Disclosure of Invention
The embodiment of the invention provides a management method and a management device based on a block chain, which can improve the safety of user data and can realize information butt joint with user equipment.
In a first aspect of the embodiments of the present invention, a management method based on a block chain is provided, including:
responding to label requests of user equipment and an acquisition point, sending a first identity label to the user equipment, and sending a second identity label to the acquisition point, wherein the user equipment corresponds to the first identity label one by one, and the acquisition point corresponds to the second identity label one by one;
receiving monitored data of each user equipment acquired by each acquisition point according to each node, and performing link storage on the monitored data, wherein the monitored data is read by an access private key obtained by encrypting the second identity tag, and the monitored data comprises summary data and detailed data;
if the monitored data is in an abnormal state, the summary data and the access private key are sent to the user equipment based on the first identity label;
and receiving a query request sent by the user equipment, and sending the detailed data corresponding to the first identity tag and the access private key to the user equipment.
Optionally, in a possible implementation manner of the first aspect, the method further includes:
and receiving the complaint information of the user equipment, and performing link storage on the complaint information.
Optionally, in a possible implementation manner of the first aspect, after the storing the complaint information in a linked manner, the method further includes:
forwarding the complaint information to a down-link verification node for verification processing to generate a verification result;
and performing link storage on the verification result.
Optionally, in a possible implementation manner of the first aspect, before sending, to the user equipment, the summary data and the access private key based on the first identity tag if the monitored data is in an abnormal state, the method further includes:
and determining that the monitored data is in an abnormal state based on the nodes in a preset period.
Optionally, in a possible implementation manner of the first aspect, after determining that the monitored data is in an abnormal state based on the node, the method further includes:
the monitored data is forwarded to a public trust organization for verification processing, and a public trust result is generated;
and if the trust result is true, determining the node as a trusted node.
Optionally, in a possible implementation manner of the first aspect, sending the digest data and the access private key to the user equipment based on the first identity tag includes:
and according to the trusted node, sending the summary data and the access private key to the user equipment based on the first identity label.
Optionally, in a possible implementation manner of the first aspect, the method further includes:
counting the times of each user equipment in an abnormal state, and generating evaluation information of each user equipment based on the times;
and performing link storage on the evaluation information.
Optionally, in a possible implementation manner of the first aspect, before receiving, according to each node, monitored data of each user equipment acquired by each acquisition point, the method further includes:
and acquiring monitored data of each user equipment according to the snapshot camera arranged at the acquisition point.
In a second aspect of the embodiments of the present invention, a management apparatus based on a block chain is provided, including:
the system comprises a label module, a label module and a data acquisition module, wherein the label module is used for responding to label requests of user equipment and an acquisition point, sending a first identity label to the user equipment and sending a second identity label to the acquisition point, the user equipment corresponds to the first identity label one by one, and the acquisition point corresponds to the second identity label one by one;
the acquisition module is used for receiving monitored data of each user equipment acquired by each acquisition point according to each node and performing link storage on the monitored data, wherein the monitored data is read by an access private key obtained by encrypting the second identity tag, and the monitored data comprises summary data and detailed data;
the judging module is used for sending the summary data and the access private key to the user equipment based on the first identity label if the monitored data is in an abnormal state;
and the query module is used for receiving a query request sent by the user equipment and sending the detailed data corresponding to the first identity label and the access private key to the user equipment.
In a third aspect of the embodiments of the present invention, a management device based on a block chain is provided, including: memory, a processor and a computer program, the computer program being stored in the memory, the processor running the computer program to perform the method of the first aspect of the invention as well as various possible aspects of the first aspect.
A fourth aspect of the embodiments of the present invention provides a readable storage medium, in which a computer program is stored, the computer program being, when executed by a processor, configured to implement the method according to the first aspect of the present invention and various possible aspects of the first aspect.
The block chain-based management method and device provided by the invention can realize the storage of monitored data of user equipment, perform decentralized management on the user data, prevent the data from being falsified and stolen, improve the safety of the user data, and in addition, can also send the monitored data in an abnormal state to a user or receive query information of the user and send the monitored data to the user to realize information butt joint with the user equipment.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1, which is a flowchart illustrating a block chain based management method according to an embodiment of the present invention, an execution subject of the method shown in fig. 1 may be a software and/or hardware device. The execution subject of the present application may include, but is not limited to, at least one of: user equipment, network equipment, etc. The user equipment may include, but is not limited to, a computer, a smart phone, a Personal Digital Assistant (PDA), the above mentioned electronic equipment, and the like. The network device may include, but is not limited to, a single network server, a server group of multiple network servers, or a cloud of numerous computers or network servers based on cloud computing, wherein cloud computing is one type of distributed computing, a super virtual computer consisting of a cluster of loosely coupled computers. The present embodiment does not limit this. The method comprises the following steps of S101 to S104:
s101, responding to a label request of user equipment and an acquisition point, sending a first identity label to the user equipment, and sending a second identity label to the acquisition point, wherein the user equipment corresponds to the first identity label one to one, and the acquisition point corresponds to the second identity label one to one.
Specifically, in order to implement one-to-one storage of user data, the user equipment needs to be tagged, a different first identity tag is allocated to each user equipment, and the first identity tag is carried by subsequent information related to the user equipment, so that accurate correspondence of data is facilitated. In the same way, in order to realize the distinction of the acquisition points, the acquisition points are labeled, and different second identity labels are distributed to each acquisition point.
In practical application, the user device may be, for example, a personal device, specifically, a vehicle, and the first identity tag may be, for example, unique tag information such as a license plate number of the user device; the collection point may be, for example, a collection device of the road segment, and the second identity tag may be, for example, tag information having uniqueness such as a number of the collection point.
And S102, receiving monitored data of each user equipment acquired by each acquisition point according to each node, and performing link storage on the monitored data, wherein the monitored data is read by an access private key obtained by encrypting the second identity tag, and the monitored data comprises summary data and detailed data.
Specifically, referring to fig. 2, in the present solution, each node of the block chain is used to link and store the monitored data acquired by the acquisition point, it can be understood that the monitored data includes a second identity tag corresponding to the acquisition point, and in this embodiment, an access private key for reading the monitored data can be formed by using the second identity tag, so as to ensure the security of the data. It should be noted that, in the present solution, each node of the block chain is used to perform distributed storage on the user data, and decentralized management is performed, so that the user data is difficult to tamper and steal.
S103, if the monitored data is in an abnormal state, the summary data and the access private key are sent to the user equipment based on the first identity label.
Specifically, the monitored data may be in a normal state or an abnormal state, for example, the vehicle may be in an abnormal state, for example, the vehicle may overspeed or run a red light, that is, the vehicle is in an illegal state, and then the monitored data may be sent to the user equipment for prompting.
S104, receiving the query request sent by the user equipment, and sending the detailed data corresponding to the first identity label and the access private key to the user equipment.
In practical applications, the monitored data may be, for example, monitored data acquired by the capturing camera at the acquisition point for each user equipment, and may be, for example, picture data and interpretation data for the picture data.
The picture data may be detailed data, for example, and the interpretation data may be summary data, for example, for targeted transmission to the user. For example, the user may be reminded using summary data and instructed in detail using detailed data.
It can be understood that the monitored data is divided into summary data and detailed data, and at the beginning, the summary data only needs to be sent to the user, so that the data volume of the monitored data in the abnormal state transmitted by the node to the user equipment can be reduced, and the detailed data only needs to be sent to the user after the query information of the user is received, so that the data processing capacity is reduced, and the processing efficiency and the data throughput are improved.
In some embodiments, in order to maintain the user's rights and interests, the block chain-based management method further includes receiving complaint information of the user equipment, and performing link storage on the complaint information. Namely, if the user feels that the circulation information is wrong, the complaint information can be uploaded to the block chain.
In other embodiments, after the complaint information is stored in a link, the complaint information may be forwarded to a down-link verification node for verification, a verification result is generated, and the verification result is stored in a link. The complaint information can be verified through the down-link verification node, and meanwhile, the verification result is uploaded to indicate the authenticity of the complaint information.
On the basis of the above embodiment, before sending the summary data and the access private key to the user equipment based on the first identity tag if the monitored data is in an abnormal state, it is further determined that the monitored data is in an abnormal state based on a node in a preset period.
It can be understood that, because the amount of the user data is large, some of the streaming information may not need to be processed immediately, that is, the streaming information is not necessarily processed immediately.
On the basis of the above embodiment, after determining that the monitored data is in an abnormal state based on the node, the method may further include forwarding the monitored data to a trust authority for verification processing, generating a trust result, and if the trust result is true, determining the node as a trusted node.
It can be understood that, because the monitored data in the abnormal state may seriously affect the rights and interests of the user, the embodiment verifies the monitored data in the abnormal state by using the trust authority, and obtains the trust result, which may be true or false.
It should be noted that, when the result of the public trust is true, it indicates that the reliability of the node is high, and then the node can be used as a trusted node, and it can be understood that as the number of times of verification increases, a plurality of trusted nodes can be gradually screened out, and subsequently, data can be processed by using the trusted nodes, so that the reliability of the scheme is improved.
For example, the digest data and the access private key are sent to the user equipment based on the first identity tag, and the digest data and the access private key are sent to the user equipment based on the first identity tag according to the trusted node. It can be understood that the trusted nodes are used for processing data, and the reliability and the safety of data processing are improved.
In practical application, monitored data of one user equipment may have abnormal states for many times, and in order to further supervise a user, the times of abnormal states of each user equipment may be counted, evaluation information of each user equipment is generated based on the times, and the evaluation information is stored in a link manner. The evaluation information may be subsequently sent to other management terminals in the related field as a limitation to the user, taking the vehicle law violation as an example, for example, the evaluation information may be forwarded to a car rental system to form a supervision on the user equipment.
Referring to fig. 3, which is a schematic structural diagram of a management apparatus based on a block chain according to an embodiment of the present invention, the management apparatus based on a block chain includes:
the system comprises a label module, a label module and a data acquisition module, wherein the label module is used for responding to label requests of user equipment and an acquisition point, sending a first identity label to the user equipment and sending a second identity label to the acquisition point, the user equipment corresponds to the first identity label one by one, and the acquisition point corresponds to the second identity label one by one;
the acquisition module is used for receiving monitored data of each user equipment acquired by each acquisition point according to each node and performing link storage on the monitored data, wherein the monitored data is read by an access private key obtained by encrypting the second identity tag, and the monitored data comprises summary data and detailed data;
the judging module is used for sending the summary data and the access private key to the user equipment based on the first identity label if the monitored data is in an abnormal state;
and the query module is used for receiving a query request sent by the user equipment and sending the detailed data corresponding to the first identity label and the access private key to the user equipment.
The apparatus in the embodiment shown in fig. 3 can be correspondingly used to perform the steps in the method embodiment shown in fig. 1, and the implementation principle and technical effect are similar, which are not described herein again.
Referring to fig. 4, which is a schematic diagram of a hardware structure of a management device based on a block chain according to an embodiment of the present invention, themanagement device 40 based on a block chain includes: aprocessor 41,memory 42 and computer programs; wherein
Amemory 42 for storing the computer program, which may also be a flash memory (flash). The computer program is, for example, an application program, a functional module, or the like that implements the above method.
Aprocessor 41 for executing the computer program stored in the memory to implement the steps performed by the apparatus in the above method. Reference may be made in particular to the description relating to the preceding method embodiment.
Alternatively, thememory 42 may be separate or integrated with theprocessor 41.
When thememory 42 is a device independent of theprocessor 41, the apparatus may further include:
abus 43 for connecting thememory 42 and theprocessor 41.
The present invention also provides a readable storage medium, in which a computer program is stored, which, when being executed by a processor, is adapted to implement the methods provided by the various embodiments described above.
The readable storage medium may be a computer storage medium or a communication medium. Communication media includes any medium that facilitates transfer of a computer program from one place to another. Computer storage media may be any available media that can be accessed by a general purpose or special purpose computer. For example, a readable storage medium is coupled to the processor such that the processor can read information from, and write information to, the readable storage medium. Of course, the readable storage medium may also be an integral part of the processor. The processor and the readable storage medium may reside in an Application Specific Integrated Circuits (ASIC). Additionally, the ASIC may reside in user equipment. Of course, the processor and the readable storage medium may also reside as discrete components in a communication device. The readable storage medium may be a read-only memory (ROM), a random-access memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, an optical data storage device, and the like.
The present invention also provides a program product comprising execution instructions stored in a readable storage medium. The at least one processor of the device may read the execution instructions from the readable storage medium, and the execution of the execution instructions by the at least one processor causes the device to implement the methods provided by the various embodiments described above.
In the above embodiments of the apparatus, it should be understood that the Processor may be a Central Processing Unit (CPU), other general purpose processors, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), etc. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of a method disclosed in connection with the present invention may be embodied directly in a hardware processor, or in a combination of the hardware and software modules within the processor.
Finally, it should be noted that: the above embodiments are only used to illustrate the technical solution of the present invention, and not to limit the same; while the invention has been described in detail and with reference to the foregoing embodiments, it will be understood by those skilled in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some or all of the technical features may be equivalently replaced; and the modifications or the substitutions do not make the essence of the corresponding technical solutions depart from the scope of the technical solutions of the embodiments of the present invention.