CN115544154A - Coal mine safety supervision method and device based on block chain and electronic equipment - Google Patents

Coal mine safety supervision method and device based on block chain and electronic equipment Download PDF

Info

Publication number
CN115544154A
CN115544154A CN202211529348.0A CN202211529348A CN115544154A CN 115544154 A CN115544154 A CN 115544154A CN 202211529348 A CN202211529348 A CN 202211529348A CN 115544154 A CN115544154 A CN 115544154A
Authority
CN
China
Prior art keywords
supervision
data
role
safety
supervised
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211529348.0A
Other languages
Chinese (zh)
Inventor
张德胜
马建
张子良
丰颖
黄增波
魏峰
赵墨波
许伟健
王正
吴东
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
CCTEG China Coal Research Institute
Original Assignee
CCTEG China Coal Research Institute
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by CCTEG China Coal Research Institute filed Critical CCTEG China Coal Research Institute
Priority to CN202211529348.0A priority Critical patent/CN115544154A/en
Publication of CN115544154A publication Critical patent/CN115544154A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/25Integrating or interfacing systems involving database management systems
    • G06F16/252Integrating or interfacing systems involving database management systems between a Database Management System and a front-end application
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Data Mining & Analysis (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Computing Systems (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The application provides a coal mine safety supervision method, a device and electronic equipment based on a block chain, wherein the method comprises the following steps: acquiring supervision data uploaded to a blockchain network by a supervision role and operation data uploaded to the blockchain network by a supervised role so as to acquire a safety supervision database in the blockchain network; acquiring target safety supervision data of a supervised role from a safety supervision database; and responding to the fact that the monitored role has safety abnormity according to the target safety monitoring data, acquiring safety abnormity information and sending out a safety abnormity alarm through the block chain network. In the application, the safety supervision of the supervised role is realized, the information island phenomenon between the data of a plurality of supervised roles and the data of the supervised role is avoided, the sharing of the operation data of the supervised role and the supervised role is realized, the labor cost for carrying out safety supervision on the supervised role is saved, and the timeliness and the efficiency of safety supervision are improved.

Description

Coal mine safety supervision method and device based on block chain and electronic equipment
Technical Field
The application relates to the field of data processing, in particular to a coal mine safety supervision method and device based on a block chain and electronic equipment.
Background
In the realization, carry out safety supervision to the colliery and can regard as one of the mode of guarantee coal mine safety operation, among the correlation technique, can monitor the colliery through different monitoring agencies, under this scene, the monitoring data of the colliery that different monitoring agencies gathered can be through artifical uploading and save in the law enforcement platform of each monitoring agency self, and then lead to having the phenomenon of data isolated island at the in-process of carrying out the supervision to the colliery, and is higher to artifical degree of dependence.
Disclosure of Invention
The present application aims to solve at least to some extent one of the technical problems of the above-mentioned technology.
The application provides a coal mine safety supervision method based on a block chain in a first aspect, and the method comprises the following steps: acquiring supervision data uploaded to a blockchain network by a supervision role and operation data uploaded to the blockchain network by a supervised role so as to acquire a safety supervision database in the blockchain network; acquiring target safety supervision data of the supervised role from the safety supervision database; and responding to the fact that the supervised role has safety abnormity according to the target safety supervision data, acquiring safety abnormity information and sending out a safety abnormity alarm through the block chain network.
The coal mine safety supervision method based on the block chain provided by the first aspect of the application further has the following technical characteristics, including:
according to an embodiment of the present application, the acquiring supervision data uploaded by each of a plurality of supervision roles in a blockchain network and job data uploaded by a supervised role in the blockchain network to acquire a security supervision database in the blockchain network includes: acquiring a first data block to which the supervision data uploaded by the supervision role belongs and a second data block to which the operation data uploaded by the supervised role belongs, and acquiring the security supervision database in the block chain network based on the first data block and the second data block.
According to an embodiment of the present application, the obtaining target security supervision data of a supervised role from the security supervision database includes: acquiring a supervision data access request of the security supervision database, and identifying an associated data block of the supervised role from candidate data blocks in the security supervision database based on the supervision data access request; and acquiring the target safety supervision data of the supervised role from the associated data block.
According to an embodiment of the present application, the obtaining the target security supervision data of the supervised role from the associated data block includes: based on the verification information in the target block header of the associated data block, performing security verification on a sender of the supervision data access request; and responding to the security verification of the target block header by a sender of the supervision data access request, and acquiring the target security supervision data from the target block of the associated data block.
According to an embodiment of the present application, the performing security authentication on the sender of the supervision data access request based on authentication information in a target block header of the associated data block includes: acquiring identity information of a sender of the supervision data access request, and identifying whether the identity information is normal or not based on the verification information; and in response to the identity information indicating that the sender of the supervision data access request is the supervision role, determining that the sender of the supervision data access request passes security verification.
According to an embodiment of the present application, the acquiring, by the sender responding to the supervision data access request through the security verification of the target block header, the target security supervision data from the target block of the associated data block includes: and acquiring candidate safety supervision data in the target area block, and encrypting the candidate safety supervision data to obtain the target safety supervision data.
According to one embodiment of the application, the supervisory role comprises at least one of a coal mine monitoring organization and a social monitoring organization; the supervised role comprises at least one of a coal mine construction mechanism and a coal mine constructor.
According to an embodiment of the application, the method further comprises: responding to the supervision role to identify that the supervised role has violation behaviors, acquiring violation information of the violation supervised role, and generating violation contracts of the violation supervised role based on the violation information; and uploading the violation information to the blockchain network for publicity, and sending the violation contract to the violation supervised role.
This application second aspect provides a colliery safety supervision device based on block chain, includes: the system comprises a first acquisition module, a second acquisition module and a third acquisition module, wherein the first acquisition module is used for acquiring supervision data uploaded to a blockchain network by a supervision role and operation data uploaded to the blockchain network by a supervised role so as to acquire a safety supervision database in the blockchain network; the second acquisition module is used for acquiring target safety supervision data of the supervised role from the safety supervision database; and the supervision module is used for responding to the situation that the supervised role has safety abnormity according to the target safety supervision data, acquiring safety abnormity information and sending out a safety abnormity alarm through the block chain network.
The coal mine safety supervision device based on the block chain that this application second aspect provided still possesses following technical feature, includes:
according to an embodiment of the present application, the second obtaining module is further configured to: acquiring a first data block to which the supervision data uploaded by the supervision role belongs and a second data block to which the operation data uploaded by the supervised role belongs, and acquiring the security supervision database in the block chain network based on the first data block and the second data block.
According to an embodiment of the present application, the second obtaining module is further configured to: acquiring a supervision data access request of the security supervision database, and identifying an associated data block of the supervised role from candidate data blocks in the security supervision database based on the supervision data access request; and acquiring the target safety supervision data of the supervised role from the associated data block.
According to an embodiment of the present application, the second obtaining module is further configured to: based on the verification information in the target block header of the associated data block, performing security verification on a sender of the supervision data access request; and responding to the security verification of the target block header by a sender of the supervision data access request, and acquiring the target security supervision data from the target block of the associated data block.
According to an embodiment of the present application, the second obtaining module is further configured to: acquiring identity information of a sender of the supervision data access request, and identifying whether the identity information is normal or not based on the verification information; and in response to the identity information indicating that the sender of the supervision data access request is the supervision role, determining that the sender of the supervision data access request passes security verification.
According to an embodiment of the present application, the second obtaining module is further configured to: and acquiring candidate safety supervision data in the target area block, and encrypting the candidate safety supervision data to obtain the target safety supervision data.
According to one embodiment of the application, the supervisory role comprises at least one of a coal mine monitoring organization and a social monitoring organization; the supervised role comprises at least one of a coal mine construction mechanism and a coal mine constructor.
According to an embodiment of the present application, the supervision module is further configured to: responding to the supervision role to identify that the supervised role has violation behaviors, acquiring violation information of the violation supervised role, and generating violation contracts of the violation supervised role based on the violation information; and uploading the violation information to the blockchain network for publicity, and sending the violation contract to the violation supervised role.
An embodiment of a third aspect of the present application provides an electronic device, including: at least one processor; and a memory communicatively coupled to the at least one processor; wherein the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the block chain based coal mine safety supervision method provided in the first aspect of the present application.
A fourth aspect of the present application provides a non-transitory computer-readable storage medium storing computer instructions for causing a computer to execute the method for block chain-based coal mine safety supervision provided in the first aspect of the present application.
In an embodiment of the fifth aspect of the present application, a computer program product is provided, and when an instruction processor in the computer program product executes, the method for monitoring and managing coal mine safety based on a blockchain provided in the first aspect of the present application is executed.
The application provides a block chain-based coal mine safety supervision method and device, which are used for acquiring supervision data uploaded to a block chain network by a supervision role and operation data uploaded to the block chain network by a supervised role, so that safety supervision data in the block chain network are acquired, target safety supervision data of the supervised role are acquired from the safety supervision data, whether the supervised role is abnormal or not is identified based on the target safety supervision data, and when the supervised role is identified to be abnormal, corresponding safety abnormal information is acquired and a safety abnormal alarm is sent based on the block chain network. In the application, based on the block chain network and a plurality of supervision roles and the data uploaded to the block chain network by the supervision roles, the safety supervision of the supervision roles on the supervised roles is realized, the information island phenomenon between the respective data of the supervision roles and the supervision roles is avoided, the sharing of the operation data of the supervised roles and the supervision roles is realized, the degree of dependence on manpower is reduced, the labor cost for carrying out safety supervision on the supervised roles is saved, and the timeliness and the efficiency of safety supervision are improved.
Additional aspects and advantages of the present application will be set forth in part in the description which follows and, in part, will be obvious from the description, or may be learned by practice of the present application.
Drawings
The foregoing and/or additional aspects and advantages of the present application will become apparent and readily appreciated from the following description of the embodiments, taken in conjunction with the accompanying drawings of which:
fig. 1 is a schematic flow chart of a block chain-based coal mine safety supervision method according to an embodiment of the present application;
fig. 2 is a schematic flow chart of a block chain-based coal mine safety supervision method according to another embodiment of the present application;
FIG. 3 is a diagram illustrating a data block according to an embodiment of the present application;
fig. 4 is a schematic flow chart of a block chain-based coal mine safety supervision method according to another embodiment of the present application;
fig. 5 is a schematic structural diagram of a block chain-based coal mine safety supervision apparatus according to an embodiment of the present application;
fig. 6 is a block diagram of an electronic device according to an embodiment of the present application.
Detailed Description
Reference will now be made in detail to the embodiments of the present application, examples of which are illustrated in the accompanying drawings, wherein like reference numerals refer to the same or similar elements or elements having the same or similar functions throughout. The embodiments described below with reference to the accompanying drawings are illustrative and intended to explain the present application and should not be construed as limiting the present application.
The block chain-based coal mine safety supervision method, device, electronic equipment and storage medium according to the embodiments of the present application are described below with reference to the accompanying drawings.
Fig. 1 is a schematic flowchart of a block chain-based coal mine safety supervision method according to an embodiment of the present application, and as shown in fig. 1, the method includes:
s101, acquiring supervision data uploaded to a block chain network by a supervision role and operation data uploaded to the block chain network by a supervised role so as to acquire a safety supervision database in the block chain network.
In the embodiment of the application, roles registered in the blockchain network can be divided into a monitoring role and a supervised role, wherein the supervised role can be a constructor working underground, such as a coal mining unit, or a unit performing other operations underground.
Accordingly, the supervisory role may be an entity and/or organization that supervises the constructor of the downhole operation as specified in the relevant laws.
Optionally, the supervising role and the supervised role may fill in their own attribute information in the blockchain network when performing registration in the blockchain network, so as to determine their roles in the blockchain network.
In the embodiment of the present application, after the supervision role and the supervised role are registered in the blockchain network, the data held by the supervision role and the supervised role can be uploaded to the blockchain network for sharing.
Optionally, the data uploaded by the supervising role to the blockchain network may be data generated by the supervised role in a supervised process, where the data generated by the supervising role in supervising the supervised role may be determined as the supervising data.
For example, a supervisor of a coal mine monitoring organization can carry a law enforcement terminal when entering a coal mine for monitoring, wherein the law enforcement terminal carried by the supervisor can collect relevant information of the coal mine and upload the collected data serving as supervision data of the coal mine monitoring organization to a block chain network.
Under the scene, the registered role of the coal mine in the block chain network is a supervised role, the role registered by the coal mine monitoring organization in the block chain network is a supervising role, and the coal mine monitoring organization acquires the coal mine related data from the law enforcement terminal carried by the monitoring personnel in the coal mine monitoring process, namely the coal mine monitoring organization serving as the supervising role and uploads the data to the block chain network.
For another example, when an operator performs downhole operation in a coal mine, the operator can record and upload related data such as an operation environment and an operation flow to the blockchain network based on related equipment, and in this scenario, a registered role of the operator in the blockchain network in the coal mine is a supervised role, and the registered role is uploaded to related data such as a downhole operation environment and an operation flow in the blockchain network, that is, operation data uploaded to the blockchain network by the supervised role.
S102, obtaining target safety supervision data of the supervised role from the safety supervision database.
In an implementation, data in the blockchain network may be stored in the blockchain network in a form of blocks, where job data uploaded by the supervised role may be stored in the corresponding block.
Optionally, the supervising role may identify whether there is a related security exception condition for the supervised role based on the job data uploaded by the supervised role and the supervision data uploaded by the supervising role when the supervising role supervises the supervised role.
For example, based on the above example, the supervisory personnel of the coal mine monitoring organization as the monitoring role can acquire and upload the supervisory data in the block chain network from the carried law enforcement terminal, and the operation data uploaded by the coal mine operator as the monitored role during the downhole operation, as the target safety monitoring data of the monitored role.
In the embodiment of the application, the monitoring role and the data uploaded to the blockchain network by the monitored role have corresponding acquisition and uploading time, in the scene, the relevant monitoring data and/or operation data of the monitored role can be acquired from the safety monitoring database based on a preset time range, and the acquired part of data is used as the target safety monitoring data acquired from the safety monitoring database.
Furthermore, the obtained target supervision safety data can be analyzed, and whether the supervised role has safety abnormity or not is identified according to the result of data analysis.
S103, responding to the situation that the monitored role has safety abnormity according to the target safety monitoring data, acquiring safety abnormity information and sending out a safety abnormity alarm through the block chain network.
In some implementations, the supervising role can perform security supervision on the supervised role according to the target supervision security data of the supervised data, and the supervised role can also perform self-check according to the target supervision security data related to the supervised role.
In this scenario, when it is recognized that the supervised character has a security anomaly, security anomaly information corresponding to the security anomaly of the supervised character may be obtained according to specific information carried in the obtained target supervision security data.
Further, in order to realize effective supervision of the supervised role, the warning information can be uploaded in the blockchain network based on the acquired safety exception information, so that safety exception warning of the supervised role is realized.
According to the block chain-based coal mine safety supervision method, supervision data uploaded to a block chain network by a supervision role and operation data uploaded to the block chain network by a supervised role are obtained, so that safety supervision data in the block chain network are obtained, target safety supervision data of the supervised role are obtained from the safety supervision data, whether the supervised role is abnormal or not is identified based on the target safety supervision data, and when the supervised role is identified to be abnormal in safety, corresponding safety abnormal information is obtained and a safety abnormal alarm is sent based on the block chain network. In the application, based on the block chain network and a plurality of supervision roles and the data uploaded to the block chain network by the supervision roles, the safety supervision of the supervision roles on the supervised roles is realized, the information island phenomenon between the respective data of the supervision roles and the supervision roles is avoided, the sharing of the operation data of the supervised roles and the supervision roles is realized, the degree of dependence on manpower is reduced, the labor cost for carrying out safety supervision on the supervised roles is saved, and the timeliness and the efficiency of safety supervision are improved.
In the foregoing embodiment, regarding whether a security exception exists in a supervised role according to target security supervision data, it can be further understood by referring to fig. 2, where fig. 2 is a schematic flow diagram of a block chain-based coal mine security supervision method according to another embodiment of the present application, and as shown in fig. 2, the method includes:
s201, a first data block to which the monitoring data uploaded by the monitoring role belongs and a second data block to which the operation data uploaded by the monitored role belongs are obtained, and a safety monitoring database in a block chain network is obtained based on the first data block and the second data block.
In the embodiment of the present application, roles registered in the blockchain network may be divided into a monitoring role and a supervised role, where the monitoring role includes at least one of a coal mine monitoring organization and a social monitoring organization.
Optionally, the coal mine monitoring organization may be a related organization that supervises the coal mine for a full time, and the social monitoring organization may include an organization that has a certain degree of association with the safety operation of the coal mine, such as a workshop, a scientific research unit, a media, and an insurance company.
Accordingly, the roles registered in the blockchain network further include a supervised role, wherein the supervised role includes at least one of a coal mine construction organization and a coal mine constructor.
Alternatively, the coal mine constructor can register in the blockchain network based on the supervised role, upload relevant operation data such as operation time, operation place and operation content to the blockchain network during operation, and associate the operation data with personal information thereof based on registration information thereof.
In this embodiment, the supervisory role may be uploaded to the data blocks stored in the supervisory data in the blockchain network and identified as the first data blocks, and correspondingly, the supervised role may be uploaded to the data blocks stored in the job data in the blockchain network and identified as the second data blocks.
Alternatively, the relationship between the data blocks in the security supervision database may be as shown in fig. 3, wherein a first data block storing the supervision data and/or a second data block storing the job data may be stored in a block chain network based on the structural relationship shown in fig. 3, wherein the block chain network may include a plurality of data blocks, such as block N-1, block N +1, block N +2, and the like shown in fig. 3.
As shown in fig. 3, the first data block and/or the second data block in the security supervision database may be divided into two parts, namely a block header and a block body.
In the embodiment of the application, the block header stores relevant information such as a hash value, a timestamp and the like, wherein the part of information can be dynamically updated along with operation traces of data stored in the block, and is synchronized to the block chain network.
It should be noted that, based on the update of the relevant information in the block header, the data in the block body corresponding to the block header can be made to have traceability.
Accordingly, the block body may store therein the supervisory data uploaded by the supervisory role, and/or the job data uploaded by the supervised role.
As shown in fig. 3, the data stored in the block in the block N is set as the supervision data uploaded by the supervision role, and the data stored in the block in the block N +1 is the job data uploaded by the supervised role.
As an example, the block of the block N may store the supervision data 1 acquired and uploaded by a law enforcement terminal owned by a coal mine supervision agency serving as a supervision role during coal mine supervision, and in this scenario, the supervision regulations set by the coal mine supervision agency for coal mine supervision and other relevant supervision information may also be synchronously uploaded to the block of the block.
As another example, the block of the block N +1 may store therein monitoring system data uploaded to the blockchain network as operation data from a coal mine serving as a supervised role, handling conditions of historical safety abnormalities of the coal mine, daily coal mine patrol data, and the like.
Further, based on all the first data chunks and all the second data chunks, a security supervision database for supervising the supervised role in the blockchain network may be obtained.
S202, a supervision data access request of the safety supervision database is obtained, and the associated data blocks of the supervised role are identified from the candidate data blocks in the safety supervision database based on the supervision data access request.
In the embodiment of the application, the safety supervision database can acquire the corresponding supervision data access request, acquire related data meeting the supervision data access request based on detailed information in the acquired supervision data access request, and transmit the part of data back to a sender of the supervision data access request as the safety supervision database.
Optionally, specific information carried by the monitoring data access request acquired by the security monitoring database may be acquired, and a data block satisfying the monitoring data access request is acquired from all candidate data blocks in the security monitoring database based on the part of the specific information.
The data stored in the data block can provide data support for identification of a security exception of the supervised character, and therefore, the data block can be identified as an associated data block of the supervised character.
S203, acquiring target safety supervision data of the supervised role from the associated data block.
In this embodiment, the block head of the associated data block may be identified as the target block head, and the block body in the associated data block may be identified as the target block body.
Optionally, the sender of the supervision data access request may be securely authenticated based on authentication information in a target block header of the associated data block.
In order to improve the security of the data stored in the associated data block, before the access of the associated data block is performed and the data stored in the target block thereof is acquired, the sender of the supervision data access request may be securely authenticated by the authentication information stored in the target block header.
The identity information of the sender of the supervision data access request can be acquired, and whether the identity information is normal or not can be identified based on the verification information.
In the implementation, when the sender of the supervision data access request registers in the blockchain network, the corresponding role of the sender in the blockchain network can be determined based on the basic information filled in the sender, in this scenario, the identity information of the sender of the supervision data access request in the blockchain network can be obtained, and whether the identity information is normal or not can be identified through the verification information.
Optionally, in response to the identity information indicating that the sender of the administrative data access request is in an administrative role, determining that the sender of the administrative data access request passes the security authentication.
It may be understood that, when the identity information indicates that the sender of the supervision data access request is a supervision role in the blockchain network, it may be determined that the sender currently sending the supervision data access request may obtain the security supervision data of the supervised role, and thus, it may be determined that the sender of the current supervision data access request passes the security verification.
Further, in response to the sender of the supervision data access request passing the security verification of the target block header, target security supervision data is acquired from the target block of the associated data block.
In the embodiment of the application, after it is determined that the sender of the supervision data access request passes the security verification of the target block header, the security supervision data stored in the target block of the associated data block can be acquired from the target block of the associated data block and is returned to the sender of the supervision data access request as the security supervision data.
In some implementations, the data stored by the target block volume may be encrypted, wherein candidate security supervision data in the target block volume may be obtained and encrypted to obtain the target security supervision data.
Optionally, the candidate security supervision data stored in the target block may be encrypted based on the verification information stored in the target block header, and the encrypted data may be determined as the target security supervision data.
It should be noted that, in the process of performing the operation by the supervised character, there is an abnormal violation behavior, in this scenario, in response to the fact that the supervised character recognizes that the violation behavior exists in the supervised character, the violation information of the violated supervised character is obtained, a violation contract of the violated supervised character is generated based on the violation information, and the violation information is uploaded to the block chain network to be disclosed, and the violation contract is sent to the violated supervised character.
As shown in fig. 4, when the supervising role finds the violation of the supervised role, specific violation information may be obtained, and the part of violation information is uploaded to the blockchain network for displaying.
Correspondingly, a corresponding violation contract can be generated according to the obtained specific violation information, the violation supervised role with the violation behavior is determined from the block chain network based on the specific violation information of the violation behavior, and the violation contract is sent to the violation supervised role.
According to the block chain-based coal mine safety supervision method, safety supervision data in a block chain network are obtained according to a first data block to which supervision data uploaded to the block chain network by a supervision role belong and a second data block to which operation data uploaded to the block chain network by a supervised role belong, target safety supervision data of the supervised role are obtained from the safety supervision data, whether the supervised role is abnormal or not is identified based on the target safety supervision data, and corresponding safety abnormal information is obtained and a safety abnormal alarm is given based on the block chain network when the supervised role is identified to be abnormal. In the application, based on the block chain network and a plurality of supervision roles and the data uploaded to the block chain network by the supervision roles, the safety supervision of the supervision roles on the supervised roles is realized, the information island phenomenon between the respective data of the supervision roles and the supervision roles is avoided, the sharing of the operation data of the supervised roles and the supervision roles is realized, the degree of dependence on manpower is reduced, the labor cost for carrying out safety supervision on the supervised roles is saved, and the timeliness and the efficiency of safety supervision are improved.
The embodiments of the method for supervising coal mine safety based on block chains are also applicable to the device for supervising coal mine safety based on block chains provided in the embodiments of the present application, and will not be described in detail in the following embodiments.
Fig. 5 is a schematic structural diagram of a block chain-based coal mine safety supervision apparatus according to an embodiment of the present application, and as shown in fig. 5, the block chain-based coal mine safety supervision apparatus 500 includes a first obtaining module 51, a second obtaining module 52, and a supervision module 53, where:
a first obtaining module 51, configured to obtain supervision data uploaded by a supervision role into a blockchain network and job data uploaded by a supervised role into the blockchain network, so as to obtain a security supervision database in the blockchain network;
a second obtaining module 52, configured to obtain target security supervision data of the supervised role from the security supervision database;
and the supervision module 53 is configured to, in response to recognizing that a security exception exists in the supervised role according to the target security supervision data, acquire security exception information and send a security exception alarm through the blockchain network.
According to an embodiment of the present application, the second obtaining module 52 is further configured to: the method comprises the steps of obtaining a first data block to which supervisory data uploaded by a supervisory role belongs and a second data block to which job data uploaded by a supervised role belongs, and obtaining a safety supervisory database in a block chain network based on the first data block and the second data block.
According to an embodiment of the present application, the second obtaining module 52 is further configured to: acquiring a supervision data access request of a safety supervision database, and identifying a relevant data block of a supervised role from candidate data blocks in the safety supervision database based on the supervision data access request; and acquiring target safety supervision data of the supervised role from the associated data block.
According to an embodiment of the present application, the second obtaining module 52 is further configured to: based on the verification information in the target block header of the associated data block, performing security verification on a sender of the supervision data access request; and in response to the security verification of the target block header, the sender of the supervision data access request acquires target security supervision data from the target block of the associated data block.
According to an embodiment of the present application, the second obtaining module 52 is further configured to: acquiring identity information of a sender of the supervision data access request, and identifying whether the identity information is normal or not based on the verification information; and in response to the identity information indicating that the sender of the supervision data access request is a supervision role, determining that the sender of the supervision data access request passes the security verification.
According to an embodiment of the present application, the second obtaining module 52 is further configured to: and acquiring candidate safety supervision data in the target area block, and encrypting the candidate safety supervision data to obtain target safety supervision data.
According to one embodiment of the application, the supervisory role comprises at least one of a coal mine monitoring organization and a social monitoring organization; and the supervised role comprises at least one of a coal mine construction mechanism and a coal mine constructor.
According to an embodiment of the present application, the supervision module 53 is further configured to: responding to the fact that the supervising role recognizes that the supervised role has violation behaviors, obtaining violation information of the violation supervised role, and generating violation contracts of the violation supervised role based on the violation information; and uploading the violation information to a blockchain network for publicity, and sending the violation contract to the violation supervised role.
According to the block chain-based coal mine safety supervision device, the first data block to which the supervision data uploaded to the block chain network belongs according to the supervision role and the second data block to which the operation data uploaded to the block chain network belongs by the supervised role are obtained, so that the safety supervision data in the block chain network are obtained, the target safety supervision data of the supervised role are obtained from the safety supervision data, whether the supervised role is abnormal or not is identified based on the target safety supervision data, and when the safety abnormality of the supervised role is identified, corresponding safety abnormality information is obtained, and a safety abnormality alarm is sent based on the block chain network. In the application, based on the block chain network and a plurality of supervision roles and the data uploaded to the block chain network by the supervision roles, the safety supervision of the supervision roles on the supervised roles is realized, the information island phenomenon between the respective data of the supervision roles and the supervision roles is avoided, the sharing of the operation data of the supervised roles and the supervision roles is realized, the degree of dependence on manpower is reduced, the labor cost for carrying out safety supervision on the supervised roles is saved, and the timeliness and the efficiency of safety supervision are improved.
To achieve the above embodiments, the present application also provides an electronic device, a computer readable storage medium and a computer program product.
Fig. 6 is a block diagram of an electronic device according to an embodiment of the present application, and as shown in fig. 6, the device 600 includes a memory 61, a processor 62, and a computer program stored on the memory 61 and executable on the processor 62, and when the processor 62 executes program instructions, the method for monitoring and managing coal mine safety based on a block chain according to the embodiments of fig. 1 to 4 is implemented.
To implement the above embodiments, the present application also provides a non-transitory computer readable storage medium storing computer instructions for causing a computer to perform the block chain based coal mine safety supervision method of the embodiment of fig. 1 to 4.
In order to implement the foregoing embodiments, the present application further provides a computer program product, which when executed by an instruction processor in the computer program product, executes the block chain-based coal mine safety supervision method of the embodiments of fig. 1 to 4.
In the description of the present specification, reference to the description of "one embodiment," "some embodiments," "an example," "a specific example," or "some examples" or the like means that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the present application. In this specification, the schematic representations of the terms used above are not necessarily intended to refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples. Furthermore, various embodiments or examples and features of different embodiments or examples described in this specification can be combined and combined by one skilled in the art without contradiction.
Furthermore, the terms "first", "second" and "first" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defined as "first" or "second" may explicitly or implicitly include at least one of the feature. In the description of the present application, "plurality" means at least two, e.g., two, three, etc., unless explicitly specified otherwise.
Any process or method descriptions in flow charts or otherwise described herein may be understood as representing modules, segments, or portions of code which include one or more executable instructions for implementing steps of a custom logic function or process, and alternate implementations are included within the scope of the preferred embodiment of the present application in which functions may be executed out of order from that shown or discussed, including substantially concurrently or in reverse order, depending on the functionality involved, as would be understood by those reasonably skilled in the art of the present application.
The logic and/or steps represented in the flowcharts or otherwise described herein, e.g., an ordered listing of executable instructions that can be considered to implement logical functions, can be embodied in any computer-readable medium for use by or in connection with an instruction execution system, apparatus, or device, such as a computer-based system, processor-containing system, or other system that can fetch the instructions from the instruction execution system, apparatus, or device and execute the instructions. For the purposes of this description, a "computer-readable medium" can be any means that can contain, store, communicate, propagate, or transport the program for use by or in connection with the instruction execution system, apparatus, or device. More specific examples (a non-exhaustive list) of the computer-readable medium would include the following: an electrical connection (electronic device) having one or more wires, a portable computer diskette (magnetic device), a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber device, and a portable compact disc read-only memory (CDROM). Additionally, the computer-readable medium could even be paper or another suitable medium upon which the program is printed, as the program can be electronically captured, via for instance optical scanning of the paper or other medium, then compiled, interpreted or otherwise processed in a suitable manner if necessary, and then stored in a computer memory.
It should be understood that portions of the present application may be implemented in hardware, software, firmware, or a combination thereof. In the above embodiments, various steps or methods may be implemented in software or firmware stored in a memory and executed by a suitable instruction execution system. If implemented in hardware, as in another embodiment, any one or combination of the following techniques, which are well known in the art, may be used: a discrete logic circuit having a logic gate circuit for implementing a logic function on a data signal, an application specific integrated circuit having an appropriate combinational logic gate circuit, a Programmable Gate Array (PGA), a Field Programmable Gate Array (FPGA), or the like.
It will be understood by those skilled in the art that all or part of the steps carried out in the method of implementing the above embodiments may be implemented by hardware related to instructions of a program, which may be stored in a computer readable storage medium, and the program, when executed, includes one or a combination of the steps of the method embodiments.
In addition, functional units in the embodiments of the present application may be integrated into one processing module, or each unit may exist alone physically, or two or more units are integrated into one module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode. The integrated module, if implemented in the form of a software functional module and sold or used as a separate product, may also be stored in a computer-readable storage medium.
The storage medium mentioned above may be a read-only memory, a magnetic or optical disk, etc. While embodiments of the present application have been shown and described above, it will be understood that the above embodiments are exemplary and should not be construed as limiting the present application and that changes, modifications, substitutions and alterations in the above embodiments may be made by those of ordinary skill in the art within the scope of the present application.

Claims (10)

1. A block chain-based coal mine safety supervision method is characterized by comprising the following steps:
acquiring supervision data uploaded to a blockchain network by a supervision role and operation data uploaded to the blockchain network by a supervised role so as to acquire a safety supervision database in the blockchain network;
acquiring target safety supervision data of the supervised role from the safety supervision database;
and responding to the fact that the supervised role has safety abnormity according to the target safety supervision data, acquiring safety abnormity information and sending out a safety abnormity alarm through the block chain network.
2. The method of claim 1, wherein the obtaining supervisory roles upload supervisory data into a blockchain network and supervised roles upload job data into the blockchain network to obtain a security supervisory database in the blockchain network comprises:
and acquiring a first data block to which the supervision data uploaded by the supervision role belongs and a second data block to which the operation data uploaded by the supervised role belongs, and acquiring the safety supervision database in the block chain network based on the first data block and the second data block.
3. The method according to claim 2, wherein said obtaining target security supervision data of the supervised character from the security supervision database comprises:
acquiring a supervision data access request of the security supervision database, and identifying an associated data block of the supervised role from candidate data blocks in the security supervision database based on the supervision data access request;
and acquiring the target safety supervision data of the supervised role from the associated data block.
4. The method of claim 3, wherein said obtaining the target security supervision data of the supervised character from the associated data block comprises:
based on the verification information in the target block header of the associated data block, performing security verification on a sender of the supervision data access request;
and responding to the security verification of the target block header by a sender of the supervision data access request, and acquiring the target security supervision data from the target block body of the associated data block.
5. The method of claim 4, wherein the securely authenticating the sender of the supervision data access request based on authentication information in a target block header of the associated data block comprises:
acquiring identity information of a sender of the supervision data access request, and identifying whether the identity information is normal or not based on the verification information;
in response to the identity information indicating that the sender of the administrative data access request is the administrative role, determining that the sender of the administrative data access request passes security authentication.
6. The method of claim 5, wherein the obtaining the target security supervisory data from the target block of the associated data block by security verification of the target block header by the sender of the supervisory data access request comprises:
and acquiring candidate safety supervision data in the target area block, and encrypting the candidate safety supervision data to obtain the target safety supervision data.
7. The method of claim 1,
the supervision role comprises at least one of a coal mine supervision organization and a social supervision organization;
the supervised role comprises at least one of a coal mine construction mechanism and a coal mine constructor.
8. The method according to any one of claims 1-7, further comprising:
in response to the supervision role recognizing that the supervised role has violation behaviors, acquiring violation information of the violation supervised role, and generating a violation contract of the violation supervised role based on the violation information;
and uploading the violation information to the blockchain network for publicity, and sending the violation contract to the violation supervised role.
9. A block chain based coal mine safety supervision device, the device comprising:
the system comprises a first acquisition module, a second acquisition module and a third acquisition module, wherein the first acquisition module is used for acquiring supervision data uploaded to a blockchain network by a supervision role and operation data uploaded to the blockchain network by a supervised role so as to acquire a safety supervision database in the blockchain network;
the second acquisition module is used for acquiring target safety supervision data of the supervised role from the safety supervision database;
and the supervision module is used for responding to the situation that the supervised role has safety abnormity according to the target safety supervision data, acquiring safety abnormity information and sending out a safety abnormity alarm through the block chain network.
10. An electronic device, comprising:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein, the first and the second end of the pipe are connected with each other,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the method of any one of claims 1-8.
CN202211529348.0A 2022-12-01 2022-12-01 Coal mine safety supervision method and device based on block chain and electronic equipment Pending CN115544154A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211529348.0A CN115544154A (en) 2022-12-01 2022-12-01 Coal mine safety supervision method and device based on block chain and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211529348.0A CN115544154A (en) 2022-12-01 2022-12-01 Coal mine safety supervision method and device based on block chain and electronic equipment

Publications (1)

Publication Number Publication Date
CN115544154A true CN115544154A (en) 2022-12-30

Family

ID=84722235

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211529348.0A Pending CN115544154A (en) 2022-12-01 2022-12-01 Coal mine safety supervision method and device based on block chain and electronic equipment

Country Status (1)

Country Link
CN (1) CN115544154A (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110278090A (en) * 2019-06-27 2019-09-24 尚菊红 Environment monitoring data monitoring system, processing method, computer equipment and storage medium
CN110363527A (en) * 2019-06-26 2019-10-22 阿里巴巴集团控股有限公司 Card, monitoring and managing method and device are deposited based on block chain
CN110675028A (en) * 2019-08-30 2020-01-10 阿里巴巴集团控股有限公司 Block chain-based food safety supervision method, device, equipment and system
CN112231772A (en) * 2020-12-21 2021-01-15 腾讯科技(深圳)有限公司 User behavior supervision method, device, equipment and medium based on block chain
CN113051551A (en) * 2021-03-16 2021-06-29 上海图灵加佳网络科技有限公司 Data supervision method, system, medium and supervised terminal based on block chain
CN113239399A (en) * 2021-05-18 2021-08-10 中国信息通信研究院 Supply chain data supervision method based on block chain, electronic equipment and storage medium
CN113689070A (en) * 2021-07-15 2021-11-23 阳光易购(湖南)科技有限公司 Food safety online supervision method and device, storage medium and computer equipment
CN114710505A (en) * 2022-04-02 2022-07-05 杭州云象网络技术有限公司 Method and system for realizing ecological safety supervision of digital RMB (national currency) based on block chain

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110363527A (en) * 2019-06-26 2019-10-22 阿里巴巴集团控股有限公司 Card, monitoring and managing method and device are deposited based on block chain
CN110278090A (en) * 2019-06-27 2019-09-24 尚菊红 Environment monitoring data monitoring system, processing method, computer equipment and storage medium
CN110675028A (en) * 2019-08-30 2020-01-10 阿里巴巴集团控股有限公司 Block chain-based food safety supervision method, device, equipment and system
CN112231772A (en) * 2020-12-21 2021-01-15 腾讯科技(深圳)有限公司 User behavior supervision method, device, equipment and medium based on block chain
CN113051551A (en) * 2021-03-16 2021-06-29 上海图灵加佳网络科技有限公司 Data supervision method, system, medium and supervised terminal based on block chain
CN113239399A (en) * 2021-05-18 2021-08-10 中国信息通信研究院 Supply chain data supervision method based on block chain, electronic equipment and storage medium
CN113689070A (en) * 2021-07-15 2021-11-23 阳光易购(湖南)科技有限公司 Food safety online supervision method and device, storage medium and computer equipment
CN114710505A (en) * 2022-04-02 2022-07-05 杭州云象网络技术有限公司 Method and system for realizing ecological safety supervision of digital RMB (national currency) based on block chain

Similar Documents

Publication Publication Date Title
CN108501980B (en) Monitoring method of track circuit equipment and terminal equipment
US10963797B2 (en) System for analyzing machine data
KR101858377B1 (en) Monitoring device, monitoring method, and program
US20160292802A1 (en) Asset Management Support System
US10073447B2 (en) Abnormality diagnosis method and device therefor
AU2014205737A1 (en) Method, device and computer program for monitoring an industrial control system
CN106815667A (en) Large-scale scientific research apparatus monitor in real time based on wireless Internet and use management system
CN104764595A (en) Remote diagnostic system
CN112817814A (en) Abnormity monitoring method, system, storage medium and electronic device
CN117312290A (en) Method for improving heterogeneous system data quality
CN114500574A (en) Monitoring method, device and medium for improving grain depot safety based on block chain
CN113869589A (en) Power transmission line accident prediction method based on knowledge graph and inspection system
CN116754022B (en) On-line detection emergency early warning method and system for cable tunnel
CN105242655A (en) Industrial on-site supervising device based on Internet of Things
CN115544154A (en) Coal mine safety supervision method and device based on block chain and electronic equipment
CN111371984B (en) Method and device for determining abnormality of snapshot machine and storage medium
CN114584403B (en) Power plant inspection equipment authentication management system and method
CN115392767A (en) Intelligent building site field management system based on BIM and 5G technologies
CN115903720A (en) Fault diagnosis system and method for rail transit, and storage medium
CN112381386A (en) Vehicle inspection and control method and device, electronic equipment and storage medium
US20200143004A1 (en) Visualization of machine structure damage from machine sensor data using machine learning
CN116307385B (en) Method for analyzing archival data based on extreme environment exploration operation
CN117579387B (en) Automobile network security management method, system, equipment and medium
CN108337115A (en) Network state processing method and processing device
CN117851976A (en) Method and device for constructing and evaluating coal mine disaster data quality evaluation model

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination