CN109660514A - A kind of implementation method of smart machine system, smart machine control method and system - Google Patents
A kind of implementation method of smart machine system, smart machine control method and system Download PDFInfo
- Publication number
- CN109660514A CN109660514A CN201811359532.9A CN201811359532A CN109660514A CN 109660514 A CN109660514 A CN 109660514A CN 201811359532 A CN201811359532 A CN 201811359532A CN 109660514 A CN109660514 A CN 109660514A
- Authority
- CN
- China
- Prior art keywords
- user
- smart machine
- intelligent contract
- privately owned
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 71
- 230000006870 function Effects 0.000 claims abstract description 72
- 238000012795 verification Methods 0.000 claims description 23
- 230000004048 modification Effects 0.000 claims description 14
- 238000012986 modification Methods 0.000 claims description 14
- 239000002131 composite material Substances 0.000 claims description 10
- 150000001875 compounds Chemical class 0.000 claims description 10
- 238000012790 confirmation Methods 0.000 claims description 10
- 238000012217 deletion Methods 0.000 claims description 5
- 230000037430 deletion Effects 0.000 claims description 5
- 238000010586 diagram Methods 0.000 description 6
- 230000008859 change Effects 0.000 description 4
- 230000008569 process Effects 0.000 description 4
- 238000003860 storage Methods 0.000 description 3
- 230000008901 benefit Effects 0.000 description 2
- 230000007246 mechanism Effects 0.000 description 2
- 230000035945 sensitivity Effects 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000009826 distribution Methods 0.000 description 1
- 235000013399 edible fruits Nutrition 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000007613 environmental effect Effects 0.000 description 1
- 230000004927 fusion Effects 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0407—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3234—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3239—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Power Engineering (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Telephonic Communication Services (AREA)
- Telephone Function (AREA)
- Storage Device Security (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention discloses a kind of implementation method of smart machine system, smart machine control method and systems, belong to block chain technical field, and method includes: to constitute privately owned chain network to multiple smart machines of access to LAN;Each smart machine obtains the intelligent contract with multiple functions of user's publication respectively, and intelligent contract is deployed in privately owned chain network after user confirms;When smart machine receives the equipment initialization requests of user, user's sensitive data in equipment initialization requests is obtained by smart machine, and corresponding first initial information is generated to user's sensitive data;And call the increase function of intelligent contract that the first initial information is written in privately owned chain.User's sensitive data that smart machine is got is stored on privately owned chain by the embodiment of the present invention by intelligent contract, be can be avoided the leakage of user's sensitive data, is fully ensured that privacy and the safety of user's sensitive data.
Description
Technical field
The present invention relates to block chain technical field, in particular to a kind of implementation method of smart machine system, smart machine
Control method and system.
Background technique
Smart machine refers to any equipment, instrument or machine with calculation processing ability, with the day of science
It opens up increasingly, more and more smart machines occur in people's daily life, such as intelligent door lock, intelligent sound box, Intelligent air
Tune, smart television, Intelligent routing etc., these smart machines are linked into network by the WiFi of home router, then by intelligence
Can the application program of mobile phone control.
In the implementation of the present invention, inventor has found: many data of existing smart machine are all to be put into production
The cloud of manufacturer is stored, then is controlled by mobile phone terminal, be easy to cause the leakage of personal information, while illegal point in this way
Son also can use loophole altered data, achieve the purpose that control smart machine.
Summary of the invention
It is an object of that present invention to provide a kind of implementation method of smart machine system, smart machine control method and system,
User's sensitive data in smart machine is stored on privately owned chain by intelligent contract, can be avoided letting out for user's sensitive data
Dew, has fully ensured that privacy and the safety of user's sensitive data.
Specific technical solution provided in an embodiment of the present invention is as follows:
In a first aspect, providing a kind of implementation method of smart machine system, comprising:
Privately owned chain network is constituted to multiple smart machines of access to LAN;
Each smart machine obtains the intelligent contract with multiple functions of user's publication respectively, and through the user
The intelligent contract is deployed in the privately owned chain network after confirmation;
When the smart machine receives the equipment initialization requests of the user, as described in smart machine acquisition
User's sensitive data in equipment initialization requests;
Corresponding first initial information is generated to user's sensitive data, and calls the increase function of the intelligent contract
First initial information is written in privately owned chain.
Further, after privately owned chain step is written in the information by the increase function of calling the intelligent contract,
The method also includes:
When the smart machine receives the equipment of the user using request, set as described in smart machine acquisition
The standby user input data using in request, and corresponding information to be checked is generated to the user input data;And
The query function of the intelligent contract is called to inquire the information to be checked in the privately owned chain;
The smart machine determines whether to be used operation according to the query result of the intelligent contract.
Further, user's sensitive data is the initial fingerprint data of user input, described, described to described
User's sensitive data generates corresponding first initial information, and calls the increase function of the intelligent contract initial by described first
Information is written in privately owned chain, comprising:
Initial hash value is converted by the initial fingerprint data by the smart machine, and according to the initial hash value
Initial composite key is generated with the device id of the smart machine;
Value value is generated according to the entry time of the Starting mode of the smart machine and the initial fingerprint data;
Described in the initial composite key, the value value are accordingly written by the increase function of the intelligent contract
In privately owned chain.
Further, the user input data is the finger print data of the user, described to the user input data
Corresponding information to be checked is generated, and calls the query function of the intelligent contract to the information to be checked in the privately owned chain
In inquired, comprising:
Hash value is converted by the finger print data by the smart machine, and is set according to the hash value and the intelligence
Standby device id generates compound key;
Call the query function of the intelligent contract to inquire in the privately owned chain with the presence or absence of corresponding with the compound key
Value value, and receive the query result that the intelligent contract returns;
Wherein, the query result is used to indicate whether the smart machine allows to be used operation.
Further, the method also includes:
When the client receives equipment initialization requests of the user to the smart machine, by the client
End obtains the initial password set by user, and generates the corresponding second initial letter to the initial password using preset algorithm
Breath;And
The intelligence is accordingly written into the device id of the smart machine, second initial information and the preset algorithm
In the authentication function of energy contract, to be updated to the intelligent contract;
The intelligent contract is upgraded according to the confirmation operation of the user by each smart machine.
Further, it is described by each smart machine according to the confirmation operation of the user to the intelligent contract into
After row upgrade step, the method also includes:
When the smart machine receives the equipment of the user using request, the use is obtained by the smart machine
The input password at family;
The authentication function of the intelligent contract is called to generate corresponding letter to the input password using the preset algorithm
Breath, and verifying is compared in the information second initial information corresponding with the device id of the smart machine;
The verification result that the intelligent contract returns is received, and is determined whether to be used behaviour according to the verification result
Make.
Further, the preset algorithm is hash algorithm.
Further, the method also includes:
When the smart machine, which receives the user, requests the modification of user's sensitive data, the intelligence is called
The modification function of energy contract modifies to user's sensitive data;
When the smart machine receives removal request of the user to user's sensitive data, the intelligence is called
The deletion function of energy contract deletes user's sensitive data.
Second aspect, provides a kind of smart machine control method, and the method is applied to the intelligence in privately owned chain network
In equipment, the privately owned chain network is made of the smart machine and other smart machines, and the privately owned chain network is deployed with
The intelligent contract of user's publication, which comprises
When the smart machine receives the equipment of the user using request, set as described in smart machine acquisition
The standby user input data using in request;
Corresponding information to be checked is generated to the user input data, and calls the intelligent contract to described to be checked
Information is inquired in privately owned chain, wherein is previously stored in the privately owned chain based on the initial of user's sensitive data generation
Information;
It determines whether to be used operation according to the query result of the intelligent contract.
The third aspect, provides a kind of smart machine control method, and the intelligence that the method is applied in privately owned chain network is set
Standby upper, the privately owned chain network is made of the smart machine and other smart machines, and the privately owned chain network deployment is useful
The intelligent contract of family publication, which comprises
When the smart machine receives the equipment of the user using request, the use is obtained by the smart machine
The input password at family;
The intelligent contract is called, so that the intelligence contract generates phase to the input password using the preset algorithm
The information answered, and verifying is compared in information initial information corresponding with the device id of the smart machine, wherein institute
Stating initial information is generated based on the initial password set by user;
The verification result that the intelligent contract returns is received, and is determined whether to be used behaviour according to the verification result
Make.
Fourth aspect provides a kind of smart machine system, and the system comprises the multiple of client and access to LAN
Smart machine, multiple smart machines constitute privately owned chain network;
Each smart machine respectively include:
Contract obtains module, for obtaining user respectively described in other smart machines in the privately owned chain network
The intelligent contract with multiple functions of client publication;
Contract deployment module, for the intelligent contract to be deployed to the privately owned chain network after user confirmation
On;
Data acquisition module, for it is initial to obtain the equipment when receiving the equipment initialization requests of the user
Change user's sensitive data in request;
First generation module, for generating corresponding first initial information to user's sensitive data;And
Contract calling module, for calling the increase function of the intelligent contract that first initial information write-in is privately owned
In chain.
Further, the data acquisition module is also used to obtain when receiving the equipment of the user using request
The equipment uses the user input data in request;
First generation module is also used to the user input data and generates corresponding information to be checked;
Contract calling module is also used to call the query function of the intelligent contract to the information to be checked in the private
Have in chain and is inquired;
Each smart machine difference further include:
Control module is operated, for determining whether the smart machine allows quilt according to the query result of the intelligent contract
Use operation.
Further, user's sensitive data is the initial fingerprint data of user input, and described first generates mould
Block is specifically used for:
Initial hash value is converted by the initial fingerprint data, and according to the initial hash value and the intelligence is set
Standby device id generates initial composite key;And
Value value is generated according to the entry time of the Starting mode of the smart machine and the initial fingerprint data;
The contract calling module is specifically used for:
Described in the initial composite key, the value value are accordingly written by the increase function of the intelligent contract
In privately owned chain.
Further, the user input data is the finger print data of the user, and first generation module is specifically gone back
For:
Hash value is converted by the finger print data, and is generated according to the device id of the hash value and the smart machine
Compound key;
The contract calling module is specifically also used to:
Call the query function of the intelligent contract to inquire in the privately owned chain with the presence or absence of corresponding with the compound key
Value value, and receive the query result that the intelligent contract returns;
Wherein, the query result is used to indicate whether the smart machine allows to be used operation.
Further, the system also includes client, the client includes:
Password obtains module, for when receiving equipment initialization requests of the user to the smart machine, by
The client obtains the initial password set by user;
Second generation module, for generating corresponding second initial information to the initial password using preset algorithm;
Information writing module, for by the device id of the smart machine, second initial information and the pre- imputation
Method is accordingly written in the authentication function of the intelligent contract, to be updated to the intelligent contract;
Each smart machine difference further include:
Contract upgraded module, for being upgraded according to the confirmation operation of the user to the intelligent contract.
Further, the data acquisition module is specifically also used to:
When receiving the equipment of the user using request, the input password of the user is obtained;
The contract calling module is specifically also used to:
The authentication function of the intelligent contract is called, so that the intelligence contract is using the preset algorithm to the input
Password generates corresponding information, and by the information second initial information corresponding with the device id of the smart machine into
Row comparison;
The verification result that the intelligent contract returns is received, and is determined whether to be used behaviour according to the verification result
Make.
Further, the preset algorithm is hash algorithm.
Further, the contract calling module is specifically also used to:
When receiving modification request of the user to user's sensitive data, the modification of the intelligent contract is called
Function modifies to user's sensitive data;
When receiving removal request of the user to user's sensitive data, the deletion of the intelligent contract is called
Function deletes user's sensitive data.
Technical solution provided in an embodiment of the present invention has the benefit that
1, it is written in privately owned chain since the initial information that user's sensitive data generates passes through intelligent contract, and single intelligence is set
For that can not modify intelligent treaty content when being broken, all smart machines only broken through in privately owned chain network could pass through portion
The new intelligent contract of administration could be around the intelligent contract originally disposed, so that criminal is difficult to obtain user's sensitivity number
According to so that user's sensitive data is safer;
2, the embodiment of the present invention is stored in the privately owned chain of local area network due to user's sensitive data, avoids user's sensitive data
Leakage, so that criminal is difficult to obtain user's sensitive data, while user's sensitive data can only be operated and be read by user
It takes, thus avoids user's sensitive data in the prior art and store beyond the clouds or be stored in local safety issue;
3, since the multiple smart machines for constituting privately owned chain network are in access to LAN, so that criminal can not lead to
It crosses public network and carries out malicious attack;
4, compare in the prior art user's sensitive data storage beyond the clouds when, user must be connected by public network server into
Row authentication, since user's sensitive data is stored in the privately owned chain of local area network, user can be directly accessed the embodiment of the present invention
Local area network carries out authentication, and authentication is more efficient.
Detailed description of the invention
To describe the technical solutions in the embodiments of the present invention more clearly, make required in being described below to embodiment
Attached drawing is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the invention, for
For those of ordinary skill in the art, without creative efforts, it can also be obtained according to these attached drawings other
Attached drawing.
Fig. 1 is a kind of flow chart of the implementation method of smart machine system provided by the invention;
Fig. 2 is a kind of flow chart of the implementation method of smart machine system provided by the invention;
Fig. 3 is a kind of flow chart of the implementation method of smart machine system provided by the invention;
Fig. 4 is a kind of flow chart of the implementation method of smart machine system provided by the invention;
Fig. 5 is the configuration diagram of smart machine system provided by the invention;
Fig. 6 is the flow diagram of intelligent door lock secret number provided by the invention;
Fig. 7 is a kind of system block diagram of smart machine system provided by the invention.
Specific embodiment
To make the object, technical solutions and advantages of the present invention clearer, below in conjunction with attached in the embodiment of the present invention
Figure, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is only this
Invention a part of the embodiment, instead of all the embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art exist
Every other embodiment obtained under the premise of creative work is not made, shall fall within the protection scope of the present invention.
In the description of the present application, it is to be understood that term " first ", " second " etc. are used for description purposes only, without
It can be interpreted as indication or suggestion relative importance.In addition, in the description of the present application, unless otherwise indicated, the meaning of " multiple "
It is two or more.
Before the implementation method to smart machine system provided by the invention is illustrated, first to each implementation of the present invention
Term involved in example is introduced.
About block chain, block chain is a kind of by Distributed Storage, point-to-point transmission, common recognition mechanism, Encryption Algorithm
Etc. computer technologies fusion get up new application mode.According to the difference of block chain network centralization degree, 3 kinds are differentiated not
With the block chain under application scenarios:
1, the whole network discloses, the block chain of no user licensing scheme, referred to as publicly-owned chain;
2, network is added in the node for allowing to authorize, and information can be checked according to permission, is often used for inter-agency block chain,
Referred to as alliance's chain;
3, the node in all-network all rests in a mechanism hand, referred to as privately owned chain.
Embodiment one
Fig. 1 is a kind of flow chart of the implementation method of smart machine system provided by the invention, as shown in Figure 1, this method
It may comprise steps of:
101, privately owned chain network is constituted to multiple smart machines of access to LAN.
Wherein, multiple smart machines include but is not limited to intelligent door lock, intelligent sound box, intelligent air condition, smart television, intelligence
Routing etc..Smart machine can use sensor and collect the information such as user fingerprints data, environmental data, wherein sensor can
To integrate on intelligent devices, can also be attached by wired or wireless way and smart machine.
102, each smart machine obtains the intelligent contract with multiple functions of user's publication respectively, and confirms through user
Intelligent contract is deployed in privately owned chain network afterwards.
Wherein, intelligent contract have multiple functions, comprising: increase function, delete function, query function, modification function and
Authentication function;
Specifically, the process may include:
Each smart machine obtains the intelligent contract of user's one of in the following way publication respectively:
Client with contract issuing function;
The smart machine with contract issuing function in multiple smart machines;
Wherein, client specifically can be the terminal devices such as mobile terminal, individual PC.
After each smart machine is confirmed by user by button, intelligent contract is deployed in privately owned chain network.
103, when smart machine receives the equipment initialization requests of user, equipment initialization is obtained by smart machine and is asked
User's sensitive data in asking.
Wherein, user's sensitive data can be the user's characteristic informations such as user fingerprints data, iris data, can also be it
His sensitive data.
In the present embodiment, user needs to carry out initial after carrying out multiple smart machines deployment and constituting privately owned chain network
Change smart machine, the smart machine can be used so as to subsequent.It, can when user needs initialize smart machine
To be initialized using fingerprint input mode, by taking intelligent door lock as an example, user can be by sensor by the fingerprint number of oneself
According to being input in intelligent door lock, initialization intelligent door lock is carried out.
104, corresponding first initial information is generated to user's sensitive data, and calls the increase function of intelligent contract by the
One initial information is written in privately owned chain.
Specifically, converting initial hash value for initial fingerprint data by smart machine, and according to initial hash value and it is somebody's turn to do
The device id of smart machine generates initial composite key;When according to the typing of the Starting mode of smart machine and initial fingerprint data
Between generate value value;The increase function that initial composite key, value value passes through intelligent contract is accordingly written in privately owned chain.
In the specific implementation process, smart machine can be used hash algorithm and carry out hash operation to initial fingerprint data,
Generate initial hash value, wherein the hash algorithm can be any safe and reliable hash algorithm, such as SHA256, the close SM3 of state or
Close SM4 of state etc..
In the embodiment of the present invention, privately owned chain is written since the initial information that user's sensitive data generates passes through intelligent contract
In, and when single smart machine is broken, can not modify intelligent treaty content, only break through all intelligence in privately owned chain network
Energy equipment could could bypass the intelligent contract originally disposed by disposing new intelligent contract, so that criminal is difficult to
User's sensitive data is obtained, while user's sensitive data can only be operated and be read by user, so that user's sensitivity number
According to safer;Simultaneously as the multiple smart machines for constituting privately owned chain network are in access to LAN, so that criminal
Malicious attack can not be carried out by public network;In addition, compare in the prior art, when user's sensitive data is stored beyond the clouds, user
It must be connected into server by public network and carry out authentication, the embodiment of the present invention is privately owned since user's sensitive data is stored in local area network
In chain, user can be directly accessed local area network and carry out authentication, and authentication is more efficient.
Further, method provided in an embodiment of the present invention can also include:
When smart machine receives the modification request of user to user sensitive data, the modification function of intelligent contract is called
It modifies to user's sensitive data;When smart machine receives the removal request of user to user sensitive data, intelligence is called
The deletion function of energy contract deletes user's sensitive data.
In the embodiment of the present invention, by the modification function of intelligent contract or delete function, convenient for user's sensitive data into
Row modification is deleted.
Further, method provided in an embodiment of the present invention can also include:
By smart machine by the operation note to user's sensitive data on privately owned chain, so that user traces and looks into
It sees.
In the embodiment of the present invention, by the operation note to user's sensitive data on privately owned chain, user can be prevented quick
Sense data are illegally inquired, are distorted, and then can fully ensure that privacy and the safety of user's sensitive data.
Embodiment two
Fig. 2 is a kind of flow chart of the implementation method of smart machine system provided by the invention, in this embodiment, the intelligence
The implementation method of energy device systems further includes step 201~204, in order to describe letter other than including step described in Fig. 1
For the sake of clean, step described in Fig. 1 is omitted.As shown in Fig. 2, the implementation method of the smart machine system further include:
201, when smart machine receives the equipment of user using request, equipment is obtained by smart machine and is used in request
User input data.
In the present embodiment, user can carry out corresponding operation to smart machine after completing to initialize smart machine.With
For intelligent door lock, when user needs to open intelligent door lock, unlatching intelligent door lock can be carried out by the way of fingerprint input,
Finger print data is input in intelligent door lock by sensor.
202, corresponding information to be checked is generated to user input data.
Wherein, which is the finger print data of user.
Specifically, convert hash value for finger print data by smart machine, and setting according to hash value and the smart machine
Standby ID generates compound key, using as information to be checked.
In the specific implementation process, smart machine can be used hash algorithm and carry out hash operation to user input data,
Generate hash value, wherein the hash algorithm can be any safe and reliable hash algorithm, such as SHA256, the close SM3 of state or state are close
SM4 etc..
203, it calls the query function of intelligent contract to treat query information to be inquired in privately owned chain.
Specifically, calling the query function of intelligent contract to inquire in privately owned chain with the presence or absence of corresponding with compound key
Value value, and receive the query result that intelligent contract returns;Wherein, query result is used to indicate whether smart machine allows quilt
Use operation.
204, smart machine determines whether to be used operation according to the query result of intelligent contract.
Wherein, when query result indicates successful inquiring, then smart machine permission is used operation, when query result indicates
When inquiry failure, then smart machine does not allow to be used operation.
In the embodiment of the present invention, user use smart machine when, obtain the input data of user and generate accordingly to
Query information, by calling the query function of intelligent contract to be inquired accordingly, so that smart machine is returned according to intelligent contract
Return query result determine whether to be used operation, thus, it is possible to avoid smart machine from being controlled by criminal.
Embodiment three
Fig. 3 is a kind of flow chart of the implementation method of smart machine system provided by the invention, in this embodiment, the intelligence
The implementation method of energy device systems further includes step 301~304, in order to describe letter other than including step described in Fig. 1
For the sake of clean, step described in Fig. 1 is omitted.As shown in figure 3, the implementation method of the smart machine system further include:
301, it when the client of user receives equipment initialization requests of the user to smart machine, is obtained by client
Initial password set by user.
In the present embodiment, user needs to carry out initial after carrying out multiple smart machines deployment and constituting privately owned chain network
Change smart machine, the smart machine can be used so as to subsequent.When user needs initialize smart machine, remove
Except can be using fingerprint input mode initialization smart machine, it can also be set using password input mode initialization intelligence
It is standby.By taking intelligent door lock as an example, the door-opening password of cell phone client setting intelligent door lock is can be used in user, carries out initialization intelligence
Door lock.
302, corresponding second initial information is generated to initial password using preset algorithm.
Wherein, which is hash algorithm.
Specifically, hash algorithm, which can be used, in client carries out hash operation to initial password, initial hash value is generated,
In, which can be any safe and reliable hash algorithm, such as SHA256, the close SM3 of state or the close SM4 of state etc..
303, the device id of smart machine, the second initial information and preset algorithm are accordingly written to the verifying of intelligent contract
In function, to be updated to intelligent contract.
304, intelligent contract is upgraded according to the confirmation operation of user by each smart machine.
Specifically, upgrading after each smart machine is confirmed by user by button to intelligent contract.
In the embodiment of the present invention, since the second initial information that initial password set by user generates is write by intelligent contract
Enter in privately owned chain, when user needs to change initial password, can be realized by the upgrading of contract.
Example IV
Fig. 4 is a kind of flow chart of the implementation method of smart machine system provided by the invention, in this embodiment, the intelligence
The implementation method of energy device systems further includes step 401~403, in order to describe letter other than including step described in Fig. 3
For the sake of clean, step described in Fig. 3 is omitted.As shown in figure 4, the implementation method of the smart machine system further include:
401, when smart machine receives the equipment of user using request, the input for obtaining user by smart machine is close
Code.
In the present embodiment, user can carry out corresponding operation to smart machine after completing to initialize smart machine.With
For intelligent door lock, when user needs to open intelligent door lock, unlatching intelligent door lock can be carried out by the way of Password Input,
Entered a password into intelligent door lock by mobile client.
402, the authentication function of intelligence contract is called, so that intelligent contract generates accordingly input password using preset algorithm
Information, and verifying is compared in information the second initial information corresponding with the device id of smart machine.
Specifically, calling the authentication function of intelligent contract by smart machine, input password is carried out by intelligent contract
Verifying is compared with the hash operation result for the initial password that intelligent contract is written in the hash operation result by hash operation,
Generate verification result;Wherein, verification result is used to indicate whether smart machine allows to be used operation.
403, the verification result that intelligent contract returns is received, and is determined whether to be used operation according to verification result.
Wherein, verification result is used to indicate whether smart machine allows to be used operation.
Wherein, when verification result expression is verified, then smart machine permission is used operation, when verification result indicates
It is obstructed out-of-date to verify, then smart machine does not allow to be used operation.
In the embodiment of the present invention, when user uses smart machine, the input password of user is obtained, and by calling intelligence
The authentication function of contract is verified accordingly, so that smart machine determines whether to permit according to the verification result that intelligent contract returns
Perhaps operation is used, thus, it is possible to avoid smart machine from being controlled by criminal.
Embodiment five
The embodiment of the invention provides a kind of smart machine control method, the method is applied to the intelligence in privately owned chain network
Energy equipment, privately owned chain network are made of smart machine and other smart machines, and privately owned chain network is deployed with the intelligence of user's publication
Energy contract, method include:
501, when smart machine receives the equipment of user using request, equipment is obtained by smart machine and is used in request
User input data.
Specifically, the step is identical as step 201, it is not repeated here herein.
502, corresponding information to be checked is generated to user input data.
Specifically, the step is identical as step 202, it is not repeated here herein.
503, it calls intelligent contract to treat query information to be inquired in privately owned chain, wherein be stored in advance in privately owned chain
There is the initial information generated based on user's sensitive data.
Specifically, the step is identical as step 203, it is not repeated here herein.
504, it is determined whether to be used operation according to the query result of intelligent contract.
Specifically, the step is identical as step 204, it is not repeated here herein.
In the embodiment of the present invention, user use smart machine when, obtain the input data of user and generate accordingly to
Query information, by calling intelligent contract to be inquired accordingly, so that the inquiry knot that smart machine is returned according to intelligent contract
Fruit determines whether to be used operation, and thus, it is possible to avoid smart machine from being controlled by criminal.
Embodiment six
The embodiment of the present invention provides a kind of smart machine control method, and the intelligence that method is applied in privately owned chain network is set
Standby, privately owned chain network is made of smart machine and other smart machines, and privately owned chain network is deployed with the intelligence conjunction of user's publication
About, method includes:
601, when smart machine receives the equipment of user using request, the input for obtaining user by smart machine is close
Code;
Specifically, the step is identical as step 401, it is not repeated here herein.
602, intelligent contract is called, so that intelligent contract generates corresponding information to input password using preset algorithm, and
Verifying is compared in information initial information corresponding with the device id of smart machine, wherein initial information is set based on user
What fixed initial password generated;
Specifically, the step is identical as step 402, it is not repeated here herein.
603, the verification result that intelligent contract returns is received, and is determined whether to be used operation according to verification result.
Specifically, the step is identical as step 403, it is not repeated here herein.
In the embodiment of the present invention, when user uses smart machine, the input password of user is obtained, and by calling intelligence
Contract is verified accordingly, so that smart machine determines whether to be used behaviour according to the verification result that intelligent contract returns
Make, thus, it is possible to avoid smart machine from being controlled by criminal.
Method, which is provided for the embodiments of the invention, below with reference to Fig. 5 and Fig. 6 makees exemplary illustration.Assuming that access to LAN
Multiple smart machines include intelligent door lock, intelligent sound box, smart television and Intelligent routing, sheet is executed to multiple smart machine
After the method for inventive embodiments, the configuration diagram of obtained smart machine system is referred to shown in Fig. 5.If user uses
Intelligent door lock opens the door, as shown in fig. 6, Fig. 6 is the flow diagram of intelligent door lock secret number provided by the invention, user
Password is inputted, intelligent door lock calls the authentication function of intelligent contract to be verified accordingly, and when the authentication succeeds, intelligent door lock is permitted
Perhaps opening door operation.
Embodiment seven
Fig. 7 is a kind of system block diagram of smart machine system provided by the invention, which may include client and connect
Entering multiple smart machines of local area network, multiple smart machines constitute privately owned chain network, as shown in fig. 7, it is clear for ease of description, under
Face only carries out the smart machine system based on block chain with client 710 and positioned at the smart machine 710 of privately owned chain network
Explanation, wherein smart machine 720 is configured as any one in multiple smart machines:
Client 710 includes:
Contract release module 711, for having the intelligence of multiple functions to the publication of each smart machine of privately owned chain network
Contract;
Smart machine 720 includes:
Contract obtains module 721, for obtaining the intelligence of user's publication respectively with other smart machines in privately owned chain network
It can contract;
Contract deployment module 722, for intelligent contract to be deployed to privately owned chain network after user confirms;
Data acquisition module 723, for obtaining equipment initialization requests when receiving the equipment initialization requests of user
In user's sensitive data;
First generation module 724, for generating corresponding first initial information to user's sensitive data;And
Contract calling module 725, for calling the increase function of intelligent contract that the first initial information is written in privately owned chain.
Further, data acquisition module 723 are also used to obtain equipment when receiving the equipment of user using request
Use the user input data in request;
First generation module 724 is also used to user input data and generates corresponding information to be checked;
Contract calling module 725, be also used to call the query function of intelligent contract treat query information in privately owned chain into
Row inquiry;
Smart machine 720 further include:
Control module 726 is operated, for determining whether smart machine allows to be used according to the query result of intelligent contract
Operation.
Further, user's sensitive data is the initial fingerprint data of user's input, and the first generation module 724 is specifically used
In:
Initial hash value is converted by initial fingerprint data, and is generated according to the device id of initial hash value and smart machine
Initial composite key;And
Value value is generated according to the entry time of the Starting mode of smart machine and initial fingerprint data;
Contract calling module is specifically used for:
The increase function that initial composite key, value value passes through intelligent contract is accordingly written in privately owned chain.
Further, user input data is the finger print data of user, and the first generation module 724 is specifically also used to:
Hash value is converted by finger print data, and generates compound key according to hash value and to the device id of smart machine;
Contract calling module 725 is specifically also used to:
Call the query function of intelligent contract to inquire with the presence or absence of value value corresponding with compound key in privately owned chain, and
Receive the query result that intelligent contract returns;
Wherein, query result is used to indicate whether smart machine allows to be used operation.
Further, client 710 further include:
Password obtains module 712, for when receiving equipment initialization requests of the user to smart machine, by client
Obtain initial password set by user;
Second generation module 713, for generating corresponding second initial information to initial password using preset algorithm;
Information writing module 714, for accordingly writing the device id of smart machine, the second initial information and preset algorithm
In the authentication function for entering intelligent contract, to be updated to intelligent contract;
Smart machine further include:
Contract upgraded module 727, for being upgraded according to the confirmation operation of user to intelligent contract.
Further, data acquisition module 723 is specifically also used to:
When receiving the equipment of user using request, the input password of user is obtained;
Contract calling module 725 is specifically also used to:
The authentication function of intelligent contract is called, so that intelligent contract generates corresponding letter to input password using preset algorithm
Breath, and verifying is compared in information the second initial information corresponding with the device id of smart machine;
The verification result that intelligent contract returns is received, and is determined whether to be used operation according to verification result.
Further, preset algorithm is hash algorithm.
Further, contract calling module 725 is specifically also used to:
When the modification for receiving user to user sensitive data is requested, call the modification function of intelligent contract quick to user
Sense data are modified;
When receiving the removal request of user to user sensitive data, call the deletion function of intelligent contract quick to user
Sense data are deleted.
It should be understood that in smart machine system provided by the above embodiment, only with the division of above-mentioned each functional module
It is illustrated, in practical application, can according to need and be completed by different functional modules above-mentioned function distribution, i.e., will
The internal structure of device is divided into different functional modules, to complete all or part of the functions described above.In addition, above-mentioned
The implementation method and smart machine control method embodiment of smart machine system and smart machine system belong to same design,
Specific implementation process and beneficial effect are detailed in embodiment of the method, and which is not described herein again.
Those of ordinary skill in the art will appreciate that realizing that all or part of the steps of above-described embodiment can pass through hardware
It completes, associated hardware can also be instructed to complete by program, the program can store can in a kind of computer
It reads in storage medium, storage medium mentioned above can be read-only memory, disk or CD etc..
The foregoing is merely presently preferred embodiments of the present invention, is not intended to limit the invention, it is all in spirit of the invention and
Within principle, any modification, equivalent replacement, improvement and so on be should all be included in the protection scope of the present invention.
Claims (12)
1. a kind of implementation method of smart machine system characterized by comprising
Privately owned chain network is constituted to multiple smart machines of access to LAN;
Each smart machine obtains the intelligent contract with multiple functions of user's publication respectively, and confirms through the user
The intelligent contract is deployed in the privately owned chain network afterwards;
When the smart machine receives the equipment initialization requests of the user, the equipment is obtained by the smart machine
User's sensitive data in initialization requests;
Corresponding first initial information is generated to user's sensitive data, and calls the increase function of the intelligent contract by institute
The first initial information is stated to be written in privately owned chain.
2. the method according to claim 1, wherein the increase function of calling the intelligent contract will be described
Information is written after privately owned chain step, the method also includes:
When the smart machine receives the equipment of the user using request, obtaining the equipment by the smart machine makes
With the user input data in request;
Corresponding information to be checked is generated to the user input data, and calls the query function of the intelligent contract to described
Information to be checked is inquired in the privately owned chain;
The smart machine determines whether to be used operation according to the query result of the intelligent contract.
3. method according to claim 1 or 2, which is characterized in that user's sensitive data is user input
Initial fingerprint data, it is described that corresponding first initial information is generated to user's sensitive data, and call the intelligent contract
Increase function first initial information is written in privately owned chain, comprising:
Initial hash value is converted by the initial fingerprint data by the smart machine, and according to the initial hash value and right
The device id of the smart machine generates initial composite key;
Value value is generated according to the entry time of the Starting mode of the smart machine and the initial fingerprint data;
The initial composite key, the value value are accordingly written by the increase function of the intelligent contract described privately owned
In chain.
4. according to the method described in claim 3, it is characterized in that, the user input data is the fingerprint number of the user
According to, it is described that corresponding information to be checked is generated to the user input data, and call the query function pair of the intelligent contract
The information to be checked is inquired in the privately owned chain, comprising:
Hash value is converted by the finger print data by the smart machine, and according to the hash value and the smart machine
Device id generates compound key;
Call the query function of the intelligent contract to inquire in the privately owned chain with the presence or absence of corresponding with the compound key
Value value, and receive the query result that the intelligent contract returns;
Wherein, the query result is used to indicate whether the smart machine allows to be used operation.
5. the method according to claim 1, wherein the method also includes:
When the client of the user receives equipment initialization requests of the user to the smart machine, by the visitor
Family end obtains the initial password set by user;
Corresponding second initial information is generated to the initial password using preset algorithm;
The intelligence is accordingly written in the device id of the smart machine, second initial information and the preset algorithm to close
In authentication function about, to be updated to the intelligent contract;
The intelligent contract is upgraded according to the confirmation operation of the user by each smart machine.
6. according to the method described in claim 5, it is characterized in that, it is described by each smart machine according to the user's
After confirmation operation carries out upgrade step to the intelligent contract, the method also includes:
When the smart machine receives the equipment of the user using request, obtain the user's by the smart machine
Input password;
The authentication function of the intelligent contract is called, so that the intelligence contract is using the preset algorithm to the input password
Corresponding information is generated, and the information second initial information corresponding with the device id of the smart machine is compared
To verifying;
The verification result that the intelligent contract returns is received, and is determined whether to be used operation according to the verification result.
7. method according to claim 5 or 6, which is characterized in that the preset algorithm is hash algorithm.
8. the method according to claim 1, wherein the method also includes:
When the smart machine, which receives the user, requests the modification of user's sensitive data, the intelligence is called to close
Modification function about modifies to user's sensitive data;
When the smart machine receives removal request of the user to user's sensitive data, the intelligence is called to close
Deletion function about deletes user's sensitive data.
9. a kind of smart machine control method, which is characterized in that the method is applied on the smart machine in privately owned chain network,
The privately owned chain network is made of the smart machine and other smart machines, and the privately owned chain network is deployed with user's publication
Intelligent contract, which comprises
When the smart machine receives the equipment of the user using request, obtaining the equipment by the smart machine makes
With the user input data in request;
Corresponding information to be checked is generated to the user input data, and calls the intelligent contract to the information to be checked
It is inquired in privately owned chain, wherein the initial information generated based on user's sensitive data is previously stored in the privately owned chain;
It determines whether to be used operation according to the query result of the intelligent contract.
10. a kind of smart machine control method, which is characterized in that the method is applied to the smart machine in privately owned chain network
On, the privately owned chain network is made of the smart machine and other smart machines, and the privately owned chain network is deployed with user
The intelligent contract of publication, which comprises
When the smart machine receives the equipment of the user using request, obtain the user's by the smart machine
Input password;
The intelligent contract is called, so that the intelligence contract generates accordingly the input password using the preset algorithm
Information, and verifying is compared in information initial information corresponding with the device id of the smart machine, wherein it is described first
Beginning information is generated based on the initial password set by user;
The verification result that the intelligent contract returns is received, and is determined whether to be used operation according to the verification result.
11. a kind of smart machine system, which is characterized in that multiple the system comprises multiple smart machines of access to LAN
The smart machine constitutes privately owned chain network;
Each smart machine respectively include:
Contract obtains module, more for obtaining having for user's publication respectively with other smart machines in the privately owned chain network
The intelligent contract of kind function;
Contract deployment module, for the intelligent contract to be deployed to the privately owned chain network after user confirmation;
Data acquisition module is asked for when receiving the equipment initialization requests of the user, obtaining the equipment initialization
User's sensitive data in asking;
First generation module, for generating corresponding first initial information to user's sensitive data;And contract calls mould
Block, for calling the increase function of the intelligent contract that the initial information is written in privately owned chain.
12. system according to claim 11, which is characterized in that
The data acquisition module is also used to obtain the equipment when receiving the equipment of the user using request and use
User input data in request;
First generation module is also used to the user input data and generates corresponding information to be checked;
Contract calling module is also used to call the query function of the intelligent contract to the information to be checked in the privately owned chain
In inquired;
Each smart machine difference further include:
Control module is operated, for determining whether the smart machine allows to be used according to the query result of the intelligent contract
Operation.
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811359532.9A CN109660514B (en) | 2018-11-15 | 2018-11-15 | Implementation method of intelligent equipment system, intelligent equipment control method and system |
PCT/CN2019/106753 WO2020098382A1 (en) | 2018-11-15 | 2019-09-19 | Implementation method for smart device system, smart device control method and system |
CA3160728A CA3160728A1 (en) | 2018-11-15 | 2019-09-19 | Method of realizing intelligent equipment system, method of controlling intelligent equipement, and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811359532.9A CN109660514B (en) | 2018-11-15 | 2018-11-15 | Implementation method of intelligent equipment system, intelligent equipment control method and system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109660514A true CN109660514A (en) | 2019-04-19 |
CN109660514B CN109660514B (en) | 2020-06-09 |
Family
ID=66112020
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811359532.9A Active CN109660514B (en) | 2018-11-15 | 2018-11-15 | Implementation method of intelligent equipment system, intelligent equipment control method and system |
Country Status (3)
Country | Link |
---|---|
CN (1) | CN109660514B (en) |
CA (1) | CA3160728A1 (en) |
WO (1) | WO2020098382A1 (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110716745A (en) * | 2019-10-21 | 2020-01-21 | 星矿科技(北京)有限公司 | Method for constructing off-center community by using block chain and intelligent contract |
CN111046078A (en) * | 2019-11-11 | 2020-04-21 | 北京海益同展信息科技有限公司 | Block chain-based credit investigation query method and device and electronic equipment |
WO2020098382A1 (en) * | 2018-11-15 | 2020-05-22 | 苏宁云计算有限公司 | Implementation method for smart device system, smart device control method and system |
CN112637274A (en) * | 2020-12-04 | 2021-04-09 | 山西特信环宇信息技术有限公司 | Cone block chain terminal and access method thereof |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113347185B (en) * | 2021-06-01 | 2023-04-18 | 佳乔(深圳)投资有限公司 | Internet of things equipment management method based on block chain |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107341702A (en) * | 2017-03-08 | 2017-11-10 | 阿里巴巴集团控股有限公司 | A kind of method and device of business processing |
CN107622385A (en) * | 2017-08-28 | 2018-01-23 | 南京邮电大学 | A kind of copyright distributing method based on block chain intelligence contract |
CN108171430A (en) * | 2017-12-29 | 2018-06-15 | 深圳市轱辘车联数据技术有限公司 | Data processing method, mobile unit and UBI analysis centers server |
KR101881045B1 (en) * | 2017-11-15 | 2018-07-23 | 주식회사 가온시스템 | System and method for providing medical information based on block chain |
CN108364180A (en) * | 2018-01-31 | 2018-08-03 | 复旦大学 | A kind of shared electricity transaction method based on block chain |
CN108460290A (en) * | 2017-12-27 | 2018-08-28 | 江苏省卫生统计信息中心 | A kind of Electronic Health Record management system and method |
CN108494090A (en) * | 2018-04-16 | 2018-09-04 | 华东师范大学 | A kind of energy net connection intelligent apparatus and system based on block chain |
CN108717861A (en) * | 2018-04-16 | 2018-10-30 | 上海交通大学 | A kind of medical data sharing method based on block chain |
US20180315055A1 (en) * | 2017-05-01 | 2018-11-01 | International Business Machines Corporation | Blockchain For Issue/Defect Tracking System |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107306183B (en) * | 2016-04-22 | 2021-12-21 | 索尼公司 | Client, server, method and identity verification system |
CN106796685A (en) * | 2016-12-30 | 2017-05-31 | 深圳前海达闼云端智能科技有限公司 | Block chain authority control method and device and node equipment |
WO2019036831A1 (en) * | 2017-08-21 | 2019-02-28 | 达闼科技成都有限公司 | Information selection method, apparatus, electronic device and computer-readable storage medium |
CN108647966A (en) * | 2018-05-09 | 2018-10-12 | 深圳市融讯科技有限公司 | A kind of data interactive method and device based on block chain |
CN109660514B (en) * | 2018-11-15 | 2020-06-09 | 苏宁易购集团股份有限公司 | Implementation method of intelligent equipment system, intelligent equipment control method and system |
-
2018
- 2018-11-15 CN CN201811359532.9A patent/CN109660514B/en active Active
-
2019
- 2019-09-19 WO PCT/CN2019/106753 patent/WO2020098382A1/en active Application Filing
- 2019-09-19 CA CA3160728A patent/CA3160728A1/en active Pending
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107341702A (en) * | 2017-03-08 | 2017-11-10 | 阿里巴巴集团控股有限公司 | A kind of method and device of business processing |
US20180315055A1 (en) * | 2017-05-01 | 2018-11-01 | International Business Machines Corporation | Blockchain For Issue/Defect Tracking System |
CN107622385A (en) * | 2017-08-28 | 2018-01-23 | 南京邮电大学 | A kind of copyright distributing method based on block chain intelligence contract |
KR101881045B1 (en) * | 2017-11-15 | 2018-07-23 | 주식회사 가온시스템 | System and method for providing medical information based on block chain |
CN108460290A (en) * | 2017-12-27 | 2018-08-28 | 江苏省卫生统计信息中心 | A kind of Electronic Health Record management system and method |
CN108171430A (en) * | 2017-12-29 | 2018-06-15 | 深圳市轱辘车联数据技术有限公司 | Data processing method, mobile unit and UBI analysis centers server |
CN108364180A (en) * | 2018-01-31 | 2018-08-03 | 复旦大学 | A kind of shared electricity transaction method based on block chain |
CN108494090A (en) * | 2018-04-16 | 2018-09-04 | 华东师范大学 | A kind of energy net connection intelligent apparatus and system based on block chain |
CN108717861A (en) * | 2018-04-16 | 2018-10-30 | 上海交通大学 | A kind of medical data sharing method based on block chain |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2020098382A1 (en) * | 2018-11-15 | 2020-05-22 | 苏宁云计算有限公司 | Implementation method for smart device system, smart device control method and system |
CN110716745A (en) * | 2019-10-21 | 2020-01-21 | 星矿科技(北京)有限公司 | Method for constructing off-center community by using block chain and intelligent contract |
CN111046078A (en) * | 2019-11-11 | 2020-04-21 | 北京海益同展信息科技有限公司 | Block chain-based credit investigation query method and device and electronic equipment |
CN111046078B (en) * | 2019-11-11 | 2023-09-05 | 京东科技信息技术有限公司 | Credit investigation method and device based on block chain and electronic equipment |
CN112637274A (en) * | 2020-12-04 | 2021-04-09 | 山西特信环宇信息技术有限公司 | Cone block chain terminal and access method thereof |
Also Published As
Publication number | Publication date |
---|---|
CA3160728A1 (en) | 2020-05-22 |
CN109660514B (en) | 2020-06-09 |
WO2020098382A1 (en) | 2020-05-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP7051766B2 (en) | Self-provisioning access control | |
CN109660514A (en) | A kind of implementation method of smart machine system, smart machine control method and system | |
US20240330424A1 (en) | Locking device biometric access | |
CN111464556B (en) | Portable user terminal | |
US10219154B1 (en) | Frictionless or near-frictionless 3 factor user authentication method and system by use of triad network | |
US20080290988A1 (en) | Systems and methods for controlling access within a system of networked and non-networked processor-based systems | |
US20140354401A1 (en) | Resource Management Based on Biometric Data | |
CN108091011A (en) | Method and system of the verification technique to equipment progress permission control is unified by the testimony of a witness | |
CN103544749A (en) | Cloud control access control management system and authentication method thereof | |
US20200098208A1 (en) | Security control device, security control method, security system and storage medium | |
CN110535880A (en) | The access control method and system of Internet of Things | |
CN110766850B (en) | Visitor information management method, access control system, server and storage medium | |
KR102093145B1 (en) | Object Storage Cloud System for optimization data on basis of biometrics | |
CN115240300A (en) | Control method, system and device of intelligent security system and storage medium | |
US20220046016A1 (en) | Access to physical resources based through identity provider | |
CN106933605A (en) | A kind of intelligent progress recognizing control method and system | |
CN109584421A (en) | A kind of intelligent door lock authentication administrative system based on domestic safety chip | |
CN113240836A (en) | Bluetooth lock connection method adopting two-dimensional code and related configuration system | |
KR101133210B1 (en) | Mobile Authentication System and Central Control System | |
CN108460872A (en) | The control method and device of smart lock | |
CN109955934A (en) | Electric vehicle identity authorization system and method | |
US20120068814A1 (en) | Systems and methods of operating a secured facility | |
US20230075252A1 (en) | Methods, systems, apparatus, and devices for controlling access to access control locations | |
CN106856471A (en) | AD domains login authentication method under 802.1X | |
Catuogno et al. | Flexible and robust enterprise right management |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |