Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

A blockchain-based Internet of Things data transaction architecture and its transaction security method

A technology of the Internet of Things and blockchain, applied in the field of network communication, can solve the problem of wasting the value of Internet of Things data, hinder the circulation of Internet of Things data, etc., to achieve strong security, avoid data tampering, and ensure the effect of security.

Active Publication Date: 2020-08-18
UNIV OF ELECTRONICS SCI & TECH OF CHINA
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Aiming at the above-mentioned deficiencies in the prior art, the present invention provides a blockchain-based Internet of Things data transaction architecture and transaction security method with fast circulation speed, wide circulation range, high system reliability and good security, which realizes The decentralization of transactions solves the problem of the existence of a large number of IoT data islands in the existing technology due to centralized storage, which greatly hinders the circulation of IoT data and wastes the value contained in IoT data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A blockchain-based Internet of Things data transaction architecture and its transaction security method
  • A blockchain-based Internet of Things data transaction architecture and its transaction security method
  • A blockchain-based Internet of Things data transaction architecture and its transaction security method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052] The specific embodiments of the present invention are described below so that those skilled in the art can understand the present invention, but it should be clear that the present invention is not limited to the scope of the specific embodiments. For those of ordinary skill in the art, as long as various changes Within the spirit and scope of the present invention defined and determined by the appended claims, these changes are obvious, and all inventions and creations using the concept of the present invention are included in the protection list.

[0053] A blockchain-based IoT data transaction architecture, such as figure 1 shown, including:

[0054] Local wireless sensory network for the collection and transmission of IoT data;

[0055] The data providing node is used to receive the IoT data of the local wireless sensory network, call the data analysis interface defined in the client, perform statistical analysis on the collected IoT data, generate and send leaflets ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a block chain-based Internet of Things data transaction architecture, including: a local wireless perception network, data providing nodes, data consumption nodes, data storage nodes, leaflets, and transaction credentials; and an Internet of Things-based data transaction architecture The transaction security method comprises the following steps: S1, leaflet construction and sending stage; S2, data upload stage; S3, transaction preparation stage; S4, transaction processing stage; The existence of isolated islands of Internet data has greatly hindered the circulation of Internet of Things data and wasted the value contained in Internet of Things data.

Description

technical field [0001] The invention belongs to the technical field of network communication, and in particular relates to a blockchain-based Internet of Things data transaction architecture and a transaction security method thereof. Background technique [0002] The origin of blockchain technology and the publication of a paper called Bitcoin: A Peer-to-Peer Electro-nic Cash System by a scholar named Satoshi Nakamoto in 2008, and the subsequent release of Bitcoin was the first widely used The trustless cryptocurrency has been running smoothly for nearly ten years. Subsequently, on the basis of Bitcoin, many other forms of cryptocurrency emerged. The prosperity of cryptocurrency has led to the rapid development of its underlying blockchain technology, and new concepts such as smart contracts and smart property are derived from blockchain technology. came out and was quickly accepted by the market. A smart contract is a computerized transaction protocol that enforces the te...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06Q40/04G06Q20/06G06Q20/38G06F9/448H04L29/06H04L29/08H04L9/32
CPCH04L9/3236H04L67/104H04L67/1097H04L67/12G06F9/4482G06Q20/065G06Q20/382G06Q40/04H04L67/133
Inventor 廖丹裴黎爽张良嵩李慧金海焱张明
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products