Data trusted processing method and system fusing trusted computing and block chain

A technology of trusted computing and processing methods, applied in digital transmission systems, transmission systems, secure communication devices, etc., can solve the problem of insufficient design of trusted management methods, difficulty in ensuring data authenticity, lack of trusted data collection and data storage. letter management issues

Active Publication Date: 2022-05-13
ELECTRIC POWER RES INST OF STATE GRID ZHEJIANG ELECTRIC POWER COMAPNY +1
View PDF11 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0015] Although this solution ensures that the three links of data transmission, data calculation, and calculation conclusions cannot be tampered with through blockchain and privacy security calculations, it still lacks trusted management of data trusted collection and data storage, and it is difficult to guarantee the data that participates in the transmission. authenticity
[0016] Existing technical solution 2 is based on the openness, non-tampering, traceability and support for encrypted currency of the blockchain, and designs a trusted sharing method for medical and health data based on the blockchain, using the blockchain as the The basis of consensus management can gain the trust of medical and health data owners, medical and health data creators, medical and health data reviewers, and medical and health data viewers, and can ensure that the labor results of participants will be rewarded accordingly to solve the medical and health problems. The industry faces the problems of fragmentation of medical and health data, insufficient sharing of medical and health data, and privacy protection of medical and health data owners
[0017] However, this solution does not meet the current needs of users for user privacy protection, and the design of trusted management methods in the data transmission process is insufficient, and it is still difficult to meet the needs of trusted data collection and trusted supervision of the entire process of data sharing.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data trusted processing method and system fusing trusted computing and block chain
  • Data trusted processing method and system fusing trusted computing and block chain
  • Data trusted processing method and system fusing trusted computing and block chain

Examples

Experimental program
Comparison scheme
Effect test

specific Embodiment

[0169] A trusted data processing method that integrates trusted computing and blockchain,

[0170] Include the following steps:

[0171] In the first step, the meter implanted with the trusted computing module generates a message based on the collected energy data according to the protocol rules. The message includes equipment information, time information, and energy data information of the energy sensor, and sends the message through the communication module To the IoT gateway embedded in the Trusted Computing Module;

[0172] In the second step, after the message in the first step is successfully sent, the IoT gateway completes the identity verification of the source of the energy data, and sends the message to the energy data collection platform based on the trusted computing monitoring system;

[0173] In the third step, after the energy data collection platform in the second step receives the message, the energy data collection platform analyzes the message to obtain en...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a data trusted processing method and system fusing trusted computing and a block chain, and belongs to the technical field of energy data processing. The invention discloses a data trusted processing method and system fusing trusted computing and a block chain. The data trusted processing method and system are mainly used for solving the energy data trust problem before energy data is chained in the current block chain application process and the environment trusted problem of service computing. Aiming at the problem of credibility of uplink energy data, starting from two aspects of an Internet of Things acquisition end or an Internet of Things energy data acquisition platform, a method of fusing a credible computing technology and a block chain technology is adopted, and Internet of Things acquisition equipment, an oracle machine and an on-chain and off-chain energy data credible verification model are embedded through credible computing; the credibility of energy data collection, transmission and storage processes is realized, and the credibility of energy data collection is ensured in combination with security monitoring of credible computing. In order to solve the problem of a service computing environment, the invention provides a computing architecture combining trusted computing and a state channel, so that service computing is carried out on energy data under the condition of privacy protection.

Description

technical field [0001] The invention relates to a trusted data processing method and system that integrates trusted computing and blockchain, and belongs to the technical field of energy data processing. Background technique [0002] In the era of energy big data, the quantity and value of its data are rising rapidly. In addition to the rich value contained in the data itself, resource mining and analysis of data sources can create even greater economic and social value. On the other hand, the smart grid environment includes more participants, more technologies, and frequent data interactions, which improves energy efficiency. At the same time, because heterogeneous data needs to be integrated for processing, there are risks of data credibility and privacy leakage, and also more vulnerable to security attacks. Under the background of centralized storage, processing, and sharing of corporate data, sensitive information and privacy such as equipment operation information, ene...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/40H04L67/12G16Y30/10G16Y40/50
CPCH04L9/3297H04L9/3247H04L9/3236H04L63/0442H04L63/0876H04L63/123H04L63/126H04L67/12G16Y30/10G16Y40/50
Inventor 颜拥郭少勇陈锦前黄建平陈浩李钟煦韩嘉佳孙歆姚影
Owner ELECTRIC POWER RES INST OF STATE GRID ZHEJIANG ELECTRIC POWER COMAPNY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products