Landing application of security blockchain technology

Jiadu Xintai Technology Co., Ltd. Xu Jianming

The development of blockchain technology in the security industry

As early as December 2016, the blockchain was first written into the "Notice of the State Council on Printing and Distributing the "13th Five-Year" National Informatization Plan" issued by the State Council as a strategic foreword technology and disruptive technology. With the strong support of national policies , the application of blockchain exploded, and in the field of security, blockchain also caters to the various needs of security and realizes more value. Blockchain, a new application model of computer technology, has the characteristics of distributed data storage, point-to-point transmission, consensus mechanism, encryption algorithm, etc., and one of the core features is: bookkeeping and recognition! . In a narrow sense, the blockchain is a chained data structure that combines data blocks in a sequential manner in chronological order, and is cryptographically guaranteed to be tamper-proof and unforgeable distributed ledgers. This distributed ledger is that the transaction bookkeeping is completed by multiple nodes distributed in different places, and each node records a complete account, so they can all participate in the supervision of the legality of the transaction, and at the same time they can jointly testify for it . Broadly speaking, blockchain technology uses block chain data structures to verify and store data, uses distributed node consensus algorithms to generate and update data, uses cryptography to ensure the security of data transmission and access, and uses automated scripts to A new distributed infrastructure and computing method for programming and manipulating data through smart contracts composed of code. The essence of blockchain is a distributed ledger technology. Through a series of high-tech combinations such as distributed data storage, consensus algorithms, encryption algorithms, and point-to-point transmission networks, it ensures that data cannot be tampered with and stored permanently. Data security protection is of great significance. The immutability and traceability of the blockchain ensure the real-time tracking of cargo information and the two-way security of product data, improving the transparency of the transportation process. Security is a major feature of blockchain technology. It uses a distributed storage architecture. The more nodes, the higher the security of data storage. It is also through the ingenious design of anti-tampering and decentralization. It is difficult for anyone not to follow Rules modify data. For security, the blockchain can disruptively solve some of the key issues facing the development of today's security products.

From the perspective of blockchain technology itself, because it stores data in a distributed chain structure according to time series, it has strong timing. The basic unit of blockchain storage is a block, which records the process and process of all state changes during storage. As a result, the newly added block retains all the information of the previous block, and each block is arranged and connected in the order of generation to form a linked list, which constitutes a blockchain. Due to its technical characteristics such as non-tampering, smart contracts, and distributed storage, the blockchain has built a unique trust mechanism and has been widely used in the urban field. Compared with traditional databases, blockchain has the following main features: First, distributed storage. Traditional distributed computing is to divide massive data into hundreds or thousands of fragments, and hand them over to multiple servers for parallel computing to realize fast computing of massive data. Blockchain distributed storage is to synchronize all data to every node of the network. There is no central node, and each node is equal and stores the entire database. Therefore, the more nodes in the distributed storage architecture of the blockchain, the higher the security of data storage. Second, it cannot be tampered with. Traditional databases have four classic operations of adding, deleting, modifying, and querying. The blockchain abandons "deleting and modifying" and only retains the two operations of "adding and checking". For the data of the whole network, encryption technology is used to ensure the security of information transmission, and the history of data transmission is superimposed into blocks over time and advances in one direction in strict chronological order. The irreversibility of time makes it easy to trace any attempt to intrude and tamper with blockchain data, leading to rejection by other nodes, thereby effectively limiting related illegal activities. The third is multi-party maintenance. A traditional database is an information system maintained by one party. Whether it is a distributed architecture or a centralized architecture, it has a high degree of control over data records. The blockchain introduces a consensus mechanism maintained by multiple parties. The written data is not unilaterally controlled by a single subject. It needs to be verified by multiple parties to form a consensus before it can be written. The change of data maintenance method enhances the consistency of data storage. The fourth is smart contracts. Traditionally, the flow of financial funds and the flow of business information are two completely different business processes. After the contract signed by business cooperation is manually reviewed and appraised, the financial department is notified to make payment to form a corresponding capital flow. Smart contracts are based on pre-agreed rules, and form a "built-in contract" that integrates and synchronizes information flow and capital flow through algorithmic codes to achieve automatic and intelligent contract performance.

The implementation of blockchain technology in the security industry is influenced by its industry characteristics, making the development and construction of new smart cities require blockchain. After several years of development, the new smart city has made considerable progress, but there are still some fundamental problems, including unclear development paths, insufficient data sharing, poor application experience, and institutional mechanisms. Among them, at the technical level, issues surrounding the "availability", "shareable", "manageable" and "trustworthy" of data are more prominent. There is an urgent need for urban infrastructure transformation. First, urban information infrastructure urgently needs to realize collaborative sharing. With the rapid development of urbanization in my country, the urban population and industrial carrying capacity continue to increase, and the urban information infrastructure will have more than 10 billion sensing terminals. At present, the information required by a single sensing terminal is relatively one-sided, and different sensing terminals belong to different providers, and the information coordination between devices needs to be aggregated to a unified platform. The efficiency of information coordination is low, and there are high business barriers. In addition, the development of smart cities follows a people-oriented approach and should provide all-round services for natural persons, legal persons, and cities. However, at present, cities in various regions still lack the information infrastructure for the integrated and coordinated development of "cloud, management, and terminal", resulting in weak information interaction and coordination capabilities for different objects and using different carriers. Second, the operation and control of traditional urban infrastructure urgently needs to be strengthened. In terms of energy, the intra-city and inter-city energy transmission network has basically been established. Taking electricity as an example, as urban power consumption continues to rise and the difference in urban peak power consumption becomes increasingly significant, intra-city and inter-city power operation dispatching and power companies and The contradictions in the transaction management of civilian power supply have become increasingly prominent, and the operation and management capabilities of energy facilities need to be improved urgently. In addition, in terms of urban pipe network, underground pipelines such as water supply, drainage, gas, heat, electricity, communication, radio and television, and industry have become important infrastructures to ensure the healthy operation of cities. However, with the rapid development of cities, the construction scale of underground pipelines is insufficient , The management level is not high and other problems are highlighted. The establishment of an underground comprehensive utility corridor operation and management system with unified planning, unified construction, and unified management also faces challenges such as many participants and large data scale. Urban data governance urgently needs to be overcome. One is the difficulty of urban data circulation and sharing. E-government applications continue to develop and deepen, generating a large amount of government data. Effective sharing of data resources has become the key to improving urban governance capabilities. However, government data is currently facing a situation of "powerful and weak". On the one hand, administrative divisions form a natural barrier. Government departments store a large amount of data on individuals, organizations, and activities. These data are scattered and stored in different systems in different departments, making it difficult to connect them. In addition, the repetitive construction of the government affairs system lacks a standardized and unified data structure and access interface, and it is difficult to achieve cross-departmental flow of business data. through sharing. On the other hand, government collaboration and sharing lacks mutual trust. Under the government information sharing principles of "who is in charge, who provides, and who is responsible" and "who handles, who uses, who manages, and who is responsible", it is difficult for current technical means to clearly define the ownership, use, and management of data circulation. There is a lack of effective mutual trust and sharing mechanisms among government departments. Second, it is difficult to supervise and control urban data. In urban governance, when it comes to sensitive matters such as major government investment projects, key projects, and social welfare services, the government’s regulatory oversight or lack of binding force may easily cause adverse social impacts. On the one hand, counterfeiting and tampering lead to weak supervision. For example, during the construction of a major government-invested project, the construction subject has illegal operations, misreported or concealed key activity information, such as misappropriating funds, tampering with documents or falsifying evidence afterwards. If these loopholes are not discovered in time, it is easy to lead to the absence of supervision. On the other hand, insufficient evidence makes it difficult to pursue accountability. Under the existing government information resource management framework, the whole-process management system of data collection, verification, processing, storage and use of business supervision is still not perfect, and there is a lack of full-process traceability methods based on data information. Once violations of laws and regulations occur, the lack of evidence will bring difficulties to the investigation and evidence collection. Third, it is difficult to effectively guarantee data security. In the process of smart city construction and development, the connection between people and people, things and things, and people and things will be accelerated, and intelligent products and services will continue to flow into urban management activities and people's daily life, generating a large amount of public and personal data. Privacy protection under the situation of urban digital development has become an important issue that cannot be avoided in urban data governance. Currently, privacy data leakage incidents occur frequently. As data producers, users lack data ownership and control in essence, and are often collected and sold by third-party platforms without consent, resulting in frequent large-scale leakage of user privacy data. In addition, authorized use of data has stalled. There are no clear regulations on the authorized use of data, the lack of safeguards for the safe use of data, and the difficulty in assessing potential risks. my country has made slow progress in promoting the authorized use of government data. Urban smart applications urgently need innovative breakthroughs. First, the cost of multi-subject participation in the construction of the credit system is high. The new smart city is an advanced stage of urban development. Urban smart applications must provide integrated and collaborative services across levels, regions, systems, departments, and businesses for different entities. The application of urban intelligence involves multiple participants such as the government, enterprises, and citizens. The cost of building a credit system among the participants is high. Innovative smart city applications urgently need to establish a good social credit system to solve the problem of trust among multiple participants. The second is accountability for accidents. The normal operation of a city involves all aspects, and a large number of daily events and emergencies Emergency incidents continue to occur, and related incidents have the characteristics of multiple types, multiple sources, multiple departments involved, and long processing procedures. Once an accident occurs, many parties involved have different opinions, and it is usually difficult to trace the cause and pursue accountability. Therefore, in the process of smart city construction, it is necessary to realize the whole life cycle, whole process, all elements, all-round digitalization, online and intelligentization of urban planning, construction and management, so that the cause of accidents can be traced and the responsibility can be traced. So, blockchain empowers security, what needs are specifically catered for, and what functions are realized:

  1. Blockchain can solve the privacy problem of video surveillance

  Taking the privacy incident of a smart camera as an example, how to use blockchain technology to avoid it? The use of blockchain technology can facilitate the establishment of a trust relationship between various nodes of the Internet of Things, that is, it can make mutual authentication between users and cameras, and even between various Internet of Things nodes more convenient. This requires further research and development of relevant application systems, starting from the common use and management of the system, in order to ensure the security of smart homes and protect user privacy.

  2. Blockchain technology helps to create a better intelligent transportation system

  Combined with blockchain technology, the intelligent transportation system can better improve road safety, alleviate traffic congestion, reduce energy consumption, reduce environmental pollution, improve the energy efficiency of the transportation system, strengthen the integration of traffic information, and better cooperate with traffic management and monitoring. For example, using blockchain technology to fine some traffic violations can be paid directly and instantly by blockchain electronic currency; solving urban parking problems, such as how to accurately find parking spaces, how to improve efficiency and realize post-payment of parking fees, blockchain technology Data capabilities and ledger management become very important, and the ledger blockchain will also have more applications in establishing a credit system based on parking data, which can improve the self-consciousness of car owners to a certain extent. As a cutting-edge technology, blockchain technology can open up various transportation systems from the aspects of traffic information, communication, control, vehicles and machinery, etc., so as to improve the current situation of transportation and remote objects, and make the existing and future limited transportation resources To maximize effectiveness and efficiency. Utilizing the semi-publicity of the blockchain, vehicles and currency addresses can be bound for vehicle authentication management, such as "electronic license plate numbers", and fines for some traffic violations can be paid instantly by electronic tokens (Token). Record the location of the car according to the blockchain, judge the traffic congestion, and intelligently guide the traffic. Intelligently adjust the toll standards of each road section. The tolls are different at different times and different road conditions, which can relieve traffic jams and improve road efficiency.

  3. Blockchain technology solves security data islands and data leakage

  Data islands and information leakage have become important obstacles to the development of the security industry for the industry. The emergence of new technologies such as blockchain has brought the possibility of solving these two problems for the security industry. In the traditional security system, the data openness of each platform system is low, and it is difficult to carry out multi-dimensional data fusion analysis. Taking face recognition as an example, it is not enough to rely solely on algorithm computing power to improve the recognition accuracy. It is also necessary to use large-scale multi-modal data integration including positioning and vehicles to achieve the purpose of tracking and analyzing targets. The decentralization, non-tamperable data, and permanent traceability of the blockchain can make the security data information play a better role in a short period of time through the distributed bookkeeping of the entire network, the win-win situation between the free public party and the data monopoly party. Great utility. In addition, the security issues of massive video data and feature data in the security industry have always attracted people's attention. Matters involving privacy and security have occurred from time to time, and information security has always been at the forefront. Although the blockchain system is public, advanced encryption technology is used in the data exchange process such as verification and transmission. This technology not only ensures the correct source of data, but also ensures that the data will not be intercepted in the middle process. If blockchain technology is more widely used, the probability of being attacked by hackers may also decrease, so blockchain systems are more secure than traditional systems.

The specific application of blockchain technology in the field of smart cities and its impact on the security industry

The specific application scenarios of blockchain technology in the field of smart cities are very rich, ranging from the most common small applications such as visitor access control systems to large systems such as emergency management, disaster prevention, mitigation and relief.

The rescue of major disasters in emergency management is a "huge and complex system". After the disaster occurs, the affected people, the government, enterprises, and volunteers all participate in the rescue. How to effectively deploy a large number of personnel and materials is the key to emergency management. As a new application model, blockchain has the advantages of distributed data storage, point-to-point transmission, consensus mechanism, encryption algorithm and other computer technologies, and provides a consistent, shareable but non-tamperable system that allows multiple parties to participate in maintenance. Distributed database for enhanced transparency, security and efficiency. Blockchain technology is a decentralized technology, and disasters are also decentralized events. Decentralized blockchain technology combined with decentralized disaster events can be applied to centralized emergency management, which can greatly improve efficiency.

First, blockchain smart contracts enable rapid disaster response. After the disaster occurs, the information must be reported to the government, and the government will mobilize supplies and resources to participate in emergency rescue. Blockchain smart contract technology can realize rapid response to disaster information, thereby providing point-to-point services, materials, and personnel, and improving emergency management efficiency.

  Secondly, blockchain finance and blockchain logistics avoid "confused accounts" for disaster relief. Rescue often involves investing a lot of equipment, resources, and supplies regardless of the cost, but how much is really needed? How much did you use? Where is it used? But it is difficult to count, so it is easy to form a "confused account". The blockchain has unchangeable properties. The blockchain logistics technology can track the flow of materials and effectively allocate and track resources. The blockchain financial technology can solve the settlement problem of disaster relief funds.

In addition, the blockchain "Bintian" technology can solve the problem of duplication and impersonation of donated materials. Blockchain is an important concept of Bitcoin. Bitcoin is the holder's proof of rights and interests. The more the number of holdings and the longer the time, the greater the rights and interests. The amount of coins multiplied by the number of days of holding is "coin days". Through the "Coin Sky" technology, you can know who has used the materials, how much has been used, and how much is still needed.

In the past year, the national emergency management department has paid more and more attention to the risk monitoring and early warning of hazardous chemicals, and in the six major links facing hazardous chemicals, the solution built by blockchain technology has played an important role.

For example: Among the six links above for hazardous chemicals, the blind spots in supervision are "black workshops". There are two common problems: First, black workshops have a certain proportion in each link, which is a major and difficult point in the blind spot. They often take advantage of regulatory loopholes to take advantage of loopholes, forming the existence of black workshop owners for the sake of profit. The chain is also formed by using the "black production" of hazardous chemicals, such as using the normal loss quota of production, storage, transportation and other links to accumulate, forming a rat-like buying and selling, forming black dens. Second, it is difficult to track the traceability of hazardous chemicals targeted by black workshop supervision. However, by using blockchain technology in the six major links of hazardous chemicals, applying it to electronic invoices, material flow, commodity production, supply and marketing, and linking each inbound and outbound action, it is impossible to implement artificial fraud of the unit quantity. A hidden danger point and a dangerous point are checked and eliminated. It has achieved the construction goals of unified command, upper and lower linkage, quick response, both special and regular work, and combination of peacetime and wartime. From the perspective of the entire emergency management system, blockchain technology can solve the problems of fragmented information systems in the field of emergency management and security governance and difficulty in sharing information. The application of blockchain technology can realize information sharing and authorized access, so that the monitoring system, equipment department, equipment use department and on-site command department can fully share information and share data within their respective authority, effectively improving emergency management and safety governance. . Blockchain technology can solve the risk of information trust in emergency management and security governance. The blockchain system has the characteristics of openness and transparency, and the information on the chain cannot be tampered with. It can realize the integrity and traceability of the data uploaded by each node, and it can well solve the information trust risk in the field of emergency management and security governance. Blockchain technology can solve the problem of low efficiency in emergency management and security governance. The blockchain system has the characteristics of smart contracts and consensus mechanisms. The information on the chain cannot be tampered with and can be automatically executed when the preset conditions are met. It is a good solution to the risks of low execution efficiency and inadequate execution in the field of emergency management and security governance. Blockchain technology can solve data disaster recovery backup and data security issues in the field of emergency management and security governance. The blockchain system is a distributed storage with a reliable database, and some nodes solve problems without affecting the normal operation of the entire system and the integrity of the database. What role can blockchain technology play in emergency management? Blockchain technology and emergency management are a natural combination, which can solve many problems such as management efficiency, rescue material deployment, and rescue fund settlement.

Blockchain technology is also very suitable for small applications ranging from the most common visitor access control system. Here, we take the access control system of an enterprise as an example to discuss the combination of QR code and blockchain to realize an anonymous QR code access control authorization. In the traditional access control system, the management of access personnel is mainly through card swiping, fingerprint, iris, or manual authorization. In the traditional access control management system, it is very convenient for internal employee management, and the functions are complete, especially in recent years with the rapid development of the Internet, more and more small and medium-sized enterprises have also begun to install their own access control systems to realize the internal management of the enterprise. Automatic management of staff entry and exit. Whether it is card swiping or fingerprint technology, it is necessary to collect the personal information of the entering and exiting personnel in advance, and then store it in the access control management system to realize management. This is very convenient for long-term internal employees, but it is not very convenient for temporary personnel who come in and out dynamically. For example, visitors who come to visit, or temporary maintenance workers for a few hours, etc., it is not a good way to issue cards or collect identity information for these temporary personnel, although it is also very fast. One is high cost, and the other is inconvenient management. The unit needs to prepare some spare cards in advance or collect data and store them in the access control system, or require customer service personnel to carry out reception management online all the time. Based on this consideration, we hope to find a way to solve temporary users’ needs for access control equipment. We thought of QR code recognition technology, which is due to the rapid development of mobile phones. Almost everyone in China has a mobile phone. This provides a feasible solution for creating an access control system with two-dimensional code authorization technology. The following figure is a schematic diagram of access control equipment based on QR code technology:

The rapid development of QR code technology and the widespread popularization of mobile devices such as mobile phones have made the above solution possible. Visitors can make an appointment for a door-to-door visit through mobile phones or the Internet, and then get a QR code authorization picture for temporary personnel, and then This QR code can be printed on paper or stored on a mobile phone. When it reaches the access control device, the access control device can recognize the QR code to realize the authorization management of visitors. Be unattended. We can successfully copy the two-dimensional code technology to the existing access control system, and only need to add two-dimensional code distribution and recognition functions to it, the cost is very low, and it also creates a good management cost-effectiveness, which reduces the management of the existing access control system Work difficulty, improve work efficiency.

On the basis of the QR code, we imagined such an application scenario, anonymous visitor authorization management, such as criminal investigation staff or special staff, need to enter a certain area, but it is indeed a legal need, or out of privacy Or security protection, we need to do this, we expect to only authorize those designated personnel who hold designated equipment, certificates, or certain rules. Then the following blockchain-based two-dimensional code authorization technology is a good solution. In this scheme, both units and visitors only trust one thing, which is the information on the blockchain. As long as they are on this chain, they have the possibility of obtaining authorization. The following figure is an analysis of the schematic diagram of the anonymous authorization of the two-dimensional code of the blockchain:

In this picture, visitors have obtained key data such as legal private keys and public keys through the blockchain, and the access control system only recognizes this information. Only with this information can they pass through the access control system. This creates a This opens up the possibility of going through the access control system completely anonymously.

The future development trend of blockchain technology

Intensive integration brought by blockchain technology will become the main theme of new smart cities in the future. The new type of smart city further strengthens overall planning, provides business integration, technology integration, and data integration, and provides cross-level, cross-region, cross-system, cross-department, and cross-industry collaborative services, including infrastructure co-construction and sharing, and data resource acceleration. Integration, core platform planning and application services are all in one. At the same time, the new smart city comprehensively promotes the co-construction and sharing of communication facilities, office pipelines, data centers, etc., accelerates the integration of data resources, and coordinates the planning of core platforms. Government data forms a data resource pool of "collection and storage", which is shared among departments in an orderly manner according to authority, and city data sharing and exchange platform services and third-party data services are used to realize urban master data covering governments, enterprises, and industries. ) resource system, providing integrated collaborative management and service capabilities for various smart application systems.

The data-driven and orderly governance empowered by blockchain technology has become the core proposition of the development of new smart cities. Traditional smart city construction only focuses on the development of the city's own internal system, but fails to realize the interconnection of the upper and lower levels and the linkage of the blocks. It is gradually difficult to connect the upper and lower systems, and the horizontal data resources cannot be connected. The construction of a new type of smart city not only requires the integration of the city's internal systems and data resources, but also requires coordination and cooperation with national and provincial management departments. Interconnection, to achieve the integration of vertical "strips" and horizontal "blocks", collaborative operation, and joint promotion of smart construction at the city level. At present, the construction of shared exchange platforms and basic databases in prefecture-level cities in my country is progressing rapidly. 81.7% of prefecture-level cities have built or are building shared exchange platforms, and 86.9% have built or are building basic databases. People-benefiting services are fully implemented, 65.6% of prefecture-level cities have started the construction of multi-card integration, more than 50% of prefecture-level cities have started to build intensive smart city management centers, and 43% of prefecture-level cities have launched "multi-grid integration" Work. The application of new technologies such as blockchain is greatly improving the supply capacity of smart cities. The blockchain is reshaping social trust and has become an important basis for maintaining the orderly operation and normal activities of smart cities. It has the characteristics of joint participation and maintenance of all network nodes, data cannot be tampered with and forged, and process execution is transparent and automated, which is conducive to comprehensive upgrades Smart city applications and services based on trust. Smart cities are building a new innovation ecosystem. In an open system, entrepreneurs, enterprises, innovation service organizations and other innovation subjects put forward various ideas around the needs of urban governance, public services, production efficiency, etc., and turn ideas into reality through the process of innovation and entrepreneurship. Major technological breakthroughs in the fields of blockchain, artificial intelligence, and mobile Internet of Things will lead to more unicorn companies in the field of smart cities in the future. As an emerging technology, blockchain has great application potential in many fields of new smart cities. In terms of infrastructure, combined with the construction of new smart cities, explore the realization of empowerment in the fields of information infrastructure, smart transportation, energy and electricity, and improve the level of intelligence and precision of urban management. In terms of data resources, the blockchain is expected to break the original data circulation and sharing barriers, provide high-quality data sharing guarantees, improve data management and control capabilities, and improve data security protection capabilities. In terms of smart applications, the blockchain will focus on smart city application scenarios such as services for the benefit of the people, precise governance, ecological livability, and industrial economy, and will give birth to new smart city application services.

Guess you like

Origin blog.csdn.net/jaminwm/article/details/124043877