CN112532395B - Block chain-based data credit system, method and medium - Google Patents
Block chain-based data credit system, method and medium Download PDFInfo
- Publication number
- CN112532395B CN112532395B CN202011349830.7A CN202011349830A CN112532395B CN 112532395 B CN112532395 B CN 112532395B CN 202011349830 A CN202011349830 A CN 202011349830A CN 112532395 B CN112532395 B CN 112532395B
- Authority
- CN
- China
- Prior art keywords
- data
- blockchain
- uploading
- trust
- unit configured
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 34
- 230000005540 biological transmission Effects 0.000 claims abstract description 32
- 238000012550 audit Methods 0.000 claims abstract description 29
- 238000004891 communication Methods 0.000 claims description 17
- 238000012544 monitoring process Methods 0.000 claims description 8
- 238000013507 mapping Methods 0.000 claims 1
- 238000012795 verification Methods 0.000 description 14
- 238000003860 storage Methods 0.000 description 11
- 238000005516 engineering process Methods 0.000 description 10
- 238000007726 management method Methods 0.000 description 9
- 238000004458 analytical method Methods 0.000 description 8
- AQHHHDLHHXJYJD-UHFFFAOYSA-N propranolol Chemical compound C1=CC=C2C(OCC(O)CNC(C)C)=CC=CC2=C1 AQHHHDLHHXJYJD-UHFFFAOYSA-N 0.000 description 8
- 230000008569 process Effects 0.000 description 7
- 230000006855 networking Effects 0.000 description 6
- 238000010586 diagram Methods 0.000 description 4
- 230000003993 interaction Effects 0.000 description 4
- 229960003712 propranolol Drugs 0.000 description 4
- 238000013500 data storage Methods 0.000 description 3
- 230000008901 benefit Effects 0.000 description 2
- 238000004364 calculation method Methods 0.000 description 2
- 238000009960 carding Methods 0.000 description 2
- 238000010276 construction Methods 0.000 description 2
- 238000013524 data verification Methods 0.000 description 2
- 238000004519 manufacturing process Methods 0.000 description 2
- 230000007246 mechanism Effects 0.000 description 2
- 238000012545 processing Methods 0.000 description 2
- 206010033799 Paralysis Diseases 0.000 description 1
- 230000009471 action Effects 0.000 description 1
- 238000012790 confirmation Methods 0.000 description 1
- 238000011217 control strategy Methods 0.000 description 1
- 238000007405 data analysis Methods 0.000 description 1
- 238000013480 data collection Methods 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000007613 environmental effect Effects 0.000 description 1
- 238000000605 extraction Methods 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 230000008676 import Effects 0.000 description 1
- 230000002452 interceptive effect Effects 0.000 description 1
- 239000000463 material Substances 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 239000013307 optical fiber Substances 0.000 description 1
- 238000005457 optimization Methods 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
- 238000011084 recovery Methods 0.000 description 1
- 230000001105 regulatory effect Effects 0.000 description 1
- 230000004044 response Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 208000011580 syndromic disease Diseases 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3297—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/72—Signcrypting, i.e. digital signing and encrypting simultaneously
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
Abstract
The invention provides a data trust system, a data trust method and a data trust medium based on a block chain. Wherein the system comprises: a data acquisition unit configured to: collecting original data from an offshore terminal, and encrypting and signing the data according to a hardware-based embedded equipment private key to obtain first data; a data transmission unit configured to: introducing a third party supervision service based on a prophetic machine to audit the first data in transmission; a data-holding unit configured to: receiving the first data, storing the first data, adding a time stamp and uploading information to obtain second data, and uploading the second data to the blockchain; and a data use unit configured to: and writing access rights in the second data, and automatically executing access to the data through intelligent contracts in the blockchain.
Description
Technical Field
The present invention relates to the field of blockchain, and in particular, to a blockchain-based data trust system, method and medium.
Background
In complex marine environments, communication and co-operation between devices is important. In the prior art, a centralized information system construction scheme is often adopted, a communication hub service is used as a center, communication individuals are connected to the communication hub for information interaction and collaboration, and the information interaction among the communication individuals needs to be forwarded by the communication hub. Such a centralized system can realize complex environmental communication, but is faced with great potential safety hazards, and once the centralized communication hub is attacked maliciously, the whole system is faced with the risk of paralysis. The adoption of the blockchain technology can solve the trust reconstruction and the trusted interaction in the unequal trust mode in the complex environment, and solve the security problem faced by the centralized communication hub.
Networking technology is network construction technology. There are many types of computer networks, and different classification bases are available according to different networking technologies. The network can be divided into according to the switching technology: circuit switched networks, packet switched networks. The transmission technology can be divided into: broadcast network, non-broadcast multiple access network, point-to-point network. Topology can be divided into bus, star, ring, tree, full mesh, and partial mesh networks. The transmission medium can be divided into wired network and wireless network. The wired network refers to a network formed by connecting coaxial cables, twisted pair wires and optical fibers. Wireless networks refer to a type of network that uses an electromagnetic wave as a carrier to effect data transmission. Offshore equipment is mainly a wireless broadcast network and is in security considerations, typically a local area network.
As shown in fig. 1, the conventional offshore equipment networking system mostly adopts a tree structure, an upper-level processing unit is a root node, and a lower-level processing unit is a leaf node. A typical networking system is shown in the figures above. The root node is responsible for collecting and summarizing data and is connected with each leaf node; and on the other hand, the land terminal is connected, and the land terminal is fed back according to the data acquisition and analysis results to carry out decision support of related actions.
The offshore equipment networking system of the tree model has obvious advantages of centralized rights, clear instructions, smooth information and clear responsibilities, can clearly define the structure of the whole system, and is easy to increase and reduce certain organization. However, the system has obvious defects, and how to ensure that the sensor on the offshore terminal equipment can reliably transmit data in the weakly connected and weakly coordinated offshore complex environment becomes a current urgent problem to be solved.
Disclosure of Invention
The invention aims to provide a data trust scheme based on a block chain so as to solve the technical problems in the prior art.
The first aspect of the present invention provides a blockchain-based data trust system, the system comprising: a data acquisition unit configured to: collecting original data from an offshore terminal, and encrypting and signing the data according to a hardware-based embedded equipment private key to obtain first data; a data transmission unit configured to: introducing a third party supervision service based on a prophetic machine to audit the first data in transmission; a data-holding unit configured to: receiving the first data, storing the first data, adding a time stamp and uploading information to obtain second data, and uploading the second data to the blockchain; and a data use unit configured to: and writing access rights in the second data, and automatically executing access to the data through intelligent contracts in the blockchain.
According to the system provided by the first aspect of the invention, the hardware-based embedded equipment private key is U shield and is used for verifying the offshore terminal.
According to the system provided by the first aspect of the invention, the propulsor supports communication with the server based on https protocol, and provides monitoring evidence of the data acquisition service to the third party supervision service.
According to the system provided by the first aspect of the invention, the data certification unit is specifically configured to certify the first data based on the hash map and verify the certified second data based on the certification consensus.
The second aspect of the present invention provides a blockchain-based data trust method, the method comprising: s1, acquiring original data from an offshore terminal, and encrypting and signing the data according to an embedded equipment private key based on hardware to obtain first data; s2, introducing a third party supervision service based on a prophetic machine to audit the first data in transmission; s3, receiving the first data, storing the first data, adding a time stamp and uploading information to obtain second data, and uploading the second data to the block chain; and step S4, writing access rights in the second data, and automatically executing access to the data through the intelligent contracts in the blockchain.
According to the method provided by the second aspect of the invention, the private key of the embedded equipment based on hardware is U shield, which is used for verifying the offshore terminal.
According to the method provided by the second aspect of the invention, the propulsor supports communication with the server based on https protocol, and provides monitoring evidence of the data acquisition service to the third party supervision service.
According to the method provided in the second aspect of the present invention, in the step S3, the first data is authenticated based on the hash map, and the authenticated second data is authenticated based on the authentication consensus.
A third aspect of the present invention provides a non-transitory computer readable medium storing instructions which, when executed by a processor, perform the steps of a blockchain-based data trust method according to the second aspect of the present invention.
Drawings
In order to more clearly illustrate the embodiments of the invention or the technical solutions in the prior art, the drawings which are required in the description of the embodiments or the prior art will be briefly described, it being obvious that the drawings in the description below are some embodiments of the invention and that other drawings may be obtained from these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a schematic diagram of a tree structure of a conventional offshore equipment networking system;
FIG. 2 is a schematic diagram of a block chain based data trust scheme according to an embodiment of the invention;
FIG. 3 is a block chain based data trust system architecture according to an embodiment of the invention;
FIG. 4 is a schematic diagram of a flow of intelligent contract invocation foreseeing machine contracts, in accordance with an embodiment of the present invention;
FIG. 5 is a block chain certification flow according to an embodiment of the present invention;
FIG. 6 is a schematic diagram of a data access control flow according to an embodiment of the present invention; and
FIG. 7 is a flow chart of a method for blockchain-based data trust in accordance with an embodiment of the present invention.
Detailed Description
The following description of the embodiments of the present invention will be made apparent and fully in view of the accompanying drawings, in which some, but not all embodiments of the invention are shown. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
The data trust scheme based on the blockchain is adopted in the method, as shown in fig. 2, and the method is used for realizing the trust assurance of the full life cycle of the offshore terminal data through technical means and process optimization around four aspects of data trust acquisition, trust transmission, trust storage and trusted use.
The first aspect of the present invention provides a blockchain-based data trust system. FIG. 3 is a block chain based data trust system architecture according to an embodiment of the invention; as shown in fig. 3, the system includes: a data acquisition unit 301 configured to: collecting original data from an offshore terminal, and encrypting and signing the data according to a hardware-based embedded equipment private key to obtain first data; a data transmission unit 302 configured to: introducing a third party supervision service based on a prophetic machine to audit the first data in transmission; a data-holding unit 303 configured to: receiving the first data, storing the first data, adding a time stamp and uploading information to obtain second data, and uploading the second data to the blockchain; and a data use unit 304 configured to: and writing access rights in the second data, and automatically executing access to the data through intelligent contracts in the blockchain.
The data collection unit 301 encrypts and signs the data collected by the offshore terminal by using the hardware-based embedded device private key, so as to ensure that the collected content is not tamperable and can not be repudiated. In some embodiments, the hardware-based embedded device private key is a U-shield used to authenticate the offshore terminal. The offshore terminal is verified through a U shield, wherein the U shield is hardware private key equipment and is used for storing the unique identity of the equipment. The private key information of the device after the U shield is adopted is not stored on the network any more and only exists in the U shield, and when the device joins the network, whether the public key of the device is matched is verified through the private key in the U shield. When a device sends collected data to the blockchain network, the blockchain network may require the terminal device to store the device signature using the hardware private key. The terminal equipment needs to sign and endorse the acquired data, the network can interact data and business with the terminal after obtaining the data with the sign confirmation, and synchronize the data with other terminals in block information, and the data can be written into the whole network after the whole block chain is agreed. The secure private key storage device supports secure CPU kernel, hardware true random number, cryptographic algorithm and USB/7816 interface, and can realize functions of private key generation, signature, public key export, PIN code verification, recovery word import and export, and the like.
The data transmission unit 302 introduces a third party supervision service by using a prophetic machine technology, audits the transmission process, and claims an audit report to ensure the safety and the reliability of the transmission process. In some embodiments, the propulsor supports https protocol-based communications with a server and provides monitoring evidence of the data acquisition service to the third party regulatory service. The predictor technology is used for guaranteeing the credibility of the data transmission process, and corresponding predictor certificates are generated for proving the credibility of the data transmission process through audit and certificate number service from credible computing hardware. The predictive engine needs to provide two independent service modules for data transmission and process audit, and the two modules interact with a data source together to complete data transmission and recording. The data transmission service support and the server are required to pass through https protocol, and are compatible with different versions of communication rules such as TLS 1.0-1.2. The process audit service is required to run in a trusted computing environment, and can provide monitoring evidence for a single data acquisition service for any third party to audit.
As shown in fig. 4, the on-chain smart contract performs trusted off-chain data transfer by invoking a foreshadowing machine contract. The transmission data and audit information obtained by the prophetic contract are provided by both an audit service and a data transmission (uplink) module. The two modules interact with a trusted data source together, one is responsible for data transmission, and the other is responsible for supervising the acquisition process. The verification mechanism is introduced to restrict a data transmission (uplink) service provider, a certain cryptography method is adopted, on the premise of not influencing normal network communication, the uplink service is ensured to be restricted to be capable of only transmitting data provided by a trusted data source (avoiding maliciousness), and the restriction process can be verified.
Entering a propranolol certificate verification page, uploading the propranolol certificate from the local, clicking the propranolol certificate to start the verification of the propranolol certificate, and dividing the verification of the certificate into six verification links: an effective certification format; an effective server public key; a valid certificate key; effectively auditing the signature; a valid encryption server response; effectively decrypting the corresponding content. And when all six items of verification pass, the certificate verification passes, otherwise, the certificate verification fails. The certificate passes verification, and the data transmission process is represented to be true and reliable, otherwise, the data transmission has problems, and further the user is prompted to further check the data acquisition equipment and the data transmission service.
The data storage and certification unit 303 uses the blockchain technology to store and certify the collected data, and adds a time stamp and uploading equipment/personnel information to ensure the credibility of data storage. In a complex offshore environment, information interaction between terminals is frequent, and aiming at information security, data confidentiality, data evidence storage and postmortem summarization under the scene, the system builds an evidence storage chain on the basis of an offshore blockchain terminal network, so that real-time chain evidence storage of data information in the offshore complex environment is realized. Through technical characteristics of common block chain knowledge, non-falsification, safety, transparency and the like, the system is helped to realize data storage, and a trusted data source is provided for post-hoc data carding, summarizing and analyzing.
The business flow of the certification chain is shown in fig. 5, and mainly comprises several stages of data production, data hashing, data uplink, data consensus and data verification. 1) Data production; the method comprises the steps of generating data in individual equipment according to the needs of the offshore individual equipment and storing the data locally. 2) Data hashing; the data itself is not used as the information of the on-chain certificate, but the hash value of the data is required to implement the on-chain certificate operation. The data hash is in one-to-one correspondence with the data file. After the data is produced, the data hash calculation is needed to be completed locally. 3) The certificate is linked; after the data hash calculation is completed, the data hash is completed through the local block link point, and a consensus request is sent to the network. 4) Identification of the existence of the syndrome; in the evidence storage and consensus phase, each node in the blockchain network confirms and endorses the evidence storage, and after the consensus process is completed, each node uniformly records the hash account book of the evidence storage information of various data. 5) Verifying the certificate; in the post analysis process, each node in the blockchain network stores various information materials and circulation records of the information. Through extraction and comparison of the file and the on-chain evidence storage information, verification, carding and analysis of data can be completed, and trusted data support is provided for post analysis. As a bottom layer supporting environment for information storage, the blockchain system needs to have the characteristics of high concurrency, non-falsification, data security privacy and the like so as to ensure the timely storage of complex data and the requirements of post-data verification and analysis.
The data usage unit 304 writes the authority of the data, the authority of the user main body and the security access control rule into the blockchain, and automatically executes the data through the intelligent contract to ensure the credibility of the data usage process. In order to strengthen the safe access control of intelligent terminal data and services in the interactive scene of the offshore terminal, the invention builds a safe access control mechanism based on a blockchain, realizes effective authority control on sensitive data, executive services and results thereof, truly and comprehensively records, provides relevant evidence and audit management supporting means for responsibility tracking for terminal services, and realizes data trusted use.
As shown in fig. 6, an application layer on the terminal initiates a micro service call request through a micro service management module; the management module performs security access control detection through the block chain; the block chain stores all user rights, all registered service rights and the matching relation of the user rights and the registered service rights, and automatically executes security access control through intelligent contracts; the dynamic audit module exists in all terminals and records and reports micro service requests, calls and used conditions on the terminals; the on-chain audit analysis system is responsible for full life cycle monitoring audit of all micro services.
The whole flow comprises the following steps: the application layer initiates a micro-service call request to the micro-service management module; the micro-service management module initiates a verification request to the blockchain to verify whether the security access control rule is met; after verifying whether the block chain accords with the safety access control rule, returning corresponding approval information to the micro-service management module; the micro-service management module returns approval information to the application layer; the micro-service management module reports approval information to the on-chain audit analysis system; after the micro-service management module agrees, the application layer initiates a request to the micro-service party, and the request flows through the dynamic audit module of the request party and the dynamic audit module of the service party; the dynamic audit module of the requesting party performs compliance checking, and the log is forwarded after being kept; the dynamic audit module of the requesting party reports the log to the dynamic audit analysis system on the chain; the server side dynamic audit module performs compliance checking, and the log is forwarded after being kept; and the server side dynamic audit module reports the log to a dynamic audit analysis background.
A second aspect of the present invention provides a blockchain-based data trust method. FIG. 7 is a flow chart of a blockchain-based data trust method according to an embodiment of the invention, as shown in FIG. 7, the method comprising: s1, acquiring original data from an offshore terminal, and encrypting and signing the data according to an embedded equipment private key based on hardware to obtain first data; s2, introducing a third party supervision service based on a prophetic machine to audit the first data in transmission; s3, receiving the first data, storing the first data, adding a time stamp and uploading information to obtain second data, and uploading the second data to the block chain; and step S4, writing access rights in the second data, and automatically executing access to the data through the intelligent contracts in the blockchain.
According to the method provided by the second aspect of the invention, the private key of the embedded equipment based on hardware is U shield, which is used for verifying the offshore terminal.
According to the method provided by the second aspect of the invention, the propulsor supports communication with the server based on https protocol, and provides monitoring evidence of the data acquisition service to the third party supervision service.
According to the method provided in the second aspect of the present invention, in the step S3, the first data is authenticated based on the hash map, and the authenticated second data is authenticated based on the authentication consensus.
A third aspect of the present invention provides a non-transitory computer readable medium storing instructions which, when executed by a processor, perform the steps of a blockchain-based data trust method according to the second aspect of the present invention.
In summary, the blockchain-based data trust scheme provided by the present disclosure has the following technical advantages: 1) Through the excellent shield, the reliable identification of the offshore terminal identity and the reliable collection of data are realized; 2) The reliable transmission of the offshore terminal data is realized through the predictor; 3) And through a predictor certificate verification technology, the reliability verification of the data transmission process is realized. The method comprises the steps of carrying out a first treatment on the surface of the 4) The data trusted memory card is realized through data hash, timestamp and acquisition equipment/personnel information uplink; 5) Automatically executing a security access control strategy through an intelligent contract to realize data trusted use; and 6) realizing the trusted traceability audit by the uplink of the data full life cycle circulation record.
Finally, it should be noted that: the above embodiments are only for illustrating the technical solution of the present invention, and not for limiting the same; although the invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical scheme described in the foregoing embodiments can be modified or some or all of the technical features thereof can be replaced by equivalents; such modifications and substitutions do not depart from the spirit of the invention.
Claims (5)
1. A blockchain-based data trust system, the system comprising:
a data acquisition unit configured to: collecting original data from an offshore terminal, and encrypting and signing the data according to a hardware-based embedded equipment private key to obtain first data;
a data transmission unit configured to: introducing a third party supervision service based on a prophetic machine to audit the first data in transmission;
a data-holding unit configured to: receiving the first data, storing the first data, adding a time stamp and uploading information to obtain second data, and uploading the second data to the blockchain, wherein the uploading information is uploading equipment/personnel information; and
a data use unit configured to: writing access rights in the second data, and automatically executing access to the data through intelligent contracts in the blockchain;
the predictor supports communication with a server based on https protocol, and provides monitoring evidence for data acquisition service to the third party supervision service;
the data certification unit is specifically configured to certify the first data based on hash mapping, and verify the certified second data based on certification consensus.
2. The blockchain-based data trust system of claim 1, wherein the hardware-based embedded device private key is a U-shield for authenticating the offshore terminal.
3. A blockchain-based data trust method, the method comprising:
s1, acquiring original data from an offshore terminal, and encrypting and signing the data according to an embedded equipment private key based on hardware to obtain first data;
s2, introducing a third party supervision service based on a prophetic machine to audit the first data in transmission;
s3, receiving the first data, storing the first data, adding a time stamp and uploading information to obtain second data, and uploading the second data to the blockchain, wherein the uploading information is uploading equipment/personnel information; and
s4, writing access rights in the second data, and automatically executing access to the data through intelligent contracts in the blockchain;
the predictor supports communication with a server based on https protocol, and provides monitoring evidence for data acquisition service to the third party supervision service;
in the step S3, the first data is authenticated based on the hash map, and the authenticated second data is authenticated based on the authentication consensus.
4. A blockchain-based data trust method according to claim 3, wherein the hardware-based embedded device private key is a U-shield for authenticating the offshore terminal.
5. A non-transitory computer readable medium storing instructions which, when executed by a processor, perform the steps of the blockchain-based data trust method of any of claims 3-4.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011349830.7A CN112532395B (en) | 2020-11-26 | 2020-11-26 | Block chain-based data credit system, method and medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011349830.7A CN112532395B (en) | 2020-11-26 | 2020-11-26 | Block chain-based data credit system, method and medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN112532395A CN112532395A (en) | 2021-03-19 |
CN112532395B true CN112532395B (en) | 2024-02-27 |
Family
ID=74993758
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011349830.7A Active CN112532395B (en) | 2020-11-26 | 2020-11-26 | Block chain-based data credit system, method and medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112532395B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114969835B (en) * | 2022-08-01 | 2022-10-25 | 北京笔新互联网科技有限公司 | Webpage information evidence storing method and device |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108964905A (en) * | 2018-07-18 | 2018-12-07 | 胡祥义 | A kind of safe and efficient block chain implementation method |
CN110287739A (en) * | 2019-06-17 | 2019-09-27 | 西安纸贵互联网科技有限公司 | Data safety control method and system based on hardware private keys memory technology |
CN110581854A (en) * | 2019-09-12 | 2019-12-17 | 北京笔新互联网科技有限公司 | intelligent terminal safety communication method based on block chain |
CN111080292A (en) * | 2019-11-25 | 2020-04-28 | 支付宝(杭州)信息技术有限公司 | Method and device for acquiring block chain transaction signature data |
CN111368953A (en) * | 2020-03-10 | 2020-07-03 | 大仝智能科技有限公司 | Product anti-counterfeiting traceability system and method |
CN111475574A (en) * | 2020-04-09 | 2020-07-31 | 成都九宽科技有限公司 | Data acquisition device based on block chain |
CN111737654A (en) * | 2020-08-14 | 2020-10-02 | 支付宝(杭州)信息技术有限公司 | Infringement detection method and device based on block chain and electronic equipment |
WO2020207090A1 (en) * | 2019-04-12 | 2020-10-15 | 创新先进技术有限公司 | Blockchain-based data processing system and method, computing device and storage medium |
CN111798209A (en) * | 2020-06-30 | 2020-10-20 | 远光软件股份有限公司 | Engineering project management method based on block chain, electronic equipment and storage medium |
CN111930852A (en) * | 2020-09-29 | 2020-11-13 | 北京百度网讯科技有限公司 | Data processing method, device and equipment based on block chain and storage medium |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11461768B2 (en) * | 2017-08-21 | 2022-10-04 | American Express Travel Related Services Company, Inc. | Systems and methods for data file transfer balancing and control on blockchain |
-
2020
- 2020-11-26 CN CN202011349830.7A patent/CN112532395B/en active Active
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108964905A (en) * | 2018-07-18 | 2018-12-07 | 胡祥义 | A kind of safe and efficient block chain implementation method |
WO2020207090A1 (en) * | 2019-04-12 | 2020-10-15 | 创新先进技术有限公司 | Blockchain-based data processing system and method, computing device and storage medium |
CN110287739A (en) * | 2019-06-17 | 2019-09-27 | 西安纸贵互联网科技有限公司 | Data safety control method and system based on hardware private keys memory technology |
CN110581854A (en) * | 2019-09-12 | 2019-12-17 | 北京笔新互联网科技有限公司 | intelligent terminal safety communication method based on block chain |
CN111080292A (en) * | 2019-11-25 | 2020-04-28 | 支付宝(杭州)信息技术有限公司 | Method and device for acquiring block chain transaction signature data |
CN111368953A (en) * | 2020-03-10 | 2020-07-03 | 大仝智能科技有限公司 | Product anti-counterfeiting traceability system and method |
CN111475574A (en) * | 2020-04-09 | 2020-07-31 | 成都九宽科技有限公司 | Data acquisition device based on block chain |
CN111798209A (en) * | 2020-06-30 | 2020-10-20 | 远光软件股份有限公司 | Engineering project management method based on block chain, electronic equipment and storage medium |
CN111737654A (en) * | 2020-08-14 | 2020-10-02 | 支付宝(杭州)信息技术有限公司 | Infringement detection method and device based on block chain and electronic equipment |
CN111930852A (en) * | 2020-09-29 | 2020-11-13 | 北京百度网讯科技有限公司 | Data processing method, device and equipment based on block chain and storage medium |
Non-Patent Citations (1)
Title |
---|
区块链在广电的安全应用研究;冯晴;薛静宜;吴钟乐;宫良;;广播与电视技术(04);全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN112532395A (en) | 2021-03-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11973750B2 (en) | Federated identity management with decentralized computing platforms | |
Qi et al. | Cpds: Enabling compressed and private data sharing for industrial Internet of Things over blockchain | |
Vangala et al. | Blockchain-enabled authenticated key agreement scheme for mobile vehicles-assisted precision agricultural IoT networks | |
Dehalwar et al. | Blockchain-based trust management and authentication of devices in smart grid | |
CN101674304A (en) | Network identity authentication system and method | |
CN113515756B (en) | High-credibility digital identity management method and system based on block chain | |
Fan et al. | Identity Management Security Authentication Based on Blockchain Technologies. | |
CN117313122A (en) | Data sharing and exchanging management system based on block chain | |
CN114357492A (en) | Medical data privacy fusion method and device based on block chain | |
Marian et al. | Experimenting with digital signatures over a DNP3 protocol in a multitenant cloud-based SCADA architecture | |
Qiang et al. | Mine consortium blockchain: the application research of coal mine safety production based on blockchain | |
Zhao et al. | TrustCA: achieving certificate transparency through smart contract in blockchain platforms | |
CN112532395B (en) | Block chain-based data credit system, method and medium | |
Gao et al. | BFR‐SE: A Blockchain‐Based Fair and Reliable Searchable Encryption Scheme for IoT with Fine‐Grained Access Control in Cloud Environment | |
CN113205345A (en) | Agricultural product certificate tracing system based on Ether house block chain technology and tracing method thereof | |
CN113792301A (en) | Block chain-based Internet of things data access method and device | |
US20100030805A1 (en) | Propagating information from a trust chain processing | |
Duan et al. | An edge cloud data integrity protection scheme based on Blockchain | |
CN116684160A (en) | Public service litigation data security sharing and privacy protecting method and system | |
Cheng et al. | Ocean data sharing based on blockchain | |
Wang et al. | A User‐Centered Medical Data Sharing Scheme for Privacy‐Preserving Machine Learning | |
Lu et al. | Secure and Real Time Traceable Data Sharing in Cloud-Assisted IoT | |
Chen et al. | Cloud service platform of electronic identity in cyberspace | |
Dong et al. | ETSB: energy trading system based on blockchain | |
Gu et al. | IoT security and new trends of solutions |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |