Search

CN-121980620-A - Full-generation periodic carbon data credibility verification method, system and related equipment

CN121980620ACN 121980620 ACN121980620 ACN 121980620ACN-121980620-A

Abstract

The embodiment of the application provides a method, a system and related equipment for verifying the trust of full-generation periodic carbon data, and belongs to the technical field of information security. According to the method, the data abstract of the carbon data is collected from the data collection terminal, the zero knowledge proof technology is adopted to verify the credibility rule of the carbon data on the data abstract to generate a proof file, and the privacy of the authenticity verification process of the carbon data is improved. The digital signature operation is carried out by sending the certification file and the data abstract to the trusted authority equipment so as to receive the signature file from the trusted authority equipment, wherein the signature file carries a time stamp, the signed certification file and the data abstract are included, the credibility of the carbon data is improved, the signature file is stored in an invariable log system adopting a hash chain recording mechanism, the carbon data can be prevented from being tampered, and the centralized storage mode can improve the interaction efficiency of the carbon data.

Inventors

  • LONG YUCHAO
  • DENG WANFA

Assignees

  • 天翼物联科技有限公司

Dates

Publication Date
20260505
Application Date
20251226

Claims (10)

  1. 1. The full-generation periodic carbon data credibility verification method is characterized by being applied to a data service end, and comprises the following steps of: Collecting a data abstract of carbon data from a data collection terminal; performing carbon data credibility rule verification on the data abstract by adopting a zero knowledge proof technology to generate a proof file; The certification file and the data abstract are sent to trusted authority equipment for digital signature operation so as to receive a signature file from the trusted authority equipment, wherein the signature file carries a time stamp and comprises the signed certification file and the signed data abstract; the signature file is stored in an immutable log system employing a hash chain recording mechanism.
  2. 2. The method of claim 1, wherein the full-generation periodic carbon data trust verification method further comprises the steps of: setting a first timing trigger task for each signature file in the invariable log system; and responding to a first trigger event of the first timing trigger task, adding the signature file to a public list, wherein the public list is configured with an external public interface.
  3. 3. The method of claim 1, wherein the full-generation periodic carbon data trust verification method further comprises the steps of: setting a second timing trigger task for each signature file in the invariable log system; Responding to a second trigger event of the second timing trigger task, and verifying the signature file by adopting a digital signature verification algorithm and a zero knowledge verification algorithm to obtain a verification result; And under the condition that the verification result represents abnormality, carrying out alarm operation on the signature file.
  4. 4. The method of claim 1, wherein the data acquisition terminal generates the data summary by: collecting carbon data, wherein the carbon data comprises carbon absorption data and carbon emission data; and formatting and standardizing the carbon data, and then adopting a first encryption algorithm to generate a data abstract.
  5. 5. The method of claim 4, wherein the verifying the trust rule of the carbon data for the data digest using a zero knowledge proof technique to generate a proof file comprises the steps of: Analyzing the data abstract into carbon data by adopting a first decryption algorithm corresponding to the first encryption algorithm; and verifying the carbon data credibility rule of the carbon data by adopting a zero knowledge proof technology to generate a proof file.
  6. 6. The method of claim 1, wherein the trusted authority device performs the digital signature operation by: Loading the certification file and the data abstract into a hardware security module so that the hardware security module adopts a private key to carry out asymmetric encryption operation on the certification file and the data abstract to obtain a signature file and a public key; And returning the signature file output by the hardware security module to the data service end, and disclosing the public key output by the hardware security module.
  7. 7. The method of claim 1, wherein the immutable log system stores the signature file by: Determining a hash chain of a last signature file based on a timestamp of the signature file currently submitted to the immutable log system; And carrying out hash operation on the hash chain and the current signature file to obtain the hash chain of the current signature file, and storing the hash chain.
  8. 8. A full-generation periodic carbon data trust verification system, comprising: The data acquisition terminal is used for acquiring carbon data and generating a data abstract of the carbon data; the data server is used for verifying the carbon data credibility rule of the data abstract by adopting a zero knowledge proof technology to generate a proof file; The trusted authority device is used for carrying out digital signature operation on the certification file and the data abstract to generate a signature file, wherein the signature file carries a time stamp and comprises the signed certification file and the signed data abstract; the data server is also used for storing the signature file in an invariable log system adopting a hash chain recording mechanism.
  9. 9. An electronic device comprising a memory storing a computer program and a processor implementing the method of any of claims 1 to 7 when the computer program is executed by the processor.
  10. 10. A computer program product comprising a computer program, characterized in that the computer program, when executed by a processor, implements the method of any one of claims 1 to 7.

Description

Full-generation periodic carbon data credibility verification method, system and related equipment Technical Field The application relates to the technical field of information security, in particular to a method, a system and related equipment for verifying the trust of full-generation periodic carbon data. Background In order to protect the global environment, higher requirements are put on carbon data acquisition, metering, monitoring and verification in various industries. During the carbon data collection, transmission, storage and verification process, the data may be tampered with or compromised. The centralized carbon registration system often requires the business to submit detailed, business-sensitive raw data when verifying the trustworthiness of the data, which constitutes an inherent contradiction between data transparency and business privacy. While there are techniques for protecting the privacy of carbon transaction data using zero knowledge proof, detailed data may not be provided during carbon data verification, current schemes typically combine zero knowledge proof techniques with blockchain techniques to construct a de-centralized carbon tracking and transaction system. However, blockchain technology has its inherent limitations such as high transaction costs, low transaction throughput, processing delays (potentially up to several minutes) and huge energy consumption, which limit its application in large-scale, high frequency data verification scenarios. Disclosure of Invention The embodiment of the application mainly aims to provide a full-generation period carbon data credibility verification method, system and related equipment, aiming at improving the privacy and safety of a carbon data verification process and improving the carbon data interaction efficiency. In order to achieve the above objective, an aspect of the embodiments of the present application provides a full-generation periodic carbon data trusted verification method, which is applied to a data server, and the full-generation periodic carbon data trusted verification method includes the following steps: Collecting a data abstract of carbon data from a data collection terminal; performing carbon data credibility rule verification on the data abstract by adopting a zero knowledge proof technology to generate a proof file; The certification file and the data abstract are sent to trusted authority equipment for digital signature operation so as to receive a signature file from the trusted authority equipment, wherein the signature file carries a time stamp and comprises the signed certification file and the signed data abstract; the signature file is stored in an immutable log system employing a hash chain recording mechanism. In some embodiments, the full-generation periodic carbon data trust verification method further comprises the steps of: setting a first timing trigger task for each signature file in the invariable log system; and responding to a first trigger event of the first timing trigger task, adding the signature file to a public list, wherein the public list is configured with an external public interface. In some embodiments, the full-generation periodic carbon data trust verification method further comprises the steps of: setting a second timing trigger task for each signature file in the invariable log system; Responding to a second trigger event of the second timing trigger task, and verifying the signature file by adopting a digital signature verification algorithm and a zero knowledge verification algorithm to obtain a verification result; And under the condition that the verification result represents abnormality, carrying out alarm operation on the signature file. In some embodiments, the data acquisition terminal generates the data summary by: collecting carbon data, wherein the carbon data comprises carbon absorption data and carbon emission data; and formatting and standardizing the carbon data, and then adopting a first encryption algorithm to generate a data abstract. In some embodiments, the verifying the trust rule of the carbon data for the data abstract by adopting a zero knowledge proof technology to generate a proof file comprises the following steps: Analyzing the data abstract into carbon data by adopting a first decryption algorithm corresponding to the first encryption algorithm; and verifying the carbon data credibility rule of the carbon data by adopting a zero knowledge proof technology to generate a proof file. In some embodiments, the trusted authority device performs a digital signature operation by: Loading the certification file and the data abstract into a hardware security module so that the hardware security module adopts a private key to carry out asymmetric encryption operation on the certification file and the data abstract to obtain a signature file and a public key; And returning the signature file output by the hardware security module to the data service end, and disclo