comprises a base station monitoring system, a distributed communication network and a cloud storage server, and is characterized in that the technology for monitoring the dynamic ring information of the base station based on the block chain management comprises the following steps:
the method comprises the following steps: initializing a base station monitoring system, a distributed communication network and a cloud storage server;
step two: a user or equipment initiates a public key encryption transaction request for data storage, authorization control and data monitoring to a machine room node server through a network;
step three: the block chain system of the machine room node server retrieves the transaction type block chain and synthesizes the authorization condition of the requester;
step four: the method comprises the following steps that a machine room node server initiates a public key encryption execution request to a cloud storage server or a base station monitoring system through a network;
step five: the cloud storage server performs authority verification on data storage and authorization control transactions;
step six: according to the transaction request, the cloud storage server or the base station monitoring system makes a corresponding response and feeds back the response to the machine room node server;
step seven: the machine room node server broadcasts the transaction to the distributed node server and stores the transaction in a local block chain;
step eight: when the transaction is authorized to be controlled and monitored, the node server of the machine room needs to feed back corresponding data to the user.
Further, the base station monitoring system is formed by connecting various sensor networks which are monitored in real time, the distributed communication network is formed by connecting node servers through a network, the node servers are divided into a machine room node server and a distributed node server, an information management module and a block chain management module are configured, the block chain management module mainly comprises a block chain system and a storage system, and the cloud storage server is formed by a cloud storage block chain system and a cloud storage system.
Further, the initialization setting comprises equipment initialization, and an initial block number and a block data Hash value related to the cloud storage server are sent to the machine room node server and stored in the last block of the machine room node block chain.
Further, the data storage is a public key encryption transaction request initiated by the device, and the authorization control and data monitoring are public key encryption transaction requests initiated by the user.
Further, the block chain system of the machine room node server retrieves the transaction type block chain, inquires the last block of the block chain of the machine room node server, synthesizes the authorization condition of the requester, refuses the request if the action is not allowed, and records the transaction in the local block chain; if the action is allowed, the next step is performed.
Further, the cloud storage server performs authority verification on the block number and the Hash value sent by the machine room node server in data storage and authorization control transactions.
Further, after the cloud storage server or the base station monitoring system makes a corresponding response according to the transaction request, a public key encrypted block number, a Hash value or a response ending signal is sent to the machine room node server.
Further, the machine room node server broadcasts the transaction to the distributed node server, and stores the block number and the Hash value in the last block of the local block chain.
The invention has the beneficial effects that: the invention provides a base station dynamic ring information monitoring technology based on block chain management, which utilizes the non-tamper property and traceability of data on a block data chain to change a consensus mechanism, improves the expandability of a system through a hierarchical information system architecture, ensures the safety and privacy of the data through a public key encryption technology, and can effectively solve the problems of system fine-grained authority control, system information acquisition management confusion, information safety and privacy and the like which cannot be realized by the conventional system.
Drawings
In order to make the object, technical scheme and beneficial effect of the invention more clear, the invention provides the following drawings for explanation:
fig. 1 is a structural diagram of a method for monitoring dynamic loop information of a base station based on block chain management according to the present invention;
FIG. 2 is a flow chart of the response of the present invention to a data storage transaction;
FIG. 3 is a flow chart of the response of the present invention to an authorization control transaction;
FIG. 4 is a flow chart of the response of the present invention to a data monitoring transaction.
Detailed Description
The embodiments of the present invention are described below with reference to specific embodiments, and other advantages and effects of the present invention will be easily understood by those skilled in the art from the disclosure of the present specification. The invention is capable of other and different embodiments and of being practiced or of being carried out in various ways, and its several details are capable of modification in various respects, all without departing from the spirit and scope of the present invention. It is to be noted that the features in the following embodiments and examples may be combined with each other without conflict.
It should be noted that the drawings provided in the following embodiments are only for illustrating the basic idea of the present invention, and the components related to the present invention are only shown in the drawings rather than drawn according to the number, shape and size of the components in actual implementation, and the type, quantity and proportion of the components in actual implementation may be changed freely, and the layout of the components may be more complicated.
The device information in the embodiment: the base station monitoring system is formed by connecting various sensor networks which are monitored in real time, the distributed communication network is formed by connecting node servers through a network, the node servers are divided into a machine room node server and a distributed node server which are both provided with an information management module and a block chain management module, the block chain management module mainly comprises a block chain system and a storage system, and the cloud storage server is formed by a cloud storage block chain system and a cloud storage system.
Example 1: a method for monitoring the dynamic ring information of base station based on block chain management responds to data storage affairs.
As shown in fig. 1, a method for monitoring information of a moving loop of a base station based on block chain management in embodiment 1 includes a base station monitoring system, a distributed communication network, and a cloud storage server, and is characterized in that, with reference to fig. 2, the technique for monitoring information of a moving loop of a base station based on block chain management includes the following steps:
s1: initializing a base station monitoring system, a distributed communication network and a cloud storage server;
s2: the equipment initiates a public key encryption transaction request of data storage to a machine room node server through a network;
s3: the block chain system of the machine room node server retrieves the transaction type block chain and synthesizes the authorization condition of the requester;
s4: the method comprises the following steps that a machine room node server sends a public key encryption execution request to a cloud storage server through a network;
s5: the cloud storage server performs authority verification on the data storage transaction;
s6: the cloud storage server makes a corresponding response according to the transaction request and makes a feedback to the machine room node server;
s7: the machine room node server broadcasts the transaction to the distributed node servers and stores the transaction in the local block chain.
In step S1:
the initialization setting comprises equipment initialization, and an initial block number and a block data Hash value which are related to the cloud storage server are sent to the machine room node server and stored in the last block of the machine room node block chain.
In step S3:
the block chain system of the machine room node server retrieves the Policy Header of the transactional block chain, inquires the last block of the block chain of the machine room node server, synthesizes the authorization condition of a requester, refuses the request if the action is not allowed, and records the transaction in the local block chain; if the action is allowed, the next step is performed. Wherein, Policy Header is a user-defined block chain authority management data structure.
In step S5:
and the cloud storage server performs authority verification on the block number and the Hash value sent by the machine room node server in the data storage transaction.
In step S6:
and after the cloud storage server makes a corresponding response according to the transaction request, sending the block number and the Hash value encrypted by the public key to the machine room node server.
In step S7:
the machine room node server broadcasts the transaction to the distributed node server and stores the block number and the Hash value in the last block of the local block chain.
Example 2: a method for monitoring the dynamic ring information of base station based on block chain management features that the response to authorized control transaction is generated.
As shown in fig. 1, in this embodiment 2, a method for monitoring information of a moving loop of a base station based on blockchain management includes a distributed communication network and a cloud storage server, and with reference to fig. 3, the method for monitoring information of a moving loop of a base station based on blockchain management includes the following steps:
s1: initializing a distributed communication network and a cloud storage server;
s2: a user initiates a public key encryption transaction request for authorization control to a computer room node server through a network;
s3: the block chain system of the machine room node server retrieves the transaction type block chain and synthesizes the authorization condition of the requester;
s4: the method comprises the following steps that a machine room node server sends a public key encryption execution request to a cloud storage server through a network;
s5: the cloud storage server carries out authority verification on the authorization control transaction;
s6: the cloud storage server makes a corresponding response according to the transaction request and makes a feedback to the machine room node server;
s7: the machine room node server broadcasts the transaction to the distributed node server and stores the transaction in a local block chain;
s8: the machine room node server needs to feed back corresponding data to the user.
In step S1:
the initialization setting is device initialization.
In step S3:
the block chain system of the machine room node server retrieves the Policy Header of the transactional block chain, inquires the last block of the block chain of the machine room node server, synthesizes the authorization condition of a requester, refuses the request if the action is not allowed, and records the transaction in the local block chain; if the action is allowed, the next step is performed. Wherein, Policy Header is a user-defined block chain authority management data structure.
In step S5:
and the cloud storage server performs authority verification on the block number and the Hash value sent by the machine room node server in the authorization control transaction.
In step S6:
and after the cloud storage server makes a corresponding response according to the transaction request, sending the block number and the Hash value encrypted by the public key to the machine room node server.
In step S7:
the machine room node server broadcasts the transaction to the distributed node server and stores the block number and the Hash value in the last block of the local block chain.
Example 3: a method for monitoring the dynamic ring information of base station based on block chain management is disclosed.
As shown in fig. 1, a method for monitoring information of a moving loop of a base station based on blockchain management in embodiment 3 includes a base station monitoring system and a distributed communication network, and is characterized in that, in combination with fig. 4, the technique for monitoring information of a moving loop of a base station based on blockchain management includes the following steps:
s1: initializing a base station monitoring system, a distributed communication network and a cloud storage server;
s2: a user initiates a public key encryption transaction request for data monitoring to a computer room node server through a network;
s3: the block chain system of the machine room node server retrieves the transaction type block chain and synthesizes the authorization condition of the requester;
s4: the machine room node server initiates a public key encryption execution request to the base station monitoring system through a network;
s5: the base station monitoring system makes a corresponding response according to the transaction request and makes a feedback to the machine room node server;
s6: the machine room node server broadcasts the transaction to the distributed node server and stores the transaction in a local block chain;
s7: the machine room node server needs to feed back corresponding data to the user.
In step S1:
the initialization setting comprises equipment initialization, and an initial block number and a block data Hash value which are related to the cloud storage server are sent to the machine room node server and stored in the last block of the machine room node block chain.
In step S3:
the block chain system of the machine room node server retrieves the Policy Header of the transactional block chain, inquires the last block of the block chain of the machine room node server, synthesizes the authorization condition of a requester, refuses the request if the action is not allowed, and records the transaction in the local block chain; if the action is allowed, the next step is performed. Wherein, Policy Header is a user-defined block chain authority management data structure.
In step S5:
and after the base station monitoring system makes a corresponding response according to the transaction request, sending the block number and the Hash value encrypted by the public key to the machine room node server.
In step S6:
the machine room node server broadcasts the transaction to the distributed node server and stores the block number and the Hash value in the last block of the local block chain.
The foregoing embodiments are merely illustrative of the principles and utilities of the present invention and are not intended to limit the invention. Any person skilled in the art can modify or change the above-mentioned embodiments without departing from the spirit and scope of the present invention. Accordingly, it is intended that all equivalent modifications or changes which can be made by those skilled in the art without departing from the spirit and technical spirit of the present invention be covered by the claims of the present invention.

Claims (8)

1. A method for monitoring the dynamic ring information of base station based on block chain management includes a base station monitoring system, a distributed communication network, a cloud storage server,
the method is characterized in that the base station dynamic loop information monitoring technology based on block chain management comprises the following steps:
the method comprises the following steps: initializing a base station monitoring system, a distributed communication network and a cloud storage server;
step two: a user or equipment initiates a public key encryption transaction request for data storage, authorization control and data monitoring to a machine room node server through a network;
step three: the block chain system of the machine room node server retrieves the transaction type block chain and synthesizes the authorization condition of the requester;
step four: the method comprises the following steps that a machine room node server initiates a public key encryption execution request to a cloud storage server or a base station monitoring system through a network;
step five: the cloud storage server performs authority verification on data storage and authorization control transactions;
step six: according to the transaction request, the cloud storage server or the base station monitoring system makes a corresponding response and feeds back the response to the machine room node server;
step seven: the machine room node server broadcasts the transaction to the distributed node server and stores the transaction in a local block chain;
step eight: when the transaction is authorized to be controlled and monitored, the node server of the machine room needs to feed back corresponding data to the user.
2. The method of claim 1, wherein the method comprises: the base station monitoring system is formed by connecting various sensor networks which are monitored in real time, the distributed communication network is formed by connecting node servers P2P through networks, the node servers are divided into a machine room node server and a distributed node server and are all provided with a block chain management module, the block chain management module mainly comprises a block chain system and a storage system, and the cloud storage server is provided with a cloud storage block chain system and a cloud storage system.
3. The method of claim 1, wherein the method comprises: in the first step, the initialization setting comprises equipment initialization, and an initial block number and a block data Hash value related to the cloud storage server are sent to the machine room node server and stored in the last block of the machine room node block chain.
4. The method of claim 1, wherein the method comprises: in the second step, the data storage is a public key encryption transaction request initiated by the equipment, and the authorization control and data monitoring are public key encryption transaction requests initiated by the user.
5. The method of claim 1, wherein the method comprises: in the third step, the block chain system of the machine room node server retrieves the transaction type block chain, inquires the last block of the block chain of the machine room node server, synthesizes the authorization condition of the requester, refuses the request if not allowed, and records the transaction in the local block chain; if so, the next step is performed.
6. The method of claim 1, wherein the method comprises: and fifthly, the cloud storage server carries out authority verification on the block number and the Hash value sent by the machine room node server in the data storage and authorization control transaction.
7. The method of claim 1, wherein the method comprises: and step six, after the cloud storage server or the base station monitoring system makes a corresponding response according to the transaction request, sending a public key encrypted block number, a Hash value or a response ending signal to the machine room node server.
8. The method of claim 1, wherein the method comprises: and step seven, the machine room node server broadcasts the transaction to the distributed node server and stores the block number and the Hash value in the last block of the local block chain.
CN201811205472.5A 2018-10-09 2018-10-09 Base station dynamic loop information monitoring method based on block chain management Expired - Fee Related CN109547408B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811205472.5A CN109547408B (en) 2018-10-09 2018-10-09 Base station dynamic loop information monitoring method based on block chain management

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811205472.5A CN109547408B (en) 2018-10-09 2018-10-09 Base station dynamic loop information monitoring method based on block chain management

Publications (2)

Publication Number Publication Date
CN109547408A CN109547408A (en) 2019-03-29
CN109547408B true CN109547408B (en) 2020-11-20

Family

ID=65844358

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811205472.5A Expired - Fee Related CN109547408B (en) 2018-10-09 2018-10-09 Base station dynamic loop information monitoring method based on block chain management

Country Status (1)

Country Link
CN (1) CN109547408B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111371543B (en) * 2020-01-08 2023-03-24 中国科学院重庆绿色智能技术研究院 Internet of things equipment access control method based on double-block chain structure
CN111786794A (en) * 2020-06-30 2020-10-16 新三科技有限公司 Base station dynamic loop monitoring system and monitoring method

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102280826A (en) * 2011-07-30 2011-12-14 山东鲁能智能技术有限公司 Intelligent robot inspection system and intelligent robot inspection method for transformer station
US9169395B2 (en) * 2012-05-16 2015-10-27 Sabic Global Technologies B.V. Polycarbonate composition and articles formed therefrom
CN107734502A (en) * 2017-09-07 2018-02-23 京信通信***(中国)有限公司 Micro-base station communication management method, system and equipment based on block chain
CN108600967A (en) * 2018-04-28 2018-09-28 深圳凯达通光电科技有限公司 Preassembled transformer station wireless sensor network measure and control device based on block chain
CN108600985A (en) * 2018-04-28 2018-09-28 深圳大图科创技术开发有限公司 A kind of air pollution data acquisition and processing system based on block chain technology

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102280826A (en) * 2011-07-30 2011-12-14 山东鲁能智能技术有限公司 Intelligent robot inspection system and intelligent robot inspection method for transformer station
US9169395B2 (en) * 2012-05-16 2015-10-27 Sabic Global Technologies B.V. Polycarbonate composition and articles formed therefrom
CN107734502A (en) * 2017-09-07 2018-02-23 京信通信***(中国)有限公司 Micro-base station communication management method, system and equipment based on block chain
CN108600967A (en) * 2018-04-28 2018-09-28 深圳凯达通光电科技有限公司 Preassembled transformer station wireless sensor network measure and control device based on block chain
CN108600985A (en) * 2018-04-28 2018-09-28 深圳大图科创技术开发有限公司 A kind of air pollution data acquisition and processing system based on block chain technology

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
基于联盟区块链的智能电网数据安全存储与共享***;吴振铨;《计算机应用》;20171010;第37卷(第10期);全文 *

Also Published As

Publication number Publication date
CN109547408A (en) 2019-03-29

Similar Documents

Publication Publication Date Title
CN101094056B (en) Security system of wireless industrial control network, and method for implementing security policy
CN108134764B (en) Distributed data sharing and exchanging method and system
CN109005189A (en) A kind of access transmission platform suitable for double net isolation
CN109919771B (en) Industrial internet transaction device applying hierarchical block chain technology
CN111786956B (en) System and method for safely accessing intranet network based on message middleware communication
WO2020186807A1 (en) System and method for power data linking based on blockchain technology
CN109547408B (en) Base station dynamic loop information monitoring method based on block chain management
CN113973275B (en) Data processing method, device and medium
CN102316122B (en) Method for managing intranet security based on cooperative mode
CN101730085B (en) Address book data synchronizing method and system
Zhong et al. Data Security Storage Method for Power Distribution Internet of Things in Cyber‐Physical Energy Systems
CN111131228A (en) MQTT protocol-based gateway dynamic theme and stable operation processing method
CN107483413B (en) Bidirectional intrusion detection method and system based on cloud computing
Zou et al. Research on network security risk and security countermeasures of 5g technology in power system application
CN109660564B (en) Cloud computing-based dynamic internet of things unlocking system
KR102219018B1 (en) Blockchain based data transmission method in internet of things
CN112347496A (en) Fine-grained data security access control method and system
CN116170806B (en) Smart power grid LWM2M protocol security access control method and system
CN107222764A (en) The method that two-way CA security certificates are realized using MQTT and SSL
CN111343214A (en) DCS cloud monitoring system and method
CN109696316B (en) Train remote monitoring system
CN114157487A (en) Large-scale Internet of things access control method based on block chain technology
CN112995127A (en) Intelligent home management system based on block chain
CN101175126A (en) Video server system and method for implementing remote monitoring by means of mobile phone
CN110995515B (en) Distributed environment Internet of things information system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20201120

Termination date: 20211009

CF01 Termination of patent right due to non-payment of annual fee