CN113591137B - Block chain-based management method and device - Google Patents

Block chain-based management method and device Download PDF

Info

Publication number
CN113591137B
CN113591137B CN202111154205.1A CN202111154205A CN113591137B CN 113591137 B CN113591137 B CN 113591137B CN 202111154205 A CN202111154205 A CN 202111154205A CN 113591137 B CN113591137 B CN 113591137B
Authority
CN
China
Prior art keywords
user equipment
data
monitored data
sending
label
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202111154205.1A
Other languages
Chinese (zh)
Other versions
CN113591137A (en
Inventor
叶东俊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Spacetime Cloud Technology Co ltd
Original Assignee
Shenzhen Spacetime Cloud Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Spacetime Cloud Technology Co ltd filed Critical Shenzhen Spacetime Cloud Technology Co ltd
Priority to CN202111154205.1A priority Critical patent/CN113591137B/en
Publication of CN113591137A publication Critical patent/CN113591137A/en
Application granted granted Critical
Publication of CN113591137B publication Critical patent/CN113591137B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6227Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Automation & Control Theory (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides a management method and a device based on a block chain, which relate to a distributed storage technology, and can realize the storage of monitored data of user equipment by responding to label requests of the user equipment and a collection point, sending a first identity label to the user equipment, sending a second identity label to the collection point, receiving monitored data of each user equipment obtained by each collection point according to each node, performing link storage on the monitored data, wherein the monitored data comprises summary data and detailed data, if the monitored data is in an abnormal state, sending the summary data and an access private key to the user equipment based on the first identity label, receiving a query request sent by the user equipment, and sending the detailed data corresponding to the first identity label and the access private key to the user equipment, the user data is subjected to decentralized management, meanwhile, the data can be prevented from being tampered and stolen, and the safety of the user data is improved.

Description

Block chain-based management method and device
Technical Field
The present invention relates to distributed storage technologies, and in particular, to a management method and apparatus based on a block chain.
Background
In order to effectively supervise user behaviors, monitoring equipment is arranged in the prior art to collect the user behaviors, so that constraints are generated on users.
However, the current user behavior data are all stored in a server at a management end in a centralized manner for centralized management, and once the server is attacked, huge user data can be stolen or lost, so that the security is low.
Disclosure of Invention
The embodiment of the invention provides a management method and a management device based on a block chain, which can improve the safety of user data and can realize information butt joint with user equipment.
In a first aspect of the embodiments of the present invention, a management method based on a block chain is provided, including:
responding to label requests of user equipment and an acquisition point, sending a first identity label to the user equipment, and sending a second identity label to the acquisition point, wherein the user equipment corresponds to the first identity label one by one, and the acquisition point corresponds to the second identity label one by one;
receiving monitored data of each user equipment acquired by each acquisition point according to each node, and performing link storage on the monitored data, wherein the monitored data is read by an access private key obtained by encrypting the second identity tag, and the monitored data comprises summary data and detailed data;
if the monitored data is in an abnormal state, the summary data and the access private key are sent to the user equipment based on the first identity label;
and receiving a query request sent by the user equipment, and sending the detailed data corresponding to the first identity tag and the access private key to the user equipment.
Optionally, in a possible implementation manner of the first aspect, the method further includes:
and receiving the complaint information of the user equipment, and performing link storage on the complaint information.
Optionally, in a possible implementation manner of the first aspect, after the storing the complaint information in a linked manner, the method further includes:
forwarding the complaint information to a down-link verification node for verification processing to generate a verification result;
and performing link storage on the verification result.
Optionally, in a possible implementation manner of the first aspect, before sending, to the user equipment, the summary data and the access private key based on the first identity tag if the monitored data is in an abnormal state, the method further includes:
and determining that the monitored data is in an abnormal state based on the nodes in a preset period.
Optionally, in a possible implementation manner of the first aspect, after determining that the monitored data is in an abnormal state based on the node, the method further includes:
the monitored data is forwarded to a public trust organization for verification processing, and a public trust result is generated;
and if the trust result is true, determining the node as a trusted node.
Optionally, in a possible implementation manner of the first aspect, sending the digest data and the access private key to the user equipment based on the first identity tag includes:
and according to the trusted node, sending the summary data and the access private key to the user equipment based on the first identity label.
Optionally, in a possible implementation manner of the first aspect, the method further includes:
counting the times of each user equipment in an abnormal state, and generating evaluation information of each user equipment based on the times;
and performing link storage on the evaluation information.
Optionally, in a possible implementation manner of the first aspect, before receiving, according to each node, monitored data of each user equipment acquired by each acquisition point, the method further includes:
and acquiring monitored data of each user equipment according to the snapshot camera arranged at the acquisition point.
In a second aspect of the embodiments of the present invention, a management apparatus based on a block chain is provided, including:
the system comprises a label module, a label module and a data acquisition module, wherein the label module is used for responding to label requests of user equipment and an acquisition point, sending a first identity label to the user equipment and sending a second identity label to the acquisition point, the user equipment corresponds to the first identity label one by one, and the acquisition point corresponds to the second identity label one by one;
the acquisition module is used for receiving monitored data of each user equipment acquired by each acquisition point according to each node and performing link storage on the monitored data, wherein the monitored data is read by an access private key obtained by encrypting the second identity tag, and the monitored data comprises summary data and detailed data;
the judging module is used for sending the summary data and the access private key to the user equipment based on the first identity label if the monitored data is in an abnormal state;
and the query module is used for receiving a query request sent by the user equipment and sending the detailed data corresponding to the first identity label and the access private key to the user equipment.
In a third aspect of the embodiments of the present invention, a management device based on a block chain is provided, including: memory, a processor and a computer program, the computer program being stored in the memory, the processor running the computer program to perform the method of the first aspect of the invention as well as various possible aspects of the first aspect.
A fourth aspect of the embodiments of the present invention provides a readable storage medium, in which a computer program is stored, the computer program being, when executed by a processor, configured to implement the method according to the first aspect of the present invention and various possible aspects of the first aspect.
The block chain-based management method and device provided by the invention can realize the storage of monitored data of user equipment, perform decentralized management on the user data, prevent the data from being falsified and stolen, improve the safety of the user data, and in addition, can also send the monitored data in an abnormal state to a user or receive query information of the user and send the monitored data to the user to realize information butt joint with the user equipment.
Drawings
Fig. 1 is a schematic flowchart of a block chain-based management method according to an embodiment of the present invention;
fig. 2 is a schematic structural diagram of each node according to an embodiment of the present invention;
fig. 3 is a schematic structural diagram of a management apparatus based on a block chain according to an embodiment of the present invention;
fig. 4 is a schematic hardware structure diagram of a management device based on a block chain according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1, which is a flowchart illustrating a block chain based management method according to an embodiment of the present invention, an execution subject of the method shown in fig. 1 may be a software and/or hardware device. The execution subject of the present application may include, but is not limited to, at least one of: user equipment, network equipment, etc. The user equipment may include, but is not limited to, a computer, a smart phone, a Personal Digital Assistant (PDA), the above mentioned electronic equipment, and the like. The network device may include, but is not limited to, a single network server, a server group of multiple network servers, or a cloud of numerous computers or network servers based on cloud computing, wherein cloud computing is one type of distributed computing, a super virtual computer consisting of a cluster of loosely coupled computers. The present embodiment does not limit this. The method comprises the following steps of S101 to S104:
s101, responding to a label request of user equipment and an acquisition point, sending a first identity label to the user equipment, and sending a second identity label to the acquisition point, wherein the user equipment corresponds to the first identity label one to one, and the acquisition point corresponds to the second identity label one to one.
Specifically, in order to implement one-to-one storage of user data, the user equipment needs to be tagged, a different first identity tag is allocated to each user equipment, and the first identity tag is carried by subsequent information related to the user equipment, so that accurate correspondence of data is facilitated. In the same way, in order to realize the distinction of the acquisition points, the acquisition points are labeled, and different second identity labels are distributed to each acquisition point.
In practical application, the user device may be, for example, a personal device, specifically, a vehicle, and the first identity tag may be, for example, unique tag information such as a license plate number of the user device; the collection point may be, for example, a collection device of the road segment, and the second identity tag may be, for example, tag information having uniqueness such as a number of the collection point.
And S102, receiving monitored data of each user equipment acquired by each acquisition point according to each node, and performing link storage on the monitored data, wherein the monitored data is read by an access private key obtained by encrypting the second identity tag, and the monitored data comprises summary data and detailed data.
Specifically, referring to fig. 2, in the present solution, each node of the block chain is used to link and store the monitored data acquired by the acquisition point, it can be understood that the monitored data includes a second identity tag corresponding to the acquisition point, and in this embodiment, an access private key for reading the monitored data can be formed by using the second identity tag, so as to ensure the security of the data. It should be noted that, in the present solution, each node of the block chain is used to perform distributed storage on the user data, and decentralized management is performed, so that the user data is difficult to tamper and steal.
S103, if the monitored data is in an abnormal state, the summary data and the access private key are sent to the user equipment based on the first identity label.
Specifically, the monitored data may be in a normal state or an abnormal state, for example, the vehicle may be in an abnormal state, for example, the vehicle may overspeed or run a red light, that is, the vehicle is in an illegal state, and then the monitored data may be sent to the user equipment for prompting.
S104, receiving the query request sent by the user equipment, and sending the detailed data corresponding to the first identity label and the access private key to the user equipment.
In practical applications, the monitored data may be, for example, monitored data acquired by the capturing camera at the acquisition point for each user equipment, and may be, for example, picture data and interpretation data for the picture data.
The picture data may be detailed data, for example, and the interpretation data may be summary data, for example, for targeted transmission to the user. For example, the user may be reminded using summary data and instructed in detail using detailed data.
It can be understood that the monitored data is divided into summary data and detailed data, and at the beginning, the summary data only needs to be sent to the user, so that the data volume of the monitored data in the abnormal state transmitted by the node to the user equipment can be reduced, and the detailed data only needs to be sent to the user after the query information of the user is received, so that the data processing capacity is reduced, and the processing efficiency and the data throughput are improved.
In some embodiments, in order to maintain the user's rights and interests, the block chain-based management method further includes receiving complaint information of the user equipment, and performing link storage on the complaint information. Namely, if the user feels that the circulation information is wrong, the complaint information can be uploaded to the block chain.
In other embodiments, after the complaint information is stored in a link, the complaint information may be forwarded to a down-link verification node for verification, a verification result is generated, and the verification result is stored in a link. The complaint information can be verified through the down-link verification node, and meanwhile, the verification result is uploaded to indicate the authenticity of the complaint information.
On the basis of the above embodiment, before sending the summary data and the access private key to the user equipment based on the first identity tag if the monitored data is in an abnormal state, it is further determined that the monitored data is in an abnormal state based on a node in a preset period.
It can be understood that, because the amount of the user data is large, some of the streaming information may not need to be processed immediately, that is, the streaming information is not necessarily processed immediately.
On the basis of the above embodiment, after determining that the monitored data is in an abnormal state based on the node, the method may further include forwarding the monitored data to a trust authority for verification processing, generating a trust result, and if the trust result is true, determining the node as a trusted node.
It can be understood that, because the monitored data in the abnormal state may seriously affect the rights and interests of the user, the embodiment verifies the monitored data in the abnormal state by using the trust authority, and obtains the trust result, which may be true or false.
It should be noted that, when the result of the public trust is true, it indicates that the reliability of the node is high, and then the node can be used as a trusted node, and it can be understood that as the number of times of verification increases, a plurality of trusted nodes can be gradually screened out, and subsequently, data can be processed by using the trusted nodes, so that the reliability of the scheme is improved.
For example, the digest data and the access private key are sent to the user equipment based on the first identity tag, and the digest data and the access private key are sent to the user equipment based on the first identity tag according to the trusted node. It can be understood that the trusted nodes are used for processing data, and the reliability and the safety of data processing are improved.
In practical application, monitored data of one user equipment may have abnormal states for many times, and in order to further supervise a user, the times of abnormal states of each user equipment may be counted, evaluation information of each user equipment is generated based on the times, and the evaluation information is stored in a link manner. The evaluation information may be subsequently sent to other management terminals in the related field as a limitation to the user, taking the vehicle law violation as an example, for example, the evaluation information may be forwarded to a car rental system to form a supervision on the user equipment.
Referring to fig. 3, which is a schematic structural diagram of a management apparatus based on a block chain according to an embodiment of the present invention, the management apparatus based on a block chain includes:
the system comprises a label module, a label module and a data acquisition module, wherein the label module is used for responding to label requests of user equipment and an acquisition point, sending a first identity label to the user equipment and sending a second identity label to the acquisition point, the user equipment corresponds to the first identity label one by one, and the acquisition point corresponds to the second identity label one by one;
the acquisition module is used for receiving monitored data of each user equipment acquired by each acquisition point according to each node and performing link storage on the monitored data, wherein the monitored data is read by an access private key obtained by encrypting the second identity tag, and the monitored data comprises summary data and detailed data;
the judging module is used for sending the summary data and the access private key to the user equipment based on the first identity label if the monitored data is in an abnormal state;
and the query module is used for receiving a query request sent by the user equipment and sending the detailed data corresponding to the first identity label and the access private key to the user equipment.
The apparatus in the embodiment shown in fig. 3 can be correspondingly used to perform the steps in the method embodiment shown in fig. 1, and the implementation principle and technical effect are similar, which are not described herein again.
Referring to fig. 4, which is a schematic diagram of a hardware structure of a management device based on a block chain according to an embodiment of the present invention, the management device 40 based on a block chain includes: a processor 41, memory 42 and computer programs; wherein
A memory 42 for storing the computer program, which may also be a flash memory (flash). The computer program is, for example, an application program, a functional module, or the like that implements the above method.
A processor 41 for executing the computer program stored in the memory to implement the steps performed by the apparatus in the above method. Reference may be made in particular to the description relating to the preceding method embodiment.
Alternatively, the memory 42 may be separate or integrated with the processor 41.
When the memory 42 is a device independent of the processor 41, the apparatus may further include:
a bus 43 for connecting the memory 42 and the processor 41.
The present invention also provides a readable storage medium, in which a computer program is stored, which, when being executed by a processor, is adapted to implement the methods provided by the various embodiments described above.
The readable storage medium may be a computer storage medium or a communication medium. Communication media includes any medium that facilitates transfer of a computer program from one place to another. Computer storage media may be any available media that can be accessed by a general purpose or special purpose computer. For example, a readable storage medium is coupled to the processor such that the processor can read information from, and write information to, the readable storage medium. Of course, the readable storage medium may also be an integral part of the processor. The processor and the readable storage medium may reside in an Application Specific Integrated Circuits (ASIC). Additionally, the ASIC may reside in user equipment. Of course, the processor and the readable storage medium may also reside as discrete components in a communication device. The readable storage medium may be a read-only memory (ROM), a random-access memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, an optical data storage device, and the like.
The present invention also provides a program product comprising execution instructions stored in a readable storage medium. The at least one processor of the device may read the execution instructions from the readable storage medium, and the execution of the execution instructions by the at least one processor causes the device to implement the methods provided by the various embodiments described above.
In the above embodiments of the apparatus, it should be understood that the Processor may be a Central Processing Unit (CPU), other general purpose processors, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), etc. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of a method disclosed in connection with the present invention may be embodied directly in a hardware processor, or in a combination of the hardware and software modules within the processor.
Finally, it should be noted that: the above embodiments are only used to illustrate the technical solution of the present invention, and not to limit the same; while the invention has been described in detail and with reference to the foregoing embodiments, it will be understood by those skilled in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some or all of the technical features may be equivalently replaced; and the modifications or the substitutions do not make the essence of the corresponding technical solutions depart from the scope of the technical solutions of the embodiments of the present invention.

Claims (7)

1. A block chain-based management method is characterized by comprising the following steps:
responding to label requests of user equipment and an acquisition point, sending a first identity label to the user equipment, and sending a second identity label to the acquisition point, wherein the user equipment corresponds to the first identity label one by one, and the acquisition point corresponds to the second identity label one by one;
receiving monitored data of each user equipment acquired by each acquisition point according to each node, and performing link storage on the monitored data, wherein the monitored data is read by an access private key obtained by encrypting the second identity tag, and the monitored data comprises summary data and detailed data;
if the monitored data is in an abnormal state, the summary data and the access private key are sent to the user equipment based on the first identity label;
receiving a query request sent by the user equipment, and sending the detailed data corresponding to the first identity tag and the access private key to the user equipment;
before sending the summary data and the access private key to the user equipment based on the first identity tag if the monitored data is in an abnormal state, the method further includes:
determining that the monitored data is in an abnormal state based on the nodes in a preset period;
after determining that the monitored data is in an abnormal state based on the node, the method further comprises:
the monitored data is forwarded to a public trust organization for verification processing, and a public trust result is generated;
if the result of the public trust is true, determining the node as a trusted node;
sending the summary data and the access private key to the user equipment based on the first identity tag, including:
and according to the trusted node, sending the summary data and the access private key to the user equipment based on the first identity label.
2. The method of claim 1, further comprising:
and receiving the complaint information of the user equipment, and performing link storage on the complaint information.
3. The method of claim 2, further comprising, after storing the complaint information in a linked manner:
forwarding the complaint information to a down-link verification node for verification processing to generate a verification result;
and performing link storage on the verification result.
4. The method of claim 1, further comprising:
counting the times of each user equipment in an abnormal state, and generating evaluation information of each user equipment based on the times;
and performing link storage on the evaluation information.
5. The method of claim 1, prior to receiving, according to each node, the monitored data of each of the user equipments obtained by each of the collection points, further comprising:
and acquiring monitored data of each user equipment according to the snapshot camera arranged at the acquisition point.
6. A blockchain-based management apparatus, comprising:
the system comprises a label module, a label module and a data acquisition module, wherein the label module is used for responding to label requests of user equipment and an acquisition point, sending a first identity label to the user equipment and sending a second identity label to the acquisition point, the user equipment corresponds to the first identity label one by one, and the acquisition point corresponds to the second identity label one by one;
the acquisition module is used for receiving monitored data of each user equipment acquired by each acquisition point according to each node and performing link storage on the monitored data, wherein the monitored data is read by an access private key obtained by encrypting the second identity tag, and the monitored data comprises summary data and detailed data;
the judging module is used for sending the summary data and the access private key to the user equipment based on the first identity label if the monitored data is in an abnormal state;
the query module is used for receiving a query request sent by the user equipment and sending the detailed data corresponding to the first identity label and the access private key to the user equipment;
before sending the summary data and the access private key to the user equipment based on the first identity tag if the monitored data is in an abnormal state, the method further includes:
determining that the monitored data is in an abnormal state based on the nodes in a preset period;
after determining that the monitored data is in an abnormal state based on the node, the method further comprises:
the monitored data is forwarded to a public trust organization for verification processing, and a public trust result is generated;
if the result of the public trust is true, determining the node as a trusted node;
sending the summary data and the access private key to the user equipment based on the first identity tag, including:
and according to the trusted node, sending the summary data and the access private key to the user equipment based on the first identity label.
7. A computer-readable storage medium, in which a computer program is stored which, when being executed by a processor, is adapted to carry out the method of any one of claims 1 to 5.
CN202111154205.1A 2021-09-29 2021-09-29 Block chain-based management method and device Active CN113591137B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111154205.1A CN113591137B (en) 2021-09-29 2021-09-29 Block chain-based management method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111154205.1A CN113591137B (en) 2021-09-29 2021-09-29 Block chain-based management method and device

Publications (2)

Publication Number Publication Date
CN113591137A CN113591137A (en) 2021-11-02
CN113591137B true CN113591137B (en) 2022-01-25

Family

ID=78242751

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111154205.1A Active CN113591137B (en) 2021-09-29 2021-09-29 Block chain-based management method and device

Country Status (1)

Country Link
CN (1) CN113591137B (en)

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107870983A (en) * 2017-09-30 2018-04-03 深圳市易成自动驾驶技术有限公司 Vehicle peccancy approaches to IM, block chain and storage medium based on block chain
CN108573388A (en) * 2018-05-08 2018-09-25 广州大学 Information of vehicles processing system and method based on block chain
CN109118765A (en) * 2018-09-04 2019-01-01 京东方科技集团股份有限公司 Break in traffic rules and regulations recording method and device based on block chain
CN109325751A (en) * 2018-09-30 2019-02-12 深圳市元征科技股份有限公司 A kind of vehicle violation method for monitoring and relevant device based on block chain technology
CN109726212A (en) * 2018-12-29 2019-05-07 杭州宏杉科技股份有限公司 Data-storage system and method
CN109801500A (en) * 2019-02-19 2019-05-24 中国科学院自动化研究所 Vehicle violation lane change based on block chain detects recording method, system, device
WO2019205955A1 (en) * 2018-04-24 2019-10-31 深圳市轱辘汽车维修技术有限公司 Vehicle-related information processing method based on blockchain and device thereof
CN110491131A (en) * 2018-07-18 2019-11-22 江苏恒宝智能***技术有限公司 A kind of vehicle violation management system based on block chain
CN110599774A (en) * 2019-08-23 2019-12-20 绍兴文理学院 Traffic violation processing method and system based on block chain
CN110706371A (en) * 2019-10-17 2020-01-17 腾讯科技(深圳)有限公司 Block chain-based driving safety management method, system and storage medium
KR102081777B1 (en) * 2019-05-15 2020-02-27 (주)아이엠시티 How to manage traffic violation penalties using block chains
CN110874738A (en) * 2018-09-02 2020-03-10 许先学 Method and device for collecting and processing traffic violation information of intelligent traffic control and intelligent traffic control

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105632182B (en) * 2016-01-27 2018-10-26 福建工程学院 A kind of method and its system that rule-breaking vehicle behavior is put to the proof
US10896601B2 (en) * 2016-09-21 2021-01-19 Drive Safe Enforcement, Llc Mobile traffic violation detection, recording and evidence processing system
US10692367B2 (en) * 2016-12-19 2020-06-23 ThruGreen, LLC Connected and adaptive vehicle traffic management system with digital prioritization
US11531661B2 (en) * 2018-03-27 2022-12-20 International Business Machines Corporation Vehicle incident documentation for blockchain
CN110060484B (en) * 2019-05-16 2021-10-22 武汉理工大学 Road passenger traffic violation real-time early warning system and method based on block chain
CN110427432A (en) * 2019-08-08 2019-11-08 英华达(上海)科技有限公司 Violation event processing method, system, equipment and storage medium based on block chain
CN110569643A (en) * 2019-09-10 2019-12-13 腾讯科技(深圳)有限公司 traffic management method and device based on block chain network
CN111050317B (en) * 2019-12-07 2022-08-02 江西理工大学 Intelligent traffic data safety sharing method based on alliance block chain

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107870983A (en) * 2017-09-30 2018-04-03 深圳市易成自动驾驶技术有限公司 Vehicle peccancy approaches to IM, block chain and storage medium based on block chain
WO2019205955A1 (en) * 2018-04-24 2019-10-31 深圳市轱辘汽车维修技术有限公司 Vehicle-related information processing method based on blockchain and device thereof
CN108573388A (en) * 2018-05-08 2018-09-25 广州大学 Information of vehicles processing system and method based on block chain
CN110491131A (en) * 2018-07-18 2019-11-22 江苏恒宝智能***技术有限公司 A kind of vehicle violation management system based on block chain
CN110874738A (en) * 2018-09-02 2020-03-10 许先学 Method and device for collecting and processing traffic violation information of intelligent traffic control and intelligent traffic control
CN109118765A (en) * 2018-09-04 2019-01-01 京东方科技集团股份有限公司 Break in traffic rules and regulations recording method and device based on block chain
CN109325751A (en) * 2018-09-30 2019-02-12 深圳市元征科技股份有限公司 A kind of vehicle violation method for monitoring and relevant device based on block chain technology
CN109726212A (en) * 2018-12-29 2019-05-07 杭州宏杉科技股份有限公司 Data-storage system and method
CN109801500A (en) * 2019-02-19 2019-05-24 中国科学院自动化研究所 Vehicle violation lane change based on block chain detects recording method, system, device
KR102081777B1 (en) * 2019-05-15 2020-02-27 (주)아이엠시티 How to manage traffic violation penalties using block chains
CN110599774A (en) * 2019-08-23 2019-12-20 绍兴文理学院 Traffic violation processing method and system based on block chain
CN110706371A (en) * 2019-10-17 2020-01-17 腾讯科技(深圳)有限公司 Block chain-based driving safety management method, system and storage medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
区块链技术在汽车行业的应用;苏松 等;《装备制造技术》;20210531(第5期);132-136 *

Also Published As

Publication number Publication date
CN113591137A (en) 2021-11-02

Similar Documents

Publication Publication Date Title
CN111901327B (en) Cloud network vulnerability mining method and device, electronic equipment and medium
CN110268406B (en) Password security
CN111885050B (en) Data storage method and device based on block chain network, related equipment and medium
CN113111359A (en) Big data resource sharing method and resource sharing system based on information security
CN110659441A (en) Information release management method and device based on block chain
CN114268508A (en) Internet of things equipment secure access method, device, equipment and medium
CN113505260A (en) Face recognition method and device, computer readable medium and electronic equipment
CN111475778A (en) Music data processing method and device based on block chain
CN114547701A (en) Block chain-based tamper-proof identification chip information trusted storage system
CN114416490A (en) Monitoring alarm method and device based on block chain, electronic equipment and storage medium
CN113162971B (en) Block link point management method, device, computer and readable storage medium
CN113591137B (en) Block chain-based management method and device
CN114697132B (en) Method, device, equipment and storage medium for intercepting repeated access request attack
CN113938496B (en) Block chain network method and system based on Internet of things equipment
CN110597557B (en) System information acquisition method, terminal and medium
Pan et al. TrajGuard: a comprehensive trajectory copyright protection scheme
CN114065301A (en) Clock environment credibility verification method, device, equipment and storage medium
CN113806443A (en) Trusted data storage method, system, medium, equipment and terminal
CN113949508B (en) Process data processing method and device based on random number consensus mechanism
CN117421782B (en) File signature, integrity detection and tracking method and device
CN116915500B (en) Security detection method and system for access equipment
CN110209727B (en) Data storage method, terminal equipment and medium
CN113556405B (en) Distributed management method and device for private information
CN111314266B (en) Traffic fraud detection method and device, electronic equipment and storage medium
CN114780986B (en) Authentication data processing method and device, electronic equipment and medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant