Industrial Internet of Things terminal system design, data verification method and hardware acceleration device
An industrial Internet of Things and terminal system technology, applied in the field of hardware acceleration devices and industrial Internet of Things terminal system design, can solve the threats to the implementability and practicability of the Industrial Internet of Things, irregular data uploading process, lack of chaining equipment, etc. question
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0053] This embodiment is a specific implementation of the design of an industrial Internet of Things terminal system.
[0054] see Figure 1-10 , Industrial Internet of Things terminal system design, it is based on the characteristics of data information in the industrial field, and is implemented by a lightweight and customized blockchain data structure, which includes data acquisition nodes, data storage nodes, data verification nodes, and cloud servers;
[0055] The data acquisition node includes acquisition sensor, SHA256 encryption algorithm implementation unit, RSA encryption algorithm implementation unit, data transmission module and acquisition control unit;
[0056] The data storage node includes a data maintenance module, a data buffer pool, a data storage medium, a data uplink control module, a network connection module and a data receiving module;
[0057] The cloud server includes a network connection module, a central processing unit and a data storage unit.
...
Embodiment 2
[0091] This embodiment is a specific implementation manner of a data verification method designed for an industrial Internet of Things terminal system.
[0092] The data verification method for industrial IoT terminal system design includes the following steps:
[0093] Step 1: Receive the data to be verified, the complete blockchain data and the characteristic machine code corresponding to the collection terminal;
[0094] Step 2: Implement the data to be verified by the public key generated by the feature machine code in Step 1 using the RSA decryption algorithm to obtain a digest;
[0095] Step 3: Obtain the Merkle tree and Merkle tree root values of the block header of the blockchain in Step 1;
[0096] Step 4: Select the necessary data in the Merkle tree from the lookup table, and obtain the compressed value after implementing the SHA256 encryption algorithm multiple times with the digest of step 2;
[0097] Step 5: Compare the compressed value in Step 4 with the root...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


