CN111859456A - Fully trusted data system solution - Google Patents
Fully trusted data system solution Download PDFInfo
- Publication number
- CN111859456A CN111859456A CN202010748476.9A CN202010748476A CN111859456A CN 111859456 A CN111859456 A CN 111859456A CN 202010748476 A CN202010748476 A CN 202010748476A CN 111859456 A CN111859456 A CN 111859456A
- Authority
- CN
- China
- Prior art keywords
- data
- platform
- internet
- things
- block chain
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/22—Indexing; Data structures therefor; Storage structures
- G06F16/2228—Indexing structures
- G06F16/2255—Hash tables
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/27—Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G16—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
- G16Y—INFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
- G16Y10/00—Economic sectors
- G16Y10/35—Utilities, e.g. electricity, gas or water
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Databases & Information Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Software Systems (AREA)
- Computer Security & Cryptography (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Computer Hardware Design (AREA)
- Data Mining & Analysis (AREA)
- Computing Systems (AREA)
- Accounting & Taxation (AREA)
- Development Economics (AREA)
- Economics (AREA)
- General Business, Economics & Management (AREA)
- Business, Economics & Management (AREA)
- Storage Device Security (AREA)
Abstract
The invention provides a fully-trusted data system solving system, which comprises a data acquisition terminal, an Internet of things platform and a block chain platform, wherein the data acquisition terminal is respectively in data communication with the Internet of things platform and the block chain platform; the method comprises the steps that a data acquisition terminal generates an authentication value for a big data corresponding value or a big data corresponding value corresponding to big data to be sent to an Internet of things platform and then sends the authentication value to a block chain platform, the block chain platform returns a unique retrieval number which marks a data storage position, and then the authentication value is generated by inquiring the big data corresponding value or the big data corresponding value sent to the block chain platform according to the unique retrieval number; and the big data to be sent to the platform of the Internet of things and the unique retrieval number are reserved in the platform of the Internet of things together, wherein the authentication value can verify the content of the data item, and the data reserved in the platform of the Internet of things is prevented from being modified without permission. The invention can prevent the data from being modified from the data source and realize the data security.
Description
Technical Field
The invention relates to the technical field of data security, in particular to a fully trusted data system solution.
Background
The blockchain is a novel application mode of computer technologies such as distributed data storage, point-to-point transmission, a consensus mechanism and an encryption algorithm. The consensus mechanism is a mathematical algorithm for establishing trust and obtaining rights and interests among different nodes in the blockchain system. A blockchain is essentially a decentralized database. The block chain is a string of data blocks which are generated by using a cryptographic method in a correlation mode, and each data block comprises information of one block chain network transaction, and the information is used for verifying the validity of the information and generating a next block. Currently, blockchain technology is in the period of rapid development and is gradually applied to various industries.
Disclosure of Invention
The invention aims to at least solve the technical problems in the prior art, and particularly creatively provides a fully trusted data system solution.
In order to achieve the purpose, the invention provides a fully-trusted data system solving system which comprises a data acquisition terminal, an Internet of things platform and a block chain platform, wherein the data acquisition terminal is in data communication with the Internet of things platform and the block chain platform respectively;
the method comprises the steps that a data acquisition terminal generates a testimony value from a big data corresponding value or a big data corresponding value corresponding to big data to be sent to an Internet of things platform and sends the testimony value to a block chain platform, the block chain platform returns a unique retrieval number which marks a data storage position, and then the big data corresponding value or the big data corresponding value sent to the block chain platform is inquired and inquired according to the unique retrieval number to generate an authentication value;
and the big data to be sent to the platform of the Internet of things and the unique retrieval number are reserved in the platform of the Internet of things together, wherein the authentication value can verify the content of the data item, and the data reserved in the platform of the Internet of things is prevented from being modified without permission.
In a preferred embodiment of the invention, the system further comprises a collector, wherein the data acquisition terminal receives data of the collector and one or any combination of an internet of things platform, a block chain platform and an application platform to jointly form a fully-trusted data system;
or/and the Internet of things platform and the block chain platform are independent platforms, or the Internet of things platform and the block chain platform are two modules in one platform.
In a preferred embodiment of the present invention, the collector includes one or any combination of an intelligent electric meter, an intelligent water meter and an intelligent gas meter;
or the collector is a sensor (various sensor collecting terminals, such as a temperature sensor collecting terminal, a humidity sensor collecting terminal, a temperature and temperature sensor collecting terminal, and the like) or a meter (related meter, such as an intelligent electric meter, an intelligent water meter, an intelligent gas meter, an intelligent water pressure meter, an intelligent air pressure meter, and the like) or any combination collected by the credible data system.
In a preferred embodiment of the invention, the system further comprises an application platform, wherein the application platform is respectively in data communication with the internet of things platform and the block chain platform;
and rapidly correcting whether the data in the Internet of things platform is tampered by using the application platform, and giving an alarm if the data of the Internet of things platform is rapidly identified to be modified.
In a preferred embodiment of the invention, the method further comprises the step of arranging a protective device on the collector or/and the data collection terminal to prevent modification at the source end.
The invention also discloses a solution of the fully trusted data system, which comprises the following steps:
s1, the data acquisition terminal generates an authentication value for a big data corresponding value or a big data corresponding value corresponding to big data to be sent to the Internet of things platform and sends the authentication value to the block chain platform, the block chain platform returns a unique retrieval number which marks a data storage position, and then the authentication value is generated by inquiring the big data corresponding value or the big data corresponding value sent to the block chain platform according to the unique retrieval number;
and S2, the big data to be sent to the Internet of things platform and the unique retrieval number are reserved in the Internet of things platform together, wherein the authentication value can verify the content of the data item, and the data reserved in the Internet of things platform is prevented from being modified without permission.
In a preferred embodiment of the present invention, step S0 is further included before step S1,
and S0, the collector and the data acquisition terminal transmit the data acquired by the collector to the data acquisition terminal in a wired or wireless mode.
In a preferred embodiment of the present invention, step S3 is further included after step S2,
and S3, rapidly correcting whether the data in the Internet of things platform is tampered through the application platform, and giving an alarm if the data of the Internet of things platform is rapidly identified to be modified.
In a preferred embodiment of the present invention, step S3 is further included after step S2,
and S3, if the collector monitors that the protection device is damaged, the collector transmits the collected damage information to the data acquisition terminal, and the data acquisition terminal transmits the damage information to the Internet of things platform or/and the block chain platform.
Or/and if the data acquisition terminal monitors that the protection device is damaged, the data acquisition terminal transmits the damage information to the Internet of things platform or/and the block chain platform.
In summary, due to the adoption of the technical scheme, the invention can prevent the data from being modified from the data source and realize the data security.
Additional aspects and advantages of the invention will be set forth in part in the description which follows and, in part, will be obvious from the description, or may be learned by practice of the invention.
Drawings
The above and/or additional aspects and advantages of the present invention will become apparent and readily appreciated from the following description of the embodiments, taken in conjunction with the accompanying drawings of which:
FIG. 1 is a schematic block diagram of the connection of the present invention.
Fig. 2 is a schematic block diagram of the inventive connection.
Fig. 3 is a schematic block diagram of the inventive connection.
Fig. 4 is a schematic block diagram of the inventive connection.
Fig. 5 is a schematic block diagram of the inventive connection.
Fig. 6 is a schematic block diagram of the inventive connection.
Detailed Description
Reference will now be made in detail to embodiments of the present invention, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to the same or similar elements or elements having the same or similar function throughout. The embodiments described below with reference to the accompanying drawings are illustrative only for the purpose of explaining the present invention, and are not to be construed as limiting the present invention.
As shown in fig. 1, since the internet of things platform data can be modified, in order to prevent the user from modifying the data, various management means are required to prevent the modification, so that the cost is high and the modification is difficult to be really avoided. The scheme is a traditional method, firstly, the platform of the internet of things is easy to tamper, and the data acquisition terminal can modify data at the data source head end and is more difficult to perceive.
As shown in fig. 2, although data is sent to the blockchain platform, it is not possible to tamper with the data, since the blockchain platform is not good at large data management, is difficult to perform through conventional data operations such as "query", has low performance, and is not recommended to be practical, such as in case of being not used, it is recommended to save only a very small amount of data, i.e., "value data", in the blockchain platform. According to the scheme, although the platform side cannot be tampered, if the data acquisition terminal modifies data, no method is provided. And the platform data volume in the method can not be large, and large data can not be stored.
As shown in fig. 3, a blockchain platform is accessed behind the platform of the internet of things, although the platform of the internet of things can contain large data, the blockchain platform contains a small amount of data, and it is assumed that the platform of the internet of things modifies the data before transmitting the data to the blockchain platform, that is, the data for the blockchain platform is the data after being "tampered", and the blockchain platform does not play a role in "supervising" the platform of the internet of things. Is a 'pseudo-supervision' system.
The invention provides a fully trusted data system solving system, which comprises a data acquisition terminal, an Internet of things platform and a block chain platform, wherein the data acquisition terminal is respectively in data communication with the Internet of things platform and the block chain platform; in this embodiment, the data acquisition terminal may be, but is not limited to, a river data acquisition terminal placed in a river for measuring one of or any combination of real-time cleanliness, real-time flow rate, and real-time depth of river water; the wrist data acquisition terminal is worn on the wrist and used for measuring one or any combination of real-time blood pressure, heart rate, body temperature and exercise amount (one or any combination of walking steps, floor number, calorie consumption and exercise track) of a human body; the method is used for measuring one or any combination of power (active power, reactive power, minimum power, maximum power and average power), current (instantaneous current, average current, maximum current and minimum current) and voltage (instantaneous voltage, average voltage, maximum voltage and minimum voltage) on a power grid; the gas pressure measuring device is arranged on a gas pipeline and used for measuring one or any combination of gas pressure (maximum gas pressure, average gas pressure), flow and temperature.
The method comprises the steps that a data acquisition terminal generates an authentication value for a big data corresponding value or a big data corresponding value corresponding to big data to be sent to an Internet of things platform and then sends the authentication value to a block chain platform, the block chain platform returns a unique retrieval number which marks a data storage position, and then the authentication value is generated by inquiring the big data corresponding value or the big data corresponding value sent to the block chain platform according to the unique retrieval number;
and the big data to be sent to the platform of the Internet of things and the unique retrieval number are reserved in the platform of the Internet of things together, wherein the authentication value or the corresponding value of the big data can verify the content of the data item, so that the data reserved in the platform of the Internet of things is prevented from being modified without permission. In this embodiment, the internet of things platform may collect data collected by the data collection terminal, and may be various service systems, such as a power consumption information collection system of a national grid company, or a data monitoring system in a factory building, or an environment monitoring system. The blockchain platform can be various blockchain platforms such as an ether house, an EOS, a fabric and the like, is not limited to a certain blockchain platform, can be an open source platform, and can also be a self-developed blockchain platform.
In a preferred embodiment of the present invention, the system further includes a collector, and the data collection terminal receives data from the collector. In this embodiment, the collector may be, but is not limited to, one of or any combination of a smart meter, a smart water meter, and a smart gas meter, and when the collector is a smart meter, the collector collects power (one of or any combination of active power, reactive power, minimum power, maximum power, and average power), current (one of or any combination of instantaneous current, average current, maximum current, and minimum current), voltage (one of or any combination of instantaneous voltage, average voltage, maximum voltage, and minimum voltage), power consumption, temperature and humidity of the collector, and overvoltage protection time or any combination thereof, which are set on a line where the collector is located. One or any combination of the Internet of things platform, the block chain platform and the application platform forms a fully trusted data system together; where an application platform is not necessary.
Or/and the Internet of things platform and the block chain platform are independent platforms, or the Internet of things platform and the block chain platform are two modules in one platform.
In a preferred embodiment of the present invention, as shown in fig. 5, the system further includes an application platform, and the application platform is respectively in data communication with the internet of things platform and the block chain platform;
and rapidly correcting whether the data in the Internet of things platform is tampered by using the application platform, and giving an alarm if the data of the Internet of things platform is rapidly identified to be modified.
In a preferred embodiment of the present invention, as shown in fig. 6, a protection device is further provided on the collector or/and the data collection terminal to prevent modification at the source end. The protection device is an anti-disassembly device, the anti-disassembly device can be an anti-disassembly shell, the collector and the data acquisition terminal are arranged in the anti-disassembly shell, a plurality of induction points are arranged outside the anti-disassembly shell, the output ends of the induction points are connected with a controller (a controller in the data acquisition terminal) in the collector, and when the induction points are damaged, the controller records damage information.
The invention also discloses a solution of the fully trusted data system, which comprises the following steps:
s1, the data acquisition terminal generates an authentication value for a big data corresponding value or a big data corresponding value corresponding to big data to be sent to the Internet of things platform and sends the authentication value to the block chain platform, the block chain platform returns a unique retrieval number which marks a data storage position, and then the authentication value is generated by inquiring the big data corresponding value or the big data corresponding value sent to the block chain platform according to the unique retrieval number; in this embodiment, the authentication value is a data content fingerprint, and includes a hash algorithm, an md5 algorithm, and other related mature algorithms to identify the data content fingerprint. Or may be a feature extraction value of a human face or a fingerprint feature value of a fingerprint image. With one algorithm, the "fingerprint" of the content can be computed in the forward direction, but the original content cannot be computed in the reverse direction. The big data corresponding value includes a finger image that is a person, a face image of the person, or video content, which may include various data such as video, text, images, and the like.
And S2, the big data to be sent to the Internet of things platform and the unique retrieval number are reserved in the Internet of things platform together, wherein the authentication value can verify the content of the data item, and the data reserved in the Internet of things platform is prevented from being modified without permission.
In a preferred embodiment of the present invention, step S0 is further included before step S1,
and S0, the collector and the data acquisition terminal transmit the data acquired by the collector to the data acquisition terminal in a wired or wireless mode.
In a preferred embodiment of the present invention, step S3 is further included after step S2,
and S3, rapidly correcting whether the data in the Internet of things platform is tampered through the application platform, and giving an alarm if the data of the Internet of things platform is rapidly identified to be modified.
In a preferred embodiment of the present invention, step S3 is further included after step S2,
and S3, if the collector monitors that the protection device is damaged, the collector transmits the collected damage information to the data acquisition terminal, and the data acquisition terminal transmits the damage information to the Internet of things platform or/and the block chain platform.
Or/and if the data acquisition terminal monitors that the protection device is damaged, the data acquisition terminal transmits the damage information to the Internet of things platform or/and the block chain platform.
One specific example is given below:
the invention also provides a solution of the fully trusted data system, which comprises the following steps:
s1, the data acquisition terminal makes the acquired data into data to be uploaded, and generates a hash value for the data;
the method specifically comprises the following steps: s11, the data acquisition terminal acquires required power data from the intelligent power meter, and the power data comprises a voltage data set V ═ V1,t,V2,t,V3,t,...,VX,tThe current data set I ═ I1,t,I2,t,I3,t,...,IY,t}、P={P1,t,P2,t,P3,t,...,PZ,tOne or any combination; wherein Vx,tThe voltage value of the power line where the xth intelligent power meter is measured at the moment t is represented; x is 1,2,3,. times, X; i isy,tThe current value of the power line where the y-th intelligent power meter is located is represented at the time t; y is 1,2,3,. and Y; pz,tThe active power of the power line where the z-th intelligent power meter is located is measured at the time t; z is 1,2,3,. and Z;
s12, the obtained power data are marked with the acquisition time and then compressed, and the compressed power data are power data to be uploaded;
s13, carrying out hash operation on the power data to be uploaded to obtain a first hash value; the calculation method for obtaining the first hash value comprises the following steps:
Ll=hash1(l),
wherein l represents power data to be uploaded; hash1() Representing a hash operation using one of SHA-1, SHA-224, SHA-256, SHA-384, SHA-512; l islRepresents a first hash value;
s14, combining the first hash value obtained in the step S13 with an encryption key received by the data acquisition terminal to obtain a hash key; the computing method for obtaining the hash key comprises the following steps:
wherein L islRepresents a first hash value; phi denotes an encryption key, and phi denotes,representing a connector; l represents a hash key;
s15, carrying out hash operation on the hash key obtained in the step S14 to obtain a hash value; the calculation method for obtaining the hash value comprises the following steps:
L′=hash2(L),
wherein L represents a hash key; l' represents a hash value;
hash2() Representing a hash operation using one of SHA-1, SHA-224, SHA-256, SHA-384, SHA-512;
when hash1() Using SHA-1 hash operation, then hash2() By means of hash1() The same SHA-1 hash operation;
when hash1() Using SHA-224 hash operation, then hash2() By means of hash1() The same SHA-224 hash operation;
when hash1() Using SHA-256 hash operation, then hash2() By means of hash1() The same SHA-256 hash operation;
when hash1() Using SHA-384 Hash operation, then Hash2() By means of hash1() The same SHA-384 hash operation;
when hash1() Using SHA-512 hash operation, then hash2() By means of hash1() The same SHA-512 hash operation.
S2, sending the generated hash value to a block chain platform, and returning a data transaction TXHash value by the block chain platform;
and S3, the data acquisition terminal combines the acquired data and the received TXhash value into upload data, and the upload data is uploaded to the Internet of things platform.
The method specifically comprises the following steps: s31, the data acquisition terminal acquires the required power data from the intelligent power meter, and the power data packetSet of voltage data V ═ { V ═ V1,t,V2,t,V3,t,...,VX,tThe current data set I ═ I1,t,I2,t,I3,t,...,IY,t}、P={P1,t,P2,t,P3,t,...,PZ,tOne or any combination; wherein Vx,tThe voltage value of the power line where the xth intelligent power meter is measured at the moment t is represented; x is 1,2,3,. times, X; i isy,tThe current value of the power line where the y-th intelligent power meter is located is represented at the time t; y is 1,2,3,. and Y; pz,tThe active power of the power line where the z-th intelligent power meter is located is measured at the time t; z is 1,2,3,. and Z;
s32, compressing the acquired electric power data after acquiring time on the identifier and the received TXHhash value identifier, wherein the compressed data is uploaded electric power data;
and S33, uploading the uploaded electric power data to the Internet of things platform.
In a preferred embodiment of the present invention, the method further comprises a data storage verification method, wherein the verification method comprises the following steps:
s21, acquiring to-be-verified electric power data, wherein the to-be-verified electric power data are uploaded electric power data uploaded to the Internet of things platform;
s22, decompressing the acquired power data to be verified to obtain decompressed power data, wherein the decompressed power data comprises decompressed power data to be uploaded and a decompressed TXhash value;
s23, the following steps are performed to decompress the to-be-uploaded electric power data:
s231, compressing the decompressed power data to be uploaded to obtain compressed power data to be uploaded;
s232, carrying out hash operation on the compressed electric power data to be uploaded to obtain a second hash value; the calculation method for obtaining the second hash value comprises the following steps:
Ll′=hash3(l′),
wherein l' represents decompressing the power data to be uploaded; l isl′Represents a second hash value; hash3() Shows the use of SHA-1,Performing hash operation on one of SHA-224, SHA-256, SHA-384 and SHA-512;
when hash1() Using SHA-1 hash operation, then hash3() By means of hash1() The same SHA-1 hash operation;
when hash1() Using SHA-224 hash operation, then hash3() By means of hash1() The same SHA-224 hash operation;
when hash1() Using SHA-256 hash operation, then hash3() By means of hash1() The same SHA-256 hash operation;
when hash1() Using SHA-384 Hash operation, then Hash3() By means of hash1() The same SHA-384 hash operation;
when hash1() Using SHA-512 hash operation, then hash3() By means of hash1() The same SHA-512 hash operation;
s233, combining the second hash value with the encryption key received by the data acquisition terminal to obtain a decryption hash key; the calculation method of the decryption hash key comprises the following steps:
wherein L isl′Represents a second hash value; Φ' represents an encryption key and,representing a connector; l' represents a decryption hash key;
s234, carrying out hash operation on the decryption hash key to obtain a decryption hash value; the calculation method of the decrypted hash value comprises the following steps:
L″′=hash4(L″),
wherein L' represents a decryption hash key; l' "represents the decrypted hash value;
hash4() Representing a hash operation using one of SHA-1, SHA-224, SHA-256, SHA-384, SHA-512;
when hash3() By using SHA-1 hash operation, hash4() By means of hash3() The same SHA-1 hash operation;
when hash3() Using SHA-224 hash operation, then hash4() By means of hash3() The same SHA-224 hash operation;
when hash3() Using SHA-256 hash operation, then hash4() By means of hash3() The same SHA-256 hash operation;
when hash3() Using SHA-384 Hash operation, then Hash4() By means of hash3() The same SHA-384 hash operation;
when hash3() Using SHA-512 hash operation, then hash4() By means of hash3() The same SHA-512 hash operation;
if L 'is consistent with L', the verification is passed; storing the electric power data to be uploaded (decompressing the electric power data to be uploaded) in the platform of the Internet of things;
otherwise, the verification fails, the uploaded power data is acquired again from the data acquisition terminal, and the step S21 is executed.
In a preferred embodiment of the present invention, the method further includes querying a hash value on the block chain by using a TXhash value (i.e., decompressing the TXhash value, where the TXhash value indicates a hash value storage location) on the platform of the internet of things, to obtain a check hash value, and verifying whether the data is modified, where the method includes the specific steps of:
s61, acquiring check data corresponding to the query value (namely a TXhash value (namely a decompressed TXhash value)) on the platform of the Internet of things, and compressing the acquired check data, wherein the compressed check data are to-be-processed check data;
s62, carrying out hash operation on the check data to be processed to obtain a first check hash value; the calculation method for obtaining the first check hash value comprises the following steps:
L=hash1(),
wherein, the check data to be processed is represented; l isRepresenting a first check hash value;
s63, combining the first check hash value obtained in the step S62 with an encryption key received by a data acquisition terminal sent by the Internet of things platform to obtain a hash check key; the computing method for obtaining the hash check key comprises the following steps:
wherein L isRepresenting a first check hash value; phi denotes an encryption key, LηRepresenting a hash check key;
s64, carrying out hash operation on the hash check key obtained in the step S63 to obtain a hash check value; the calculation method for obtaining the hash check value comprises the following steps:
Lη′=hash2(Lη),
wherein L isη' denotes a hash check value;
if the hash check value is consistent with the check hash value, the check data is not tampered;
if the hash check value is inconsistent with the check hash value, the check data is tampered.
In a preferred embodiment of the present invention, the patrol method further comprises the following steps:
s41, at intervals of time T, wherein the T is a positive number, preferably 5-8 h, the cloud server sends patrol instructions to patrol personnel wearing the mobile handheld terminal, and the patrol instructions comprise a patrol place setting and a patrol travelling route setting;
s42, the mobile handheld terminal judges whether the patrol personnel traveling route is consistent with the set patrol traveling route:
if the travelling route of the patrol personnel is inconsistent with the set patrol travelling route, the mobile handheld terminal sends out a route travelling deviation voice alarm to remind the patrol personnel to change the travelling route and to travel according to the route displayed by the touch display screen on the data acquisition terminal;
s43, scanning a data acquisition terminal installed on a circuit when the data acquisition terminal arrives at a set patrol place, wherein an identification code is printed on a shell of the data acquisition terminal installed on the circuit or displayed on a touch display screen, the identification code is a one-dimensional code or a two-dimensional code, and the identification code comprises an ID number of the data acquisition terminal;
and S44, displaying corresponding patrol data information on a touch display screen on the mobile handheld terminal worn by the patrol personnel after scanning, wherein the patrol data information comprises whether a data acquisition terminal installed on a line is damaged or whether a button battery is replaced or the like, and uploading the filled patrol data information to a cloud server after the mobile handheld terminal worn by the patrol personnel receives an uploading trigger signal.
While embodiments of the invention have been shown and described, it will be understood by those of ordinary skill in the art that: various changes, modifications, substitutions and alterations can be made to the embodiments without departing from the principles and spirit of the invention, the scope of which is defined by the claims and their equivalents.
Claims (9)
1. A fully trusted data system solution system is characterized by comprising a data acquisition terminal, an Internet of things platform and a block chain platform, wherein the data acquisition terminal is in data communication with the Internet of things platform and the block chain platform respectively;
the method comprises the steps that a data acquisition terminal generates a testimony value from a big data corresponding value or a big data corresponding value corresponding to big data to be sent to an Internet of things platform and sends the testimony value to a block chain platform, the block chain platform returns a unique retrieval number which marks a data storage position, and then the big data corresponding value or the big data corresponding value sent to the block chain platform is inquired and inquired according to the unique retrieval number to generate an authentication value;
and the big data to be sent to the platform of the Internet of things and the unique retrieval number are reserved in the platform of the Internet of things together, wherein the authentication value can verify the content of the data item, and the data reserved in the platform of the Internet of things is prevented from being modified without permission.
2. The fully-trusted data system solving system according to claim 1, further comprising a collector, wherein the data collection terminal receives data of the collector and one or any combination of an internet of things platform, a block chain platform and an application platform to jointly form a fully-trusted data system;
or/and the Internet of things platform and the block chain platform are independent platforms, or the Internet of things platform and the block chain platform are two modules in one platform.
3. The fully trusted data system solving system according to claim 2, wherein the collector comprises one of an intelligent electric meter, an intelligent water meter and an intelligent gas meter or any combination thereof;
or the collector is a sensor or a meter or any combination collected by the credible data system.
4. The fully trusted data system solving system according to claim 1, further comprising an application platform, wherein the application platform is in data communication with the internet of things platform and the block chain platform, respectively;
and rapidly correcting whether the data in the Internet of things platform is tampered by using the application platform, and giving an alarm if the data of the Internet of things platform is rapidly identified to be modified.
5. The fully trusted data system solving system according to claim 1 or 2, further comprising a protection device arranged on the collector or/and the data collection terminal to prevent modification at the source terminal.
6. A fully trusted data system solution, comprising the steps of:
s1, the data acquisition terminal generates an authentication value for a big data corresponding value or a big data corresponding value corresponding to big data to be sent to the Internet of things platform and sends the authentication value to the block chain platform, the block chain platform returns a unique retrieval number which marks a data storage position, and then the authentication value is generated by inquiring the big data corresponding value or the big data corresponding value sent to the block chain platform according to the unique retrieval number;
and S2, the big data to be sent to the Internet of things platform and the unique retrieval number are reserved in the Internet of things platform together, wherein the authentication value can verify the content of the data item, and the data reserved in the Internet of things platform is prevented from being modified without permission.
7. The fully trusted data system solution as claimed in claim 5, further comprising step S0 before step S1,
and S0, the collector and the data acquisition terminal transmit the data acquired by the collector to the data acquisition terminal in a wired or wireless mode.
8. The fully trusted data system solution as claimed in claim 5, further comprising step S3 after step S2,
and S3, rapidly correcting whether the data in the Internet of things platform is tampered through the application platform, and giving an alarm if the data of the Internet of things platform is rapidly identified to be modified.
9. The fully trusted data system solution as claimed in claim 5, further comprising step S3 after step S2,
s3, if the collector monitors that the protection device is damaged, the collector transmits the collected damage information to the data collection terminal, and the data collection terminal transmits the damage information to the Internet of things platform or/and the block chain platform;
or/and if the data acquisition terminal monitors that the protection device is damaged, the data acquisition terminal transmits the damage information to the Internet of things platform or/and the block chain platform.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010748476.9A CN111859456A (en) | 2020-07-30 | 2020-07-30 | Fully trusted data system solution |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010748476.9A CN111859456A (en) | 2020-07-30 | 2020-07-30 | Fully trusted data system solution |
Publications (1)
Publication Number | Publication Date |
---|---|
CN111859456A true CN111859456A (en) | 2020-10-30 |
Family
ID=72946235
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010748476.9A Pending CN111859456A (en) | 2020-07-30 | 2020-07-30 | Fully trusted data system solution |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111859456A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112887076A (en) * | 2021-01-15 | 2021-06-01 | 上海天俣可信物联网科技有限公司 | Internet of things system based on NB-IoT and blockchain technology and implementation method |
CN113420169A (en) * | 2021-06-22 | 2021-09-21 | 重庆紫光华山智安科技有限公司 | File storage and query method, system, electronic equipment and medium |
Citations (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107240247A (en) * | 2017-07-14 | 2017-10-10 | 杭州钛比科技有限公司 | A kind of ammeter data acquisition system based on NB IoT |
CN109586914A (en) * | 2017-09-28 | 2019-04-05 | 大唐移动通信设备有限公司 | A kind of data verification method and device of Internet of things system |
CN109981682A (en) * | 2019-04-10 | 2019-07-05 | 北京阿尔山区块链联盟科技有限公司 | Data verification method, the apparatus and system of internet of things equipment |
KR20190079324A (en) * | 2017-12-27 | 2019-07-05 | 에이치닥테크놀로지 주식회사 한국영업소 | Method and system for enhancing integrity of batabase based on the block chain system |
CN110097373A (en) * | 2019-03-18 | 2019-08-06 | 杭州特股软件开发有限公司 | The traceability system and method combined based on block chain with Internet of Things |
CN110113167A (en) * | 2019-04-01 | 2019-08-09 | 广州杰赛科技股份有限公司 | A kind of information protecting method of intelligent terminal, system and readable storage medium storing program for executing |
US20190379664A1 (en) * | 2018-06-06 | 2019-12-12 | Cisco Technology, Inc. | Blockchain-based nb-iot devices |
CN110691088A (en) * | 2019-09-29 | 2020-01-14 | 广东电网有限责任公司 | Block chain-based Internet of things equipment authentication method |
US20200106601A1 (en) * | 2018-10-01 | 2020-04-02 | Schneider Electric Industries Sas | Secure storage of data in a blockchain |
CN111092851A (en) * | 2019-09-23 | 2020-05-01 | 上海唯链信息科技有限公司 | Data verification method and device of Internet of things temperature detection equipment based on block chain |
CN111125787A (en) * | 2019-12-27 | 2020-05-08 | 上海共链信息科技有限公司 | Gas inspection data cochain system based on block chain and use method thereof |
KR20200048440A (en) * | 2018-10-30 | 2020-05-08 | 삼성에스디에스 주식회사 | System for providing retrieval service based on blockchain and method of the same |
CN111459935A (en) * | 2020-03-20 | 2020-07-28 | 深圳市芯链科技有限公司 | Internet of things data storage method, storage system, query method and storage medium |
-
2020
- 2020-07-30 CN CN202010748476.9A patent/CN111859456A/en active Pending
Patent Citations (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107240247A (en) * | 2017-07-14 | 2017-10-10 | 杭州钛比科技有限公司 | A kind of ammeter data acquisition system based on NB IoT |
CN109586914A (en) * | 2017-09-28 | 2019-04-05 | 大唐移动通信设备有限公司 | A kind of data verification method and device of Internet of things system |
KR20190079324A (en) * | 2017-12-27 | 2019-07-05 | 에이치닥테크놀로지 주식회사 한국영업소 | Method and system for enhancing integrity of batabase based on the block chain system |
US20190379664A1 (en) * | 2018-06-06 | 2019-12-12 | Cisco Technology, Inc. | Blockchain-based nb-iot devices |
US20200106601A1 (en) * | 2018-10-01 | 2020-04-02 | Schneider Electric Industries Sas | Secure storage of data in a blockchain |
KR20200048440A (en) * | 2018-10-30 | 2020-05-08 | 삼성에스디에스 주식회사 | System for providing retrieval service based on blockchain and method of the same |
CN110097373A (en) * | 2019-03-18 | 2019-08-06 | 杭州特股软件开发有限公司 | The traceability system and method combined based on block chain with Internet of Things |
CN110113167A (en) * | 2019-04-01 | 2019-08-09 | 广州杰赛科技股份有限公司 | A kind of information protecting method of intelligent terminal, system and readable storage medium storing program for executing |
CN109981682A (en) * | 2019-04-10 | 2019-07-05 | 北京阿尔山区块链联盟科技有限公司 | Data verification method, the apparatus and system of internet of things equipment |
CN111092851A (en) * | 2019-09-23 | 2020-05-01 | 上海唯链信息科技有限公司 | Data verification method and device of Internet of things temperature detection equipment based on block chain |
CN110691088A (en) * | 2019-09-29 | 2020-01-14 | 广东电网有限责任公司 | Block chain-based Internet of things equipment authentication method |
CN111125787A (en) * | 2019-12-27 | 2020-05-08 | 上海共链信息科技有限公司 | Gas inspection data cochain system based on block chain and use method thereof |
CN111459935A (en) * | 2020-03-20 | 2020-07-28 | 深圳市芯链科技有限公司 | Internet of things data storage method, storage system, query method and storage medium |
Non-Patent Citations (1)
Title |
---|
刘军 等: "基于区块链的冷链物流边缘计算验证演示***", 网络安全技术与应用, no. 07 * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112887076A (en) * | 2021-01-15 | 2021-06-01 | 上海天俣可信物联网科技有限公司 | Internet of things system based on NB-IoT and blockchain technology and implementation method |
CN113420169A (en) * | 2021-06-22 | 2021-09-21 | 重庆紫光华山智安科技有限公司 | File storage and query method, system, electronic equipment and medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107317856A (en) | A kind of date storage method and device based on block chain | |
CN108306896B (en) | Substation state monitoring system and method with data protection function | |
CN109547477A (en) | A kind of data processing method and its device, medium, terminal | |
CN111859456A (en) | Fully trusted data system solution | |
CN107242854B (en) | Intelligent medical system based on safety communication | |
CN110830235B (en) | Intelligent vehicle networking trusted data encryption method and system based on block chain | |
CN111127254B (en) | Marketing and distribution through data management system | |
CN109361952A (en) | Video management method, apparatus, system and electronic equipment | |
CN110474962B (en) | Data checking system and method based on edge calculation | |
CN104735654A (en) | Private data fusing method capable of detecting data integrity | |
CN103795541A (en) | Secure communication method of electricity information acquisition system of 230M wireless private network channel | |
CN112395582B (en) | Job entry management method, system, computer device and storage medium | |
CN110991979A (en) | Attendance management method, device and equipment for intelligent construction site and computer storage medium | |
CN113595744A (en) | Network access method, device, electronic equipment and storage medium | |
CN117272345B (en) | Electronic contract encryption method and system based on cloud service | |
CN107403476A (en) | Mobile phone terminal dynamic facial identifies attendance checking system | |
Yu et al. | Verifiable, privacy-assured, and accurate signal collection for cloud-assisted wireless sensor networks | |
CN114745689A (en) | Multi-time-segment data fusion method and system for wireless sensor network | |
CN114760229A (en) | Data transmission method and data transmission system | |
CN113626860A (en) | Electric power data privacy protection method based on block chain | |
CN107273070A (en) | A kind of intelligent marketing bill bar code printing management control system | |
CN109120648B (en) | A kind of anti-tamper verifying system of real-time monitoring data | |
Bexheti et al. | Securely Storing and Sharing Memory Cues in Memory Augmentation Systems: A Practical Approach | |
CN111859339A (en) | Identity verification system based on computer network | |
CN116684077B (en) | Carbon emission monitoring method and device based on carbon platform |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |