CN111859456A - Fully trusted data system solution - Google Patents

Fully trusted data system solution Download PDF

Info

Publication number
CN111859456A
CN111859456A CN202010748476.9A CN202010748476A CN111859456A CN 111859456 A CN111859456 A CN 111859456A CN 202010748476 A CN202010748476 A CN 202010748476A CN 111859456 A CN111859456 A CN 111859456A
Authority
CN
China
Prior art keywords
data
platform
internet
things
block chain
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010748476.9A
Other languages
Chinese (zh)
Inventor
谢冬菊
许方成
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chongqing Beilaidian New Energy Co ltd
Original Assignee
Chongqing Beilaidian New Energy Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chongqing Beilaidian New Energy Co ltd filed Critical Chongqing Beilaidian New Energy Co ltd
Priority to CN202010748476.9A priority Critical patent/CN111859456A/en
Publication of CN111859456A publication Critical patent/CN111859456A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/22Indexing; Data structures therefor; Storage structures
    • G06F16/2228Indexing structures
    • G06F16/2255Hash tables
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16YINFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
    • G16Y10/00Economic sectors
    • G16Y10/35Utilities, e.g. electricity, gas or water

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Computer Hardware Design (AREA)
  • Data Mining & Analysis (AREA)
  • Computing Systems (AREA)
  • Accounting & Taxation (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • General Business, Economics & Management (AREA)
  • Business, Economics & Management (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides a fully-trusted data system solving system, which comprises a data acquisition terminal, an Internet of things platform and a block chain platform, wherein the data acquisition terminal is respectively in data communication with the Internet of things platform and the block chain platform; the method comprises the steps that a data acquisition terminal generates an authentication value for a big data corresponding value or a big data corresponding value corresponding to big data to be sent to an Internet of things platform and then sends the authentication value to a block chain platform, the block chain platform returns a unique retrieval number which marks a data storage position, and then the authentication value is generated by inquiring the big data corresponding value or the big data corresponding value sent to the block chain platform according to the unique retrieval number; and the big data to be sent to the platform of the Internet of things and the unique retrieval number are reserved in the platform of the Internet of things together, wherein the authentication value can verify the content of the data item, and the data reserved in the platform of the Internet of things is prevented from being modified without permission. The invention can prevent the data from being modified from the data source and realize the data security.

Description

Fully trusted data system solution
Technical Field
The invention relates to the technical field of data security, in particular to a fully trusted data system solution.
Background
The blockchain is a novel application mode of computer technologies such as distributed data storage, point-to-point transmission, a consensus mechanism and an encryption algorithm. The consensus mechanism is a mathematical algorithm for establishing trust and obtaining rights and interests among different nodes in the blockchain system. A blockchain is essentially a decentralized database. The block chain is a string of data blocks which are generated by using a cryptographic method in a correlation mode, and each data block comprises information of one block chain network transaction, and the information is used for verifying the validity of the information and generating a next block. Currently, blockchain technology is in the period of rapid development and is gradually applied to various industries.
Disclosure of Invention
The invention aims to at least solve the technical problems in the prior art, and particularly creatively provides a fully trusted data system solution.
In order to achieve the purpose, the invention provides a fully-trusted data system solving system which comprises a data acquisition terminal, an Internet of things platform and a block chain platform, wherein the data acquisition terminal is in data communication with the Internet of things platform and the block chain platform respectively;
the method comprises the steps that a data acquisition terminal generates a testimony value from a big data corresponding value or a big data corresponding value corresponding to big data to be sent to an Internet of things platform and sends the testimony value to a block chain platform, the block chain platform returns a unique retrieval number which marks a data storage position, and then the big data corresponding value or the big data corresponding value sent to the block chain platform is inquired and inquired according to the unique retrieval number to generate an authentication value;
and the big data to be sent to the platform of the Internet of things and the unique retrieval number are reserved in the platform of the Internet of things together, wherein the authentication value can verify the content of the data item, and the data reserved in the platform of the Internet of things is prevented from being modified without permission.
In a preferred embodiment of the invention, the system further comprises a collector, wherein the data acquisition terminal receives data of the collector and one or any combination of an internet of things platform, a block chain platform and an application platform to jointly form a fully-trusted data system;
or/and the Internet of things platform and the block chain platform are independent platforms, or the Internet of things platform and the block chain platform are two modules in one platform.
In a preferred embodiment of the present invention, the collector includes one or any combination of an intelligent electric meter, an intelligent water meter and an intelligent gas meter;
or the collector is a sensor (various sensor collecting terminals, such as a temperature sensor collecting terminal, a humidity sensor collecting terminal, a temperature and temperature sensor collecting terminal, and the like) or a meter (related meter, such as an intelligent electric meter, an intelligent water meter, an intelligent gas meter, an intelligent water pressure meter, an intelligent air pressure meter, and the like) or any combination collected by the credible data system.
In a preferred embodiment of the invention, the system further comprises an application platform, wherein the application platform is respectively in data communication with the internet of things platform and the block chain platform;
and rapidly correcting whether the data in the Internet of things platform is tampered by using the application platform, and giving an alarm if the data of the Internet of things platform is rapidly identified to be modified.
In a preferred embodiment of the invention, the method further comprises the step of arranging a protective device on the collector or/and the data collection terminal to prevent modification at the source end.
The invention also discloses a solution of the fully trusted data system, which comprises the following steps:
s1, the data acquisition terminal generates an authentication value for a big data corresponding value or a big data corresponding value corresponding to big data to be sent to the Internet of things platform and sends the authentication value to the block chain platform, the block chain platform returns a unique retrieval number which marks a data storage position, and then the authentication value is generated by inquiring the big data corresponding value or the big data corresponding value sent to the block chain platform according to the unique retrieval number;
and S2, the big data to be sent to the Internet of things platform and the unique retrieval number are reserved in the Internet of things platform together, wherein the authentication value can verify the content of the data item, and the data reserved in the Internet of things platform is prevented from being modified without permission.
In a preferred embodiment of the present invention, step S0 is further included before step S1,
and S0, the collector and the data acquisition terminal transmit the data acquired by the collector to the data acquisition terminal in a wired or wireless mode.
In a preferred embodiment of the present invention, step S3 is further included after step S2,
and S3, rapidly correcting whether the data in the Internet of things platform is tampered through the application platform, and giving an alarm if the data of the Internet of things platform is rapidly identified to be modified.
In a preferred embodiment of the present invention, step S3 is further included after step S2,
and S3, if the collector monitors that the protection device is damaged, the collector transmits the collected damage information to the data acquisition terminal, and the data acquisition terminal transmits the damage information to the Internet of things platform or/and the block chain platform.
Or/and if the data acquisition terminal monitors that the protection device is damaged, the data acquisition terminal transmits the damage information to the Internet of things platform or/and the block chain platform.
In summary, due to the adoption of the technical scheme, the invention can prevent the data from being modified from the data source and realize the data security.
Additional aspects and advantages of the invention will be set forth in part in the description which follows and, in part, will be obvious from the description, or may be learned by practice of the invention.
Drawings
The above and/or additional aspects and advantages of the present invention will become apparent and readily appreciated from the following description of the embodiments, taken in conjunction with the accompanying drawings of which:
FIG. 1 is a schematic block diagram of the connection of the present invention.
Fig. 2 is a schematic block diagram of the inventive connection.
Fig. 3 is a schematic block diagram of the inventive connection.
Fig. 4 is a schematic block diagram of the inventive connection.
Fig. 5 is a schematic block diagram of the inventive connection.
Fig. 6 is a schematic block diagram of the inventive connection.
Detailed Description
Reference will now be made in detail to embodiments of the present invention, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to the same or similar elements or elements having the same or similar function throughout. The embodiments described below with reference to the accompanying drawings are illustrative only for the purpose of explaining the present invention, and are not to be construed as limiting the present invention.
As shown in fig. 1, since the internet of things platform data can be modified, in order to prevent the user from modifying the data, various management means are required to prevent the modification, so that the cost is high and the modification is difficult to be really avoided. The scheme is a traditional method, firstly, the platform of the internet of things is easy to tamper, and the data acquisition terminal can modify data at the data source head end and is more difficult to perceive.
As shown in fig. 2, although data is sent to the blockchain platform, it is not possible to tamper with the data, since the blockchain platform is not good at large data management, is difficult to perform through conventional data operations such as "query", has low performance, and is not recommended to be practical, such as in case of being not used, it is recommended to save only a very small amount of data, i.e., "value data", in the blockchain platform. According to the scheme, although the platform side cannot be tampered, if the data acquisition terminal modifies data, no method is provided. And the platform data volume in the method can not be large, and large data can not be stored.
As shown in fig. 3, a blockchain platform is accessed behind the platform of the internet of things, although the platform of the internet of things can contain large data, the blockchain platform contains a small amount of data, and it is assumed that the platform of the internet of things modifies the data before transmitting the data to the blockchain platform, that is, the data for the blockchain platform is the data after being "tampered", and the blockchain platform does not play a role in "supervising" the platform of the internet of things. Is a 'pseudo-supervision' system.
The invention provides a fully trusted data system solving system, which comprises a data acquisition terminal, an Internet of things platform and a block chain platform, wherein the data acquisition terminal is respectively in data communication with the Internet of things platform and the block chain platform; in this embodiment, the data acquisition terminal may be, but is not limited to, a river data acquisition terminal placed in a river for measuring one of or any combination of real-time cleanliness, real-time flow rate, and real-time depth of river water; the wrist data acquisition terminal is worn on the wrist and used for measuring one or any combination of real-time blood pressure, heart rate, body temperature and exercise amount (one or any combination of walking steps, floor number, calorie consumption and exercise track) of a human body; the method is used for measuring one or any combination of power (active power, reactive power, minimum power, maximum power and average power), current (instantaneous current, average current, maximum current and minimum current) and voltage (instantaneous voltage, average voltage, maximum voltage and minimum voltage) on a power grid; the gas pressure measuring device is arranged on a gas pipeline and used for measuring one or any combination of gas pressure (maximum gas pressure, average gas pressure), flow and temperature.
The method comprises the steps that a data acquisition terminal generates an authentication value for a big data corresponding value or a big data corresponding value corresponding to big data to be sent to an Internet of things platform and then sends the authentication value to a block chain platform, the block chain platform returns a unique retrieval number which marks a data storage position, and then the authentication value is generated by inquiring the big data corresponding value or the big data corresponding value sent to the block chain platform according to the unique retrieval number;
and the big data to be sent to the platform of the Internet of things and the unique retrieval number are reserved in the platform of the Internet of things together, wherein the authentication value or the corresponding value of the big data can verify the content of the data item, so that the data reserved in the platform of the Internet of things is prevented from being modified without permission. In this embodiment, the internet of things platform may collect data collected by the data collection terminal, and may be various service systems, such as a power consumption information collection system of a national grid company, or a data monitoring system in a factory building, or an environment monitoring system. The blockchain platform can be various blockchain platforms such as an ether house, an EOS, a fabric and the like, is not limited to a certain blockchain platform, can be an open source platform, and can also be a self-developed blockchain platform.
In a preferred embodiment of the present invention, the system further includes a collector, and the data collection terminal receives data from the collector. In this embodiment, the collector may be, but is not limited to, one of or any combination of a smart meter, a smart water meter, and a smart gas meter, and when the collector is a smart meter, the collector collects power (one of or any combination of active power, reactive power, minimum power, maximum power, and average power), current (one of or any combination of instantaneous current, average current, maximum current, and minimum current), voltage (one of or any combination of instantaneous voltage, average voltage, maximum voltage, and minimum voltage), power consumption, temperature and humidity of the collector, and overvoltage protection time or any combination thereof, which are set on a line where the collector is located. One or any combination of the Internet of things platform, the block chain platform and the application platform forms a fully trusted data system together; where an application platform is not necessary.
Or/and the Internet of things platform and the block chain platform are independent platforms, or the Internet of things platform and the block chain platform are two modules in one platform.
In a preferred embodiment of the present invention, as shown in fig. 5, the system further includes an application platform, and the application platform is respectively in data communication with the internet of things platform and the block chain platform;
and rapidly correcting whether the data in the Internet of things platform is tampered by using the application platform, and giving an alarm if the data of the Internet of things platform is rapidly identified to be modified.
In a preferred embodiment of the present invention, as shown in fig. 6, a protection device is further provided on the collector or/and the data collection terminal to prevent modification at the source end. The protection device is an anti-disassembly device, the anti-disassembly device can be an anti-disassembly shell, the collector and the data acquisition terminal are arranged in the anti-disassembly shell, a plurality of induction points are arranged outside the anti-disassembly shell, the output ends of the induction points are connected with a controller (a controller in the data acquisition terminal) in the collector, and when the induction points are damaged, the controller records damage information.
The invention also discloses a solution of the fully trusted data system, which comprises the following steps:
s1, the data acquisition terminal generates an authentication value for a big data corresponding value or a big data corresponding value corresponding to big data to be sent to the Internet of things platform and sends the authentication value to the block chain platform, the block chain platform returns a unique retrieval number which marks a data storage position, and then the authentication value is generated by inquiring the big data corresponding value or the big data corresponding value sent to the block chain platform according to the unique retrieval number; in this embodiment, the authentication value is a data content fingerprint, and includes a hash algorithm, an md5 algorithm, and other related mature algorithms to identify the data content fingerprint. Or may be a feature extraction value of a human face or a fingerprint feature value of a fingerprint image. With one algorithm, the "fingerprint" of the content can be computed in the forward direction, but the original content cannot be computed in the reverse direction. The big data corresponding value includes a finger image that is a person, a face image of the person, or video content, which may include various data such as video, text, images, and the like.
And S2, the big data to be sent to the Internet of things platform and the unique retrieval number are reserved in the Internet of things platform together, wherein the authentication value can verify the content of the data item, and the data reserved in the Internet of things platform is prevented from being modified without permission.
In a preferred embodiment of the present invention, step S0 is further included before step S1,
and S0, the collector and the data acquisition terminal transmit the data acquired by the collector to the data acquisition terminal in a wired or wireless mode.
In a preferred embodiment of the present invention, step S3 is further included after step S2,
and S3, rapidly correcting whether the data in the Internet of things platform is tampered through the application platform, and giving an alarm if the data of the Internet of things platform is rapidly identified to be modified.
In a preferred embodiment of the present invention, step S3 is further included after step S2,
and S3, if the collector monitors that the protection device is damaged, the collector transmits the collected damage information to the data acquisition terminal, and the data acquisition terminal transmits the damage information to the Internet of things platform or/and the block chain platform.
Or/and if the data acquisition terminal monitors that the protection device is damaged, the data acquisition terminal transmits the damage information to the Internet of things platform or/and the block chain platform.
One specific example is given below:
the invention also provides a solution of the fully trusted data system, which comprises the following steps:
s1, the data acquisition terminal makes the acquired data into data to be uploaded, and generates a hash value for the data;
the method specifically comprises the following steps: s11, the data acquisition terminal acquires required power data from the intelligent power meter, and the power data comprises a voltage data set V ═ V1,t,V2,t,V3,t,...,VX,tThe current data set I ═ I1,t,I2,t,I3,t,...,IY,t}、P={P1,t,P2,t,P3,t,...,PZ,tOne or any combination; wherein Vx,tThe voltage value of the power line where the xth intelligent power meter is measured at the moment t is represented; x is 1,2,3,. times, X; i isy,tThe current value of the power line where the y-th intelligent power meter is located is represented at the time t; y is 1,2,3,. and Y; pz,tThe active power of the power line where the z-th intelligent power meter is located is measured at the time t; z is 1,2,3,. and Z;
s12, the obtained power data are marked with the acquisition time and then compressed, and the compressed power data are power data to be uploaded;
s13, carrying out hash operation on the power data to be uploaded to obtain a first hash value; the calculation method for obtaining the first hash value comprises the following steps:
Ll=hash1(l),
wherein l represents power data to be uploaded; hash1() Representing a hash operation using one of SHA-1, SHA-224, SHA-256, SHA-384, SHA-512; l islRepresents a first hash value;
s14, combining the first hash value obtained in the step S13 with an encryption key received by the data acquisition terminal to obtain a hash key; the computing method for obtaining the hash key comprises the following steps:
Figure BDA0002609208470000081
wherein L islRepresents a first hash value; phi denotes an encryption key, and phi denotes,
Figure BDA0002609208470000082
representing a connector; l represents a hash key;
s15, carrying out hash operation on the hash key obtained in the step S14 to obtain a hash value; the calculation method for obtaining the hash value comprises the following steps:
L′=hash2(L),
wherein L represents a hash key; l' represents a hash value;
hash2() Representing a hash operation using one of SHA-1, SHA-224, SHA-256, SHA-384, SHA-512;
when hash1() Using SHA-1 hash operation, then hash2() By means of hash1() The same SHA-1 hash operation;
when hash1() Using SHA-224 hash operation, then hash2() By means of hash1() The same SHA-224 hash operation;
when hash1() Using SHA-256 hash operation, then hash2() By means of hash1() The same SHA-256 hash operation;
when hash1() Using SHA-384 Hash operation, then Hash2() By means of hash1() The same SHA-384 hash operation;
when hash1() Using SHA-512 hash operation, then hash2() By means of hash1() The same SHA-512 hash operation.
S2, sending the generated hash value to a block chain platform, and returning a data transaction TXHash value by the block chain platform;
and S3, the data acquisition terminal combines the acquired data and the received TXhash value into upload data, and the upload data is uploaded to the Internet of things platform.
The method specifically comprises the following steps: s31, the data acquisition terminal acquires the required power data from the intelligent power meter, and the power data packetSet of voltage data V ═ { V ═ V1,t,V2,t,V3,t,...,VX,tThe current data set I ═ I1,t,I2,t,I3,t,...,IY,t}、P={P1,t,P2,t,P3,t,...,PZ,tOne or any combination; wherein Vx,tThe voltage value of the power line where the xth intelligent power meter is measured at the moment t is represented; x is 1,2,3,. times, X; i isy,tThe current value of the power line where the y-th intelligent power meter is located is represented at the time t; y is 1,2,3,. and Y; pz,tThe active power of the power line where the z-th intelligent power meter is located is measured at the time t; z is 1,2,3,. and Z;
s32, compressing the acquired electric power data after acquiring time on the identifier and the received TXHhash value identifier, wherein the compressed data is uploaded electric power data;
and S33, uploading the uploaded electric power data to the Internet of things platform.
In a preferred embodiment of the present invention, the method further comprises a data storage verification method, wherein the verification method comprises the following steps:
s21, acquiring to-be-verified electric power data, wherein the to-be-verified electric power data are uploaded electric power data uploaded to the Internet of things platform;
s22, decompressing the acquired power data to be verified to obtain decompressed power data, wherein the decompressed power data comprises decompressed power data to be uploaded and a decompressed TXhash value;
s23, the following steps are performed to decompress the to-be-uploaded electric power data:
s231, compressing the decompressed power data to be uploaded to obtain compressed power data to be uploaded;
s232, carrying out hash operation on the compressed electric power data to be uploaded to obtain a second hash value; the calculation method for obtaining the second hash value comprises the following steps:
Ll′=hash3(l′),
wherein l' represents decompressing the power data to be uploaded; l isl′Represents a second hash value; hash3() Shows the use of SHA-1,Performing hash operation on one of SHA-224, SHA-256, SHA-384 and SHA-512;
when hash1() Using SHA-1 hash operation, then hash3() By means of hash1() The same SHA-1 hash operation;
when hash1() Using SHA-224 hash operation, then hash3() By means of hash1() The same SHA-224 hash operation;
when hash1() Using SHA-256 hash operation, then hash3() By means of hash1() The same SHA-256 hash operation;
when hash1() Using SHA-384 Hash operation, then Hash3() By means of hash1() The same SHA-384 hash operation;
when hash1() Using SHA-512 hash operation, then hash3() By means of hash1() The same SHA-512 hash operation;
s233, combining the second hash value with the encryption key received by the data acquisition terminal to obtain a decryption hash key; the calculation method of the decryption hash key comprises the following steps:
Figure BDA0002609208470000101
wherein L isl′Represents a second hash value; Φ' represents an encryption key and,
Figure BDA0002609208470000102
representing a connector; l' represents a decryption hash key;
s234, carrying out hash operation on the decryption hash key to obtain a decryption hash value; the calculation method of the decrypted hash value comprises the following steps:
L″′=hash4(L″),
wherein L' represents a decryption hash key; l' "represents the decrypted hash value;
hash4() Representing a hash operation using one of SHA-1, SHA-224, SHA-256, SHA-384, SHA-512;
when hash3() By using SHA-1 hash operation, hash4() By means of hash3() The same SHA-1 hash operation;
when hash3() Using SHA-224 hash operation, then hash4() By means of hash3() The same SHA-224 hash operation;
when hash3() Using SHA-256 hash operation, then hash4() By means of hash3() The same SHA-256 hash operation;
when hash3() Using SHA-384 Hash operation, then Hash4() By means of hash3() The same SHA-384 hash operation;
when hash3() Using SHA-512 hash operation, then hash4() By means of hash3() The same SHA-512 hash operation;
if L 'is consistent with L', the verification is passed; storing the electric power data to be uploaded (decompressing the electric power data to be uploaded) in the platform of the Internet of things;
otherwise, the verification fails, the uploaded power data is acquired again from the data acquisition terminal, and the step S21 is executed.
In a preferred embodiment of the present invention, the method further includes querying a hash value on the block chain by using a TXhash value (i.e., decompressing the TXhash value, where the TXhash value indicates a hash value storage location) on the platform of the internet of things, to obtain a check hash value, and verifying whether the data is modified, where the method includes the specific steps of:
s61, acquiring check data corresponding to the query value (namely a TXhash value (namely a decompressed TXhash value)) on the platform of the Internet of things, and compressing the acquired check data, wherein the compressed check data are to-be-processed check data;
s62, carrying out hash operation on the check data to be processed to obtain a first check hash value; the calculation method for obtaining the first check hash value comprises the following steps:
L=hash1(),
wherein, the check data to be processed is represented; l isRepresenting a first check hash value;
s63, combining the first check hash value obtained in the step S62 with an encryption key received by a data acquisition terminal sent by the Internet of things platform to obtain a hash check key; the computing method for obtaining the hash check key comprises the following steps:
Figure BDA0002609208470000111
wherein L isRepresenting a first check hash value; phi denotes an encryption key, LηRepresenting a hash check key;
s64, carrying out hash operation on the hash check key obtained in the step S63 to obtain a hash check value; the calculation method for obtaining the hash check value comprises the following steps:
Lη′=hash2(Lη),
wherein L isη' denotes a hash check value;
if the hash check value is consistent with the check hash value, the check data is not tampered;
if the hash check value is inconsistent with the check hash value, the check data is tampered.
In a preferred embodiment of the present invention, the patrol method further comprises the following steps:
s41, at intervals of time T, wherein the T is a positive number, preferably 5-8 h, the cloud server sends patrol instructions to patrol personnel wearing the mobile handheld terminal, and the patrol instructions comprise a patrol place setting and a patrol travelling route setting;
s42, the mobile handheld terminal judges whether the patrol personnel traveling route is consistent with the set patrol traveling route:
if the travelling route of the patrol personnel is inconsistent with the set patrol travelling route, the mobile handheld terminal sends out a route travelling deviation voice alarm to remind the patrol personnel to change the travelling route and to travel according to the route displayed by the touch display screen on the data acquisition terminal;
s43, scanning a data acquisition terminal installed on a circuit when the data acquisition terminal arrives at a set patrol place, wherein an identification code is printed on a shell of the data acquisition terminal installed on the circuit or displayed on a touch display screen, the identification code is a one-dimensional code or a two-dimensional code, and the identification code comprises an ID number of the data acquisition terminal;
and S44, displaying corresponding patrol data information on a touch display screen on the mobile handheld terminal worn by the patrol personnel after scanning, wherein the patrol data information comprises whether a data acquisition terminal installed on a line is damaged or whether a button battery is replaced or the like, and uploading the filled patrol data information to a cloud server after the mobile handheld terminal worn by the patrol personnel receives an uploading trigger signal.
While embodiments of the invention have been shown and described, it will be understood by those of ordinary skill in the art that: various changes, modifications, substitutions and alterations can be made to the embodiments without departing from the principles and spirit of the invention, the scope of which is defined by the claims and their equivalents.

Claims (9)

1. A fully trusted data system solution system is characterized by comprising a data acquisition terminal, an Internet of things platform and a block chain platform, wherein the data acquisition terminal is in data communication with the Internet of things platform and the block chain platform respectively;
the method comprises the steps that a data acquisition terminal generates a testimony value from a big data corresponding value or a big data corresponding value corresponding to big data to be sent to an Internet of things platform and sends the testimony value to a block chain platform, the block chain platform returns a unique retrieval number which marks a data storage position, and then the big data corresponding value or the big data corresponding value sent to the block chain platform is inquired and inquired according to the unique retrieval number to generate an authentication value;
and the big data to be sent to the platform of the Internet of things and the unique retrieval number are reserved in the platform of the Internet of things together, wherein the authentication value can verify the content of the data item, and the data reserved in the platform of the Internet of things is prevented from being modified without permission.
2. The fully-trusted data system solving system according to claim 1, further comprising a collector, wherein the data collection terminal receives data of the collector and one or any combination of an internet of things platform, a block chain platform and an application platform to jointly form a fully-trusted data system;
or/and the Internet of things platform and the block chain platform are independent platforms, or the Internet of things platform and the block chain platform are two modules in one platform.
3. The fully trusted data system solving system according to claim 2, wherein the collector comprises one of an intelligent electric meter, an intelligent water meter and an intelligent gas meter or any combination thereof;
or the collector is a sensor or a meter or any combination collected by the credible data system.
4. The fully trusted data system solving system according to claim 1, further comprising an application platform, wherein the application platform is in data communication with the internet of things platform and the block chain platform, respectively;
and rapidly correcting whether the data in the Internet of things platform is tampered by using the application platform, and giving an alarm if the data of the Internet of things platform is rapidly identified to be modified.
5. The fully trusted data system solving system according to claim 1 or 2, further comprising a protection device arranged on the collector or/and the data collection terminal to prevent modification at the source terminal.
6. A fully trusted data system solution, comprising the steps of:
s1, the data acquisition terminal generates an authentication value for a big data corresponding value or a big data corresponding value corresponding to big data to be sent to the Internet of things platform and sends the authentication value to the block chain platform, the block chain platform returns a unique retrieval number which marks a data storage position, and then the authentication value is generated by inquiring the big data corresponding value or the big data corresponding value sent to the block chain platform according to the unique retrieval number;
and S2, the big data to be sent to the Internet of things platform and the unique retrieval number are reserved in the Internet of things platform together, wherein the authentication value can verify the content of the data item, and the data reserved in the Internet of things platform is prevented from being modified without permission.
7. The fully trusted data system solution as claimed in claim 5, further comprising step S0 before step S1,
and S0, the collector and the data acquisition terminal transmit the data acquired by the collector to the data acquisition terminal in a wired or wireless mode.
8. The fully trusted data system solution as claimed in claim 5, further comprising step S3 after step S2,
and S3, rapidly correcting whether the data in the Internet of things platform is tampered through the application platform, and giving an alarm if the data of the Internet of things platform is rapidly identified to be modified.
9. The fully trusted data system solution as claimed in claim 5, further comprising step S3 after step S2,
s3, if the collector monitors that the protection device is damaged, the collector transmits the collected damage information to the data collection terminal, and the data collection terminal transmits the damage information to the Internet of things platform or/and the block chain platform;
or/and if the data acquisition terminal monitors that the protection device is damaged, the data acquisition terminal transmits the damage information to the Internet of things platform or/and the block chain platform.
CN202010748476.9A 2020-07-30 2020-07-30 Fully trusted data system solution Pending CN111859456A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010748476.9A CN111859456A (en) 2020-07-30 2020-07-30 Fully trusted data system solution

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010748476.9A CN111859456A (en) 2020-07-30 2020-07-30 Fully trusted data system solution

Publications (1)

Publication Number Publication Date
CN111859456A true CN111859456A (en) 2020-10-30

Family

ID=72946235

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010748476.9A Pending CN111859456A (en) 2020-07-30 2020-07-30 Fully trusted data system solution

Country Status (1)

Country Link
CN (1) CN111859456A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112887076A (en) * 2021-01-15 2021-06-01 上海天俣可信物联网科技有限公司 Internet of things system based on NB-IoT and blockchain technology and implementation method
CN113420169A (en) * 2021-06-22 2021-09-21 重庆紫光华山智安科技有限公司 File storage and query method, system, electronic equipment and medium

Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107240247A (en) * 2017-07-14 2017-10-10 杭州钛比科技有限公司 A kind of ammeter data acquisition system based on NB IoT
CN109586914A (en) * 2017-09-28 2019-04-05 大唐移动通信设备有限公司 A kind of data verification method and device of Internet of things system
CN109981682A (en) * 2019-04-10 2019-07-05 北京阿尔山区块链联盟科技有限公司 Data verification method, the apparatus and system of internet of things equipment
KR20190079324A (en) * 2017-12-27 2019-07-05 에이치닥테크놀로지 주식회사 한국영업소 Method and system for enhancing integrity of batabase based on the block chain system
CN110097373A (en) * 2019-03-18 2019-08-06 杭州特股软件开发有限公司 The traceability system and method combined based on block chain with Internet of Things
CN110113167A (en) * 2019-04-01 2019-08-09 广州杰赛科技股份有限公司 A kind of information protecting method of intelligent terminal, system and readable storage medium storing program for executing
US20190379664A1 (en) * 2018-06-06 2019-12-12 Cisco Technology, Inc. Blockchain-based nb-iot devices
CN110691088A (en) * 2019-09-29 2020-01-14 广东电网有限责任公司 Block chain-based Internet of things equipment authentication method
US20200106601A1 (en) * 2018-10-01 2020-04-02 Schneider Electric Industries Sas Secure storage of data in a blockchain
CN111092851A (en) * 2019-09-23 2020-05-01 上海唯链信息科技有限公司 Data verification method and device of Internet of things temperature detection equipment based on block chain
CN111125787A (en) * 2019-12-27 2020-05-08 上海共链信息科技有限公司 Gas inspection data cochain system based on block chain and use method thereof
KR20200048440A (en) * 2018-10-30 2020-05-08 삼성에스디에스 주식회사 System for providing retrieval service based on blockchain and method of the same
CN111459935A (en) * 2020-03-20 2020-07-28 深圳市芯链科技有限公司 Internet of things data storage method, storage system, query method and storage medium

Patent Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107240247A (en) * 2017-07-14 2017-10-10 杭州钛比科技有限公司 A kind of ammeter data acquisition system based on NB IoT
CN109586914A (en) * 2017-09-28 2019-04-05 大唐移动通信设备有限公司 A kind of data verification method and device of Internet of things system
KR20190079324A (en) * 2017-12-27 2019-07-05 에이치닥테크놀로지 주식회사 한국영업소 Method and system for enhancing integrity of batabase based on the block chain system
US20190379664A1 (en) * 2018-06-06 2019-12-12 Cisco Technology, Inc. Blockchain-based nb-iot devices
US20200106601A1 (en) * 2018-10-01 2020-04-02 Schneider Electric Industries Sas Secure storage of data in a blockchain
KR20200048440A (en) * 2018-10-30 2020-05-08 삼성에스디에스 주식회사 System for providing retrieval service based on blockchain and method of the same
CN110097373A (en) * 2019-03-18 2019-08-06 杭州特股软件开发有限公司 The traceability system and method combined based on block chain with Internet of Things
CN110113167A (en) * 2019-04-01 2019-08-09 广州杰赛科技股份有限公司 A kind of information protecting method of intelligent terminal, system and readable storage medium storing program for executing
CN109981682A (en) * 2019-04-10 2019-07-05 北京阿尔山区块链联盟科技有限公司 Data verification method, the apparatus and system of internet of things equipment
CN111092851A (en) * 2019-09-23 2020-05-01 上海唯链信息科技有限公司 Data verification method and device of Internet of things temperature detection equipment based on block chain
CN110691088A (en) * 2019-09-29 2020-01-14 广东电网有限责任公司 Block chain-based Internet of things equipment authentication method
CN111125787A (en) * 2019-12-27 2020-05-08 上海共链信息科技有限公司 Gas inspection data cochain system based on block chain and use method thereof
CN111459935A (en) * 2020-03-20 2020-07-28 深圳市芯链科技有限公司 Internet of things data storage method, storage system, query method and storage medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
刘军 等: "基于区块链的冷链物流边缘计算验证演示***", 网络安全技术与应用, no. 07 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112887076A (en) * 2021-01-15 2021-06-01 上海天俣可信物联网科技有限公司 Internet of things system based on NB-IoT and blockchain technology and implementation method
CN113420169A (en) * 2021-06-22 2021-09-21 重庆紫光华山智安科技有限公司 File storage and query method, system, electronic equipment and medium

Similar Documents

Publication Publication Date Title
CN107317856A (en) A kind of date storage method and device based on block chain
CN108306896B (en) Substation state monitoring system and method with data protection function
CN109547477A (en) A kind of data processing method and its device, medium, terminal
CN111859456A (en) Fully trusted data system solution
CN107242854B (en) Intelligent medical system based on safety communication
CN110830235B (en) Intelligent vehicle networking trusted data encryption method and system based on block chain
CN111127254B (en) Marketing and distribution through data management system
CN109361952A (en) Video management method, apparatus, system and electronic equipment
CN110474962B (en) Data checking system and method based on edge calculation
CN104735654A (en) Private data fusing method capable of detecting data integrity
CN103795541A (en) Secure communication method of electricity information acquisition system of 230M wireless private network channel
CN112395582B (en) Job entry management method, system, computer device and storage medium
CN110991979A (en) Attendance management method, device and equipment for intelligent construction site and computer storage medium
CN113595744A (en) Network access method, device, electronic equipment and storage medium
CN117272345B (en) Electronic contract encryption method and system based on cloud service
CN107403476A (en) Mobile phone terminal dynamic facial identifies attendance checking system
Yu et al. Verifiable, privacy-assured, and accurate signal collection for cloud-assisted wireless sensor networks
CN114745689A (en) Multi-time-segment data fusion method and system for wireless sensor network
CN114760229A (en) Data transmission method and data transmission system
CN113626860A (en) Electric power data privacy protection method based on block chain
CN107273070A (en) A kind of intelligent marketing bill bar code printing management control system
CN109120648B (en) A kind of anti-tamper verifying system of real-time monitoring data
Bexheti et al. Securely Storing and Sharing Memory Cues in Memory Augmentation Systems: A Practical Approach
CN111859339A (en) Identity verification system based on computer network
CN116684077B (en) Carbon emission monitoring method and device based on carbon platform

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination