Movatterモバイル変換


[0]ホーム

URL:


CN113591137B - Blockchain-based management method and device - Google Patents

Blockchain-based management method and device
Download PDF

Info

Publication number
CN113591137B
CN113591137BCN202111154205.1ACN202111154205ACN113591137BCN 113591137 BCN113591137 BCN 113591137BCN 202111154205 ACN202111154205 ACN 202111154205ACN 113591137 BCN113591137 BCN 113591137B
Authority
CN
China
Prior art keywords
user equipment
data
monitored data
label
identity
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202111154205.1A
Other languages
Chinese (zh)
Other versions
CN113591137A (en
Inventor
叶东俊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chengdu Zhidian Network Technology Co ltd
Original Assignee
Shenzhen Spacetime Cloud Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Spacetime Cloud Technology Co ltdfiledCriticalShenzhen Spacetime Cloud Technology Co ltd
Priority to CN202111154205.1ApriorityCriticalpatent/CN113591137B/en
Publication of CN113591137ApublicationCriticalpatent/CN113591137A/en
Application grantedgrantedCritical
Publication of CN113591137BpublicationCriticalpatent/CN113591137B/en
Activelegal-statusCriticalCurrent
Anticipated expirationlegal-statusCritical

Links

Images

Classifications

Landscapes

Abstract

Translated fromChinese

本发明提供的一种基于区块链的管理方法及装置,涉及分布式存储技术,通过响应用户设备和采集点的标签请求,发送第一身份标签给所述用户设备,发送第二身份标签给所述采集点,根据各节点接收各采集点获取的各所述用户设备的被监控数据,对所述被监控数据进行链接存储,被监控数据包括摘要数据和详细数据,若被监控数据处于非正常状态,将摘要数据和所述访问私钥基于第一身份标签发送给所述用户设备,接收所述用户设备发送的查询请求,将对应第一身份标签的所述详细数据和所述访问私钥发送给所述用户设备的技术方案,可以实现对用户设备被监控数据的存储,对用户数据进行去中心化管理,同时可以防止数据被篡改和盗取,提高用户数据的安全性。

Figure 202111154205

A blockchain-based management method and device provided by the present invention relate to distributed storage technology. By responding to a label request from a user equipment and a collection point, a first identity label is sent to the user equipment, and a second identity label is sent to the user equipment. The collection point receives the monitored data of each user equipment obtained by each collection point according to each node, and links and stores the monitored data. The monitored data includes summary data and detailed data. In normal state, the summary data and the access private key are sent to the user equipment based on the first identity tag, the query request sent by the user equipment is received, and the detailed data corresponding to the first identity tag and the access private key are sent. The technical solution of sending the key to the user equipment can realize the storage of the monitored data of the user equipment, perform decentralized management of the user data, and at the same time can prevent the data from being tampered and stolen, and improve the security of the user data.

Figure 202111154205

Description

Block chain-based management method and device
Technical Field
The present invention relates to distributed storage technologies, and in particular, to a management method and apparatus based on a block chain.
Background
In order to effectively supervise user behaviors, monitoring equipment is arranged in the prior art to collect the user behaviors, so that constraints are generated on users.
However, the current user behavior data are all stored in a server at a management end in a centralized manner for centralized management, and once the server is attacked, huge user data can be stolen or lost, so that the security is low.
Disclosure of Invention
The embodiment of the invention provides a management method and a management device based on a block chain, which can improve the safety of user data and can realize information butt joint with user equipment.
In a first aspect of the embodiments of the present invention, a management method based on a block chain is provided, including:
responding to label requests of user equipment and an acquisition point, sending a first identity label to the user equipment, and sending a second identity label to the acquisition point, wherein the user equipment corresponds to the first identity label one by one, and the acquisition point corresponds to the second identity label one by one;
receiving monitored data of each user equipment acquired by each acquisition point according to each node, and performing link storage on the monitored data, wherein the monitored data is read by an access private key obtained by encrypting the second identity tag, and the monitored data comprises summary data and detailed data;
if the monitored data is in an abnormal state, the summary data and the access private key are sent to the user equipment based on the first identity label;
and receiving a query request sent by the user equipment, and sending the detailed data corresponding to the first identity tag and the access private key to the user equipment.
Optionally, in a possible implementation manner of the first aspect, the method further includes:
and receiving the complaint information of the user equipment, and performing link storage on the complaint information.
Optionally, in a possible implementation manner of the first aspect, after the storing the complaint information in a linked manner, the method further includes:
forwarding the complaint information to a down-link verification node for verification processing to generate a verification result;
and performing link storage on the verification result.
Optionally, in a possible implementation manner of the first aspect, before sending, to the user equipment, the summary data and the access private key based on the first identity tag if the monitored data is in an abnormal state, the method further includes:
and determining that the monitored data is in an abnormal state based on the nodes in a preset period.
Optionally, in a possible implementation manner of the first aspect, after determining that the monitored data is in an abnormal state based on the node, the method further includes:
the monitored data is forwarded to a public trust organization for verification processing, and a public trust result is generated;
and if the trust result is true, determining the node as a trusted node.
Optionally, in a possible implementation manner of the first aspect, sending the digest data and the access private key to the user equipment based on the first identity tag includes:
and according to the trusted node, sending the summary data and the access private key to the user equipment based on the first identity label.
Optionally, in a possible implementation manner of the first aspect, the method further includes:
counting the times of each user equipment in an abnormal state, and generating evaluation information of each user equipment based on the times;
and performing link storage on the evaluation information.
Optionally, in a possible implementation manner of the first aspect, before receiving, according to each node, monitored data of each user equipment acquired by each acquisition point, the method further includes:
and acquiring monitored data of each user equipment according to the snapshot camera arranged at the acquisition point.
In a second aspect of the embodiments of the present invention, a management apparatus based on a block chain is provided, including:
the system comprises a label module, a label module and a data acquisition module, wherein the label module is used for responding to label requests of user equipment and an acquisition point, sending a first identity label to the user equipment and sending a second identity label to the acquisition point, the user equipment corresponds to the first identity label one by one, and the acquisition point corresponds to the second identity label one by one;
the acquisition module is used for receiving monitored data of each user equipment acquired by each acquisition point according to each node and performing link storage on the monitored data, wherein the monitored data is read by an access private key obtained by encrypting the second identity tag, and the monitored data comprises summary data and detailed data;
the judging module is used for sending the summary data and the access private key to the user equipment based on the first identity label if the monitored data is in an abnormal state;
and the query module is used for receiving a query request sent by the user equipment and sending the detailed data corresponding to the first identity label and the access private key to the user equipment.
In a third aspect of the embodiments of the present invention, a management device based on a block chain is provided, including: memory, a processor and a computer program, the computer program being stored in the memory, the processor running the computer program to perform the method of the first aspect of the invention as well as various possible aspects of the first aspect.
A fourth aspect of the embodiments of the present invention provides a readable storage medium, in which a computer program is stored, the computer program being, when executed by a processor, configured to implement the method according to the first aspect of the present invention and various possible aspects of the first aspect.
The block chain-based management method and device provided by the invention can realize the storage of monitored data of user equipment, perform decentralized management on the user data, prevent the data from being falsified and stolen, improve the safety of the user data, and in addition, can also send the monitored data in an abnormal state to a user or receive query information of the user and send the monitored data to the user to realize information butt joint with the user equipment.
Drawings
Fig. 1 is a schematic flowchart of a block chain-based management method according to an embodiment of the present invention;
fig. 2 is a schematic structural diagram of each node according to an embodiment of the present invention;
fig. 3 is a schematic structural diagram of a management apparatus based on a block chain according to an embodiment of the present invention;
fig. 4 is a schematic hardware structure diagram of a management device based on a block chain according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1, which is a flowchart illustrating a block chain based management method according to an embodiment of the present invention, an execution subject of the method shown in fig. 1 may be a software and/or hardware device. The execution subject of the present application may include, but is not limited to, at least one of: user equipment, network equipment, etc. The user equipment may include, but is not limited to, a computer, a smart phone, a Personal Digital Assistant (PDA), the above mentioned electronic equipment, and the like. The network device may include, but is not limited to, a single network server, a server group of multiple network servers, or a cloud of numerous computers or network servers based on cloud computing, wherein cloud computing is one type of distributed computing, a super virtual computer consisting of a cluster of loosely coupled computers. The present embodiment does not limit this. The method comprises the following steps of S101 to S104:
s101, responding to a label request of user equipment and an acquisition point, sending a first identity label to the user equipment, and sending a second identity label to the acquisition point, wherein the user equipment corresponds to the first identity label one to one, and the acquisition point corresponds to the second identity label one to one.
Specifically, in order to implement one-to-one storage of user data, the user equipment needs to be tagged, a different first identity tag is allocated to each user equipment, and the first identity tag is carried by subsequent information related to the user equipment, so that accurate correspondence of data is facilitated. In the same way, in order to realize the distinction of the acquisition points, the acquisition points are labeled, and different second identity labels are distributed to each acquisition point.
In practical application, the user device may be, for example, a personal device, specifically, a vehicle, and the first identity tag may be, for example, unique tag information such as a license plate number of the user device; the collection point may be, for example, a collection device of the road segment, and the second identity tag may be, for example, tag information having uniqueness such as a number of the collection point.
And S102, receiving monitored data of each user equipment acquired by each acquisition point according to each node, and performing link storage on the monitored data, wherein the monitored data is read by an access private key obtained by encrypting the second identity tag, and the monitored data comprises summary data and detailed data.
Specifically, referring to fig. 2, in the present solution, each node of the block chain is used to link and store the monitored data acquired by the acquisition point, it can be understood that the monitored data includes a second identity tag corresponding to the acquisition point, and in this embodiment, an access private key for reading the monitored data can be formed by using the second identity tag, so as to ensure the security of the data. It should be noted that, in the present solution, each node of the block chain is used to perform distributed storage on the user data, and decentralized management is performed, so that the user data is difficult to tamper and steal.
S103, if the monitored data is in an abnormal state, the summary data and the access private key are sent to the user equipment based on the first identity label.
Specifically, the monitored data may be in a normal state or an abnormal state, for example, the vehicle may be in an abnormal state, for example, the vehicle may overspeed or run a red light, that is, the vehicle is in an illegal state, and then the monitored data may be sent to the user equipment for prompting.
S104, receiving the query request sent by the user equipment, and sending the detailed data corresponding to the first identity label and the access private key to the user equipment.
In practical applications, the monitored data may be, for example, monitored data acquired by the capturing camera at the acquisition point for each user equipment, and may be, for example, picture data and interpretation data for the picture data.
The picture data may be detailed data, for example, and the interpretation data may be summary data, for example, for targeted transmission to the user. For example, the user may be reminded using summary data and instructed in detail using detailed data.
It can be understood that the monitored data is divided into summary data and detailed data, and at the beginning, the summary data only needs to be sent to the user, so that the data volume of the monitored data in the abnormal state transmitted by the node to the user equipment can be reduced, and the detailed data only needs to be sent to the user after the query information of the user is received, so that the data processing capacity is reduced, and the processing efficiency and the data throughput are improved.
In some embodiments, in order to maintain the user's rights and interests, the block chain-based management method further includes receiving complaint information of the user equipment, and performing link storage on the complaint information. Namely, if the user feels that the circulation information is wrong, the complaint information can be uploaded to the block chain.
In other embodiments, after the complaint information is stored in a link, the complaint information may be forwarded to a down-link verification node for verification, a verification result is generated, and the verification result is stored in a link. The complaint information can be verified through the down-link verification node, and meanwhile, the verification result is uploaded to indicate the authenticity of the complaint information.
On the basis of the above embodiment, before sending the summary data and the access private key to the user equipment based on the first identity tag if the monitored data is in an abnormal state, it is further determined that the monitored data is in an abnormal state based on a node in a preset period.
It can be understood that, because the amount of the user data is large, some of the streaming information may not need to be processed immediately, that is, the streaming information is not necessarily processed immediately.
On the basis of the above embodiment, after determining that the monitored data is in an abnormal state based on the node, the method may further include forwarding the monitored data to a trust authority for verification processing, generating a trust result, and if the trust result is true, determining the node as a trusted node.
It can be understood that, because the monitored data in the abnormal state may seriously affect the rights and interests of the user, the embodiment verifies the monitored data in the abnormal state by using the trust authority, and obtains the trust result, which may be true or false.
It should be noted that, when the result of the public trust is true, it indicates that the reliability of the node is high, and then the node can be used as a trusted node, and it can be understood that as the number of times of verification increases, a plurality of trusted nodes can be gradually screened out, and subsequently, data can be processed by using the trusted nodes, so that the reliability of the scheme is improved.
For example, the digest data and the access private key are sent to the user equipment based on the first identity tag, and the digest data and the access private key are sent to the user equipment based on the first identity tag according to the trusted node. It can be understood that the trusted nodes are used for processing data, and the reliability and the safety of data processing are improved.
In practical application, monitored data of one user equipment may have abnormal states for many times, and in order to further supervise a user, the times of abnormal states of each user equipment may be counted, evaluation information of each user equipment is generated based on the times, and the evaluation information is stored in a link manner. The evaluation information may be subsequently sent to other management terminals in the related field as a limitation to the user, taking the vehicle law violation as an example, for example, the evaluation information may be forwarded to a car rental system to form a supervision on the user equipment.
Referring to fig. 3, which is a schematic structural diagram of a management apparatus based on a block chain according to an embodiment of the present invention, the management apparatus based on a block chain includes:
the system comprises a label module, a label module and a data acquisition module, wherein the label module is used for responding to label requests of user equipment and an acquisition point, sending a first identity label to the user equipment and sending a second identity label to the acquisition point, the user equipment corresponds to the first identity label one by one, and the acquisition point corresponds to the second identity label one by one;
the acquisition module is used for receiving monitored data of each user equipment acquired by each acquisition point according to each node and performing link storage on the monitored data, wherein the monitored data is read by an access private key obtained by encrypting the second identity tag, and the monitored data comprises summary data and detailed data;
the judging module is used for sending the summary data and the access private key to the user equipment based on the first identity label if the monitored data is in an abnormal state;
and the query module is used for receiving a query request sent by the user equipment and sending the detailed data corresponding to the first identity label and the access private key to the user equipment.
The apparatus in the embodiment shown in fig. 3 can be correspondingly used to perform the steps in the method embodiment shown in fig. 1, and the implementation principle and technical effect are similar, which are not described herein again.
Referring to fig. 4, which is a schematic diagram of a hardware structure of a management device based on a block chain according to an embodiment of the present invention, themanagement device 40 based on a block chain includes: aprocessor 41,memory 42 and computer programs; wherein
Amemory 42 for storing the computer program, which may also be a flash memory (flash). The computer program is, for example, an application program, a functional module, or the like that implements the above method.
Aprocessor 41 for executing the computer program stored in the memory to implement the steps performed by the apparatus in the above method. Reference may be made in particular to the description relating to the preceding method embodiment.
Alternatively, thememory 42 may be separate or integrated with theprocessor 41.
When thememory 42 is a device independent of theprocessor 41, the apparatus may further include:
abus 43 for connecting thememory 42 and theprocessor 41.
The present invention also provides a readable storage medium, in which a computer program is stored, which, when being executed by a processor, is adapted to implement the methods provided by the various embodiments described above.
The readable storage medium may be a computer storage medium or a communication medium. Communication media includes any medium that facilitates transfer of a computer program from one place to another. Computer storage media may be any available media that can be accessed by a general purpose or special purpose computer. For example, a readable storage medium is coupled to the processor such that the processor can read information from, and write information to, the readable storage medium. Of course, the readable storage medium may also be an integral part of the processor. The processor and the readable storage medium may reside in an Application Specific Integrated Circuits (ASIC). Additionally, the ASIC may reside in user equipment. Of course, the processor and the readable storage medium may also reside as discrete components in a communication device. The readable storage medium may be a read-only memory (ROM), a random-access memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, an optical data storage device, and the like.
The present invention also provides a program product comprising execution instructions stored in a readable storage medium. The at least one processor of the device may read the execution instructions from the readable storage medium, and the execution of the execution instructions by the at least one processor causes the device to implement the methods provided by the various embodiments described above.
In the above embodiments of the apparatus, it should be understood that the Processor may be a Central Processing Unit (CPU), other general purpose processors, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), etc. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of a method disclosed in connection with the present invention may be embodied directly in a hardware processor, or in a combination of the hardware and software modules within the processor.
Finally, it should be noted that: the above embodiments are only used to illustrate the technical solution of the present invention, and not to limit the same; while the invention has been described in detail and with reference to the foregoing embodiments, it will be understood by those skilled in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some or all of the technical features may be equivalently replaced; and the modifications or the substitutions do not make the essence of the corresponding technical solutions depart from the scope of the technical solutions of the embodiments of the present invention.

Claims (7)

1. A block chain-based management method is characterized by comprising the following steps:
responding to label requests of user equipment and an acquisition point, sending a first identity label to the user equipment, and sending a second identity label to the acquisition point, wherein the user equipment corresponds to the first identity label one by one, and the acquisition point corresponds to the second identity label one by one;
receiving monitored data of each user equipment acquired by each acquisition point according to each node, and performing link storage on the monitored data, wherein the monitored data is read by an access private key obtained by encrypting the second identity tag, and the monitored data comprises summary data and detailed data;
if the monitored data is in an abnormal state, the summary data and the access private key are sent to the user equipment based on the first identity label;
receiving a query request sent by the user equipment, and sending the detailed data corresponding to the first identity tag and the access private key to the user equipment;
before sending the summary data and the access private key to the user equipment based on the first identity tag if the monitored data is in an abnormal state, the method further includes:
determining that the monitored data is in an abnormal state based on the nodes in a preset period;
after determining that the monitored data is in an abnormal state based on the node, the method further comprises:
the monitored data is forwarded to a public trust organization for verification processing, and a public trust result is generated;
if the result of the public trust is true, determining the node as a trusted node;
sending the summary data and the access private key to the user equipment based on the first identity tag, including:
and according to the trusted node, sending the summary data and the access private key to the user equipment based on the first identity label.
2. The method of claim 1, further comprising:
and receiving the complaint information of the user equipment, and performing link storage on the complaint information.
3. The method of claim 2, further comprising, after storing the complaint information in a linked manner:
forwarding the complaint information to a down-link verification node for verification processing to generate a verification result;
and performing link storage on the verification result.
4. The method of claim 1, further comprising:
counting the times of each user equipment in an abnormal state, and generating evaluation information of each user equipment based on the times;
and performing link storage on the evaluation information.
5. The method of claim 1, prior to receiving, according to each node, the monitored data of each of the user equipments obtained by each of the collection points, further comprising:
and acquiring monitored data of each user equipment according to the snapshot camera arranged at the acquisition point.
6. A blockchain-based management apparatus, comprising:
the system comprises a label module, a label module and a data acquisition module, wherein the label module is used for responding to label requests of user equipment and an acquisition point, sending a first identity label to the user equipment and sending a second identity label to the acquisition point, the user equipment corresponds to the first identity label one by one, and the acquisition point corresponds to the second identity label one by one;
the acquisition module is used for receiving monitored data of each user equipment acquired by each acquisition point according to each node and performing link storage on the monitored data, wherein the monitored data is read by an access private key obtained by encrypting the second identity tag, and the monitored data comprises summary data and detailed data;
the judging module is used for sending the summary data and the access private key to the user equipment based on the first identity label if the monitored data is in an abnormal state;
the query module is used for receiving a query request sent by the user equipment and sending the detailed data corresponding to the first identity label and the access private key to the user equipment;
before sending the summary data and the access private key to the user equipment based on the first identity tag if the monitored data is in an abnormal state, the method further includes:
determining that the monitored data is in an abnormal state based on the nodes in a preset period;
after determining that the monitored data is in an abnormal state based on the node, the method further comprises:
the monitored data is forwarded to a public trust organization for verification processing, and a public trust result is generated;
if the result of the public trust is true, determining the node as a trusted node;
sending the summary data and the access private key to the user equipment based on the first identity tag, including:
and according to the trusted node, sending the summary data and the access private key to the user equipment based on the first identity label.
7. A computer-readable storage medium, in which a computer program is stored which, when being executed by a processor, is adapted to carry out the method of any one of claims 1 to 5.
CN202111154205.1A2021-09-292021-09-29 Blockchain-based management method and deviceActiveCN113591137B (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN202111154205.1ACN113591137B (en)2021-09-292021-09-29 Blockchain-based management method and device

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN202111154205.1ACN113591137B (en)2021-09-292021-09-29 Blockchain-based management method and device

Publications (2)

Publication NumberPublication Date
CN113591137A CN113591137A (en)2021-11-02
CN113591137Btrue CN113591137B (en)2022-01-25

Family

ID=78242751

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN202111154205.1AActiveCN113591137B (en)2021-09-292021-09-29 Blockchain-based management method and device

Country Status (1)

CountryLink
CN (1)CN113591137B (en)

Citations (12)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN107870983A (en)*2017-09-302018-04-03深圳市易成自动驾驶技术有限公司Vehicle peccancy approaches to IM, block chain and storage medium based on block chain
CN108573388A (en)*2018-05-082018-09-25广州大学 Blockchain-based vehicle information processing system and method
CN109118765A (en)*2018-09-042019-01-01京东方科技集团股份有限公司Break in traffic rules and regulations recording method and device based on block chain
CN109325751A (en)*2018-09-302019-02-12深圳市元征科技股份有限公司A kind of vehicle violation method for monitoring and relevant device based on block chain technology
CN109726212A (en)*2018-12-292019-05-07杭州宏杉科技股份有限公司Data-storage system and method
CN109801500A (en)*2019-02-192019-05-24中国科学院自动化研究所Vehicle violation lane change based on block chain detects recording method, system, device
WO2019205955A1 (en)*2018-04-242019-10-31深圳市轱辘汽车维修技术有限公司Vehicle-related information processing method based on blockchain and device thereof
CN110491131A (en)*2018-07-182019-11-22江苏恒宝智能系统技术有限公司A kind of vehicle violation management system based on block chain
CN110599774A (en)*2019-08-232019-12-20绍兴文理学院Traffic violation processing method and system based on block chain
CN110706371A (en)*2019-10-172020-01-17腾讯科技(深圳)有限公司Block chain-based driving safety management method, system and storage medium
KR102081777B1 (en)*2019-05-152020-02-27(주)아이엠시티How to manage traffic violation penalties using block chains
CN110874738A (en)*2018-09-022020-03-10许先学Method and device for collecting and processing traffic violation information of intelligent traffic control and intelligent traffic control

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN105632182B (en)*2016-01-272018-10-26福建工程学院A kind of method and its system that rule-breaking vehicle behavior is put to the proof
WO2018057750A1 (en)*2016-09-212018-03-29Drive Safe Enforcement, LlcMobile traffic violation detection, recording and evidence processing system
CN110383360B (en)*2016-12-192022-07-05斯鲁格林有限责任公司Adaptive vehicle traffic management system with digitally prioritized connectivity
US11531661B2 (en)*2018-03-272022-12-20International Business Machines CorporationVehicle incident documentation for blockchain
CN110060484B (en)*2019-05-162021-10-22武汉理工大学 A blockchain-based real-time early warning system and method for highway passenger violations
CN110427432A (en)*2019-08-082019-11-08英华达(上海)科技有限公司Violation event processing method, system, equipment and storage medium based on block chain
CN110569643A (en)*2019-09-102019-12-13腾讯科技(深圳)有限公司traffic management method and device based on block chain network
CN111050317B (en)*2019-12-072022-08-02江西理工大学Intelligent traffic data safety sharing method based on alliance block chain

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN107870983A (en)*2017-09-302018-04-03深圳市易成自动驾驶技术有限公司Vehicle peccancy approaches to IM, block chain and storage medium based on block chain
WO2019205955A1 (en)*2018-04-242019-10-31深圳市轱辘汽车维修技术有限公司Vehicle-related information processing method based on blockchain and device thereof
CN108573388A (en)*2018-05-082018-09-25广州大学 Blockchain-based vehicle information processing system and method
CN110491131A (en)*2018-07-182019-11-22江苏恒宝智能系统技术有限公司A kind of vehicle violation management system based on block chain
CN110874738A (en)*2018-09-022020-03-10许先学Method and device for collecting and processing traffic violation information of intelligent traffic control and intelligent traffic control
CN109118765A (en)*2018-09-042019-01-01京东方科技集团股份有限公司Break in traffic rules and regulations recording method and device based on block chain
CN109325751A (en)*2018-09-302019-02-12深圳市元征科技股份有限公司A kind of vehicle violation method for monitoring and relevant device based on block chain technology
CN109726212A (en)*2018-12-292019-05-07杭州宏杉科技股份有限公司Data-storage system and method
CN109801500A (en)*2019-02-192019-05-24中国科学院自动化研究所Vehicle violation lane change based on block chain detects recording method, system, device
KR102081777B1 (en)*2019-05-152020-02-27(주)아이엠시티How to manage traffic violation penalties using block chains
CN110599774A (en)*2019-08-232019-12-20绍兴文理学院Traffic violation processing method and system based on block chain
CN110706371A (en)*2019-10-172020-01-17腾讯科技(深圳)有限公司Block chain-based driving safety management method, system and storage medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
区块链技术在汽车行业的应用;苏松 等;《装备制造技术》;20210531(第5期);132-136*

Also Published As

Publication numberPublication date
CN113591137A (en)2021-11-02

Similar Documents

PublicationPublication DateTitle
CN111901327B (en)Cloud network vulnerability mining method and device, electronic equipment and medium
CN110113167A (en)A kind of information protecting method of intelligent terminal, system and readable storage medium storing program for executing
CN114268508A (en)Internet of things equipment secure access method, device, equipment and medium
CN111367923B (en)Data processing method, device, node equipment and storage medium
CN113111359A (en)Big data resource sharing method and resource sharing system based on information security
CN111885050A (en)Data storage method and device based on block chain network, related equipment and medium
CN109190402A (en)A kind of casualty data wiring method and device, equipment, storage medium
CN113505260A (en)Face recognition method and device, computer readable medium and electronic equipment
CN112069529B (en)Block chain-based volume management method and device, computer and storage medium
CN113660202A (en)Method and system for checking driving data consistency
CN113162971A (en)Block link point management method, device, computer and readable storage medium
CN111654375A (en) A blockchain-based edge computing security encryption method, device and system
CN112713996B (en)Block chain-based fault verification method, server and terminal
CN113591137B (en) Blockchain-based management method and device
CN114065301A (en) Clock environment reliability verification method, device, device and storage medium
CN112104701B (en)Method, device, network node and storage medium for cross-link communication
CN114186141B (en)Illegal client detection method, device, equipment and medium
CN113938496B (en)Block chain network method and system based on Internet of things equipment
CN112016131B (en)Distributed cloud evidence obtaining credibility verification system and method thereof
CN110597557B (en)System information acquisition method, terminal and medium
CN115061891A (en)System load capacity prediction method and device based on block chain
CN113783865A (en)Online interviewing method and system
CN112232958A (en) Transaction consensus method, device and electronic device
CN113949508A (en)Process data processing method and device based on random number consensus mechanism
CN110209727B (en)Data storage method, terminal equipment and medium

Legal Events

DateCodeTitleDescription
PB01Publication
PB01Publication
SE01Entry into force of request for substantive examination
SE01Entry into force of request for substantive examination
GR01Patent grant
GR01Patent grant
TR01Transfer of patent right

Effective date of registration:20250520

Address after:Room 777, 4th Floor, Building 1-2, No. 69 Junlong Street, Jinjiang District, Chengdu City, Sichuan Province, 610000 (self numbered)

Patentee after:Chengdu Zhidian Network Technology Co.,Ltd.

Country or region after:China

Address before:518000 1107, Dongfang Science and technology building, No. 16, Keyuan Road, science and Technology Park community, Yuehai street, Nanshan District, Shenzhen, Guangdong Province

Patentee before:Shenzhen spacetime cloud Technology Co.,Ltd.

Country or region before:China

TR01Transfer of patent right

[8]ページ先頭

©2009-2025 Movatter.jp