CN-122020733-A - Operation and maintenance record tamper-proof method for electromechanical equipment of highway based on block chain
Abstract
The application relates to the technical field of blockchains, in particular to a method for preventing operation and maintenance records of electromechanical equipment of an expressway based on a blockchain, which provides the following scheme that shadow log bits are pre-generated for each equipment according to time granularity in a block main chain and promise of the shadow log bits are solidified, and the actual operation and maintenance behaviors of each responsible main body are mapped to target shadow log bits in an activation recording mode by generating abstracts through corresponding operation and maintenance subchains; the device-side operating state generates a state digest over a time window and anchors to the backbone. And establishing an index relation between the state abstract in the time window and the shadow log bit activation condition, carrying out negative space comparison on the state abstract and the shadow log bit activation condition through rules such as field masks, bit sequence comparison, coverage judgment and the like, identifying a window with changed equipment state and corresponding log bit not activated, forming a negative space abnormal record, and writing the negative space abnormal record into a main chain. The structured constraint and record integrity verification of the operation and maintenance actions of the multi-responsibility main body are realized, and the reliability and traceability of the operation and maintenance records of the electric equipment are improved.
Inventors
- Zou Renchun
- LIAO XIANGXI
- DENG MINXIANG
- Chen Qici
Assignees
- 广西品为科技有限公司
Dates
- Publication Date
- 20260512
- Application Date
- 20260129
Claims (10)
- 1. The utility model provides a highway electromechanical device operation and maintenance record tamper-proof method based on block chain, is applied to the operation and maintenance record system of many responsible subjects, characterized in that, be provided with a block main chain in the operation and maintenance record system, the block main chain includes a plurality of operation and maintenance subchains, the responsible subjects with operation and maintenance subchains one-to-one, the method includes: According to equipment, a responsibility main body and time granularity, pre-generating at least one shadow log bit for each equipment at each time granularity, and writing the shadow log bit and a promise corresponding to the shadow log bit into a block main chain; When the operation and maintenance behavior is detected, the operation and maintenance record is used as an operation and maintenance subchain written into a corresponding responsibility main body, and operation and maintenance abstract data are generated; Determining a target shadow log bit corresponding to the operation and maintenance behavior, and modifying the state of the target shadow log bit in the block main chain; And in a preset time period, carrying out negative space comparison on each device in each time window based on shadow log bit state information in the block main chain and running state data corresponding to the device, generating a negative space abnormal record if a negative space condition exists, and writing the negative space abnormal record into the block main chain.
- 2. The method for tamper-proofing operation and maintenance records of electromechanical devices on a block chain according to claim 1, wherein the pre-generating at least one shadow log bit for each device at each time granularity comprises: performing combined coding on the identifier of each device, the identifier of the responsible main body and the time granularity, and generating a time window identifier of a corresponding time window according to the combined coding; Constructing at least one shadow log bit identifier based on the time window identifier, wherein the shadow log bit identifier comprises fields for distinguishing devices, responsibility subjects and time windows; calculating a first hash value for each shadow log bit identifier, and constructing commitment data based on the first hash value; forming a shadow log bit promise pair by the shadow log bit identification and corresponding promise data, packaging the shadow log bit promise pair through a consensus node of a block main chain, and writing the shadow log bit promise pair into a block to generate a pre-promise storage block which cannot be retracted; Wherein the shadow log bit promise pair is not allowed to be modified, replaced, or deleted after writing to the block backbone, and only allows status updates to be characterized by adding an activation record corresponding to the shadow log bit.
- 3. The blockchain-based highway electromechanical device operation and maintenance record tamper-resistant method of claim 2, wherein modifying the state of the target shadow log bit in the blockchain includes: Calculating a second hash value according to the operation and maintenance abstract data; constructing an activation record containing a shadow log bit identifier, an activation flag field and a second hash value; Packaging the activation record through transaction packaging logic of a block main chain to obtain a transaction structure body, wherein the transaction packaging logic comprises serializing the activation record, distributing a transaction identifier for a serialization result, writing a time stamp field in the transaction structure body, carrying out signature processing on the transaction structure body, and attaching the signature information to a transaction signature field of the transaction structure body; broadcasting the transaction structure to a consensus network of a block main chain, and determining whether to write the activation record into a new block or not based on a preset consensus algorithm through the consensus network; If a new block is not written, adding the activation record in an uncovered form, and carrying out chain association with the shadow log bit promise of the previous writing; If a new block is written, distributing an offset address in the block for the activation record in a data area of the new block, and writing a merck tree root hash containing the activation record in a block head; Wherein the activation flag field in the activation record is used to record a change in state of a shadow log bit, the activation process of which allows multiple activation records to be associated with the same shadow log bit to characterize one or more operations performed by the responsible agent within the same time window.
- 4. The method for tamper resistance of operation and maintenance records of a blockchain-based highway electromechanical device according to claim 1, wherein the collection of the device operation state data comprises: periodically acquiring equipment operation parameters through a monitoring terminal arranged on the electromechanical equipment side of the highway, wherein the operation parameters comprise at least one type of sensor data in the equipment; Dividing the operation parameters into corresponding time windows according to the time granularity; Calculating a third hash value for the operation parameters in each time window to form a device state abstract; Writing the equipment state abstract into the block main chain, and recording the root hash of the equipment state chain through the block main chain.
- 5. The method for tamper-proofing operation and maintenance records of electromechanical devices of a highway based on a blockchain as in claim 4, wherein the negative space alignment of the devices in each time window comprises: Constructing a time window index table for each device based on a shadow log bit identification set, a shadow log bit activation state set and a device state abstract set recorded in a block main chain, wherein the time window index table is used for carrying out one-to-one correspondence on the device state abstract and the shadow log bit set in a preset time window range; Locating a device state abstract according to the time window index table, and reading an internal field of the device state abstract, wherein the internal field comprises an operation parameter field acquired by the monitoring terminal and subjected to hash processing, and at least one abstract field for representing the internal state change of the device is extracted based on a preset field mask rule; reading shadow log bit identifiers bound with the time window index table, constructing a shadow log bit set, searching a corresponding activation record in a block main chain according to each shadow log bit identifier in the shadow log bit set, extracting an activation mark field in the activation record, and generating a shadow log bit activation state vector; And according to the abstract field and the shadow log bit activation state vector, combining a negative space judgment rule set at least comprising a threshold judgment rule, a bit sequence comparison rule and a field coverage rule to carry out comparison operation.
- 6. The method for tamper-proofing an operation and maintenance record of a blockchain-based highway electromechanical device according to claim 5, wherein said combining a negative space decision rule set comprising at least a threshold decision rule, a bit order comparison rule and a field coverage rule comprises: The threshold judgment rule is used for determining whether the abstract field meets a preset change condition in the current time window under the condition of not accessing the original operation parameters, and if not, writing an uncovered identifier into the comparison result; The bit sequence comparison rule is used for establishing a one-to-one correspondence comparison sequence between the shadow log bit set and the abstract field, and if the shadow log bit set and the abstract field do not correspond one to one, an uncovered identifier is written into the comparison result; The field coverage rule is used for writing an uncovered identifier into the comparison result according to the fact that all bits of the shadow log bit activation state vector are in the inactive mark; When the comparison operation outputs the uncovered identification in the time window, a negative space exception record is constructed, wherein the negative space exception record at least comprises a device identification field, a time window identification field, a shadow log bit identification set field, a device state abstract reference field and an uncovered identification field.
- 7. The method for tamper resistance of operation and maintenance records of electromechanical equipment of a highway based on a blockchain as claimed in claim 1, wherein the blockchain adopts a alliance chain structure, and participates as consensus nodes through a plurality of operation and maintenance responsibility subjects, equipment manufacturers and supervision units; the block main chain consensus algorithm comprises at least one of a Bayesian fault-tolerant algorithm, a practical Bayesian fault-tolerant algorithm and a weight voting type consensus algorithm, wherein the block main chain provides a unified record index and timestamp source for each operation and maintenance subchain.
- 8. The method for tamper resistance of a blockchain-based highway electromechanical device operation and maintenance record of claim 3, wherein the operation and maintenance summary data comprises at least one structured field generated internally through an operation and maintenance subchain; The structured field comprises at least one of an operation event type, an operation instruction code, a device component code, an operation tool identifier, an execution terminal identifier, an operator identifier and a signature field; The second hash value is written into an activation record containing the target shadow log bit identification, and is used for establishing a many-to-one reference relation between the operation and maintenance abstract data and the same shadow log bit in the block main chain.
- 9. The method for tamper resistance of operation and maintenance records of electromechanical equipment of a highway based on a blockchain as in claim 1, wherein the time granularity of the time window is a configurable parameter, and is adjusted according to equipment type, inspection frequency and operation and maintenance standard, wherein: The adjustment of the time windows comprises the steps of increasing the number of the time windows, shortening the length of the time windows and reassigning numbers to the generated time windows; the adjusted time window configuration is updated on the chain through the block backbone.
- 10. The method for preventing tampering of operation and maintenance records of electromechanical equipment of a highway based on a blockchain as defined in claim 1, wherein after the negative space exception record is written into the blockchain, an exception index table is constructed based on the negative space exception record, wherein the exception index table comprises an equipment identification index, a responsibility main body index, a time window index and a shadow log bit index field, the exception index table is verified based on a preset consensus algorithm through a consensus network, and the verified exception index table is additionally written into the blockchain.
Description
Operation and maintenance record tamper-proof method for electromechanical equipment of highway based on block chain Technical Field The application relates to the technical field of blockchain, in particular to a method for preventing operation and maintenance records of electromechanical equipment of an expressway from being tampered based on blockchain. Background In the long-term operation process of the highway electromechanical equipment, a plurality of main bodies need to carry out inspection, maintenance and fault treatment, and related operation and maintenance records are usually stored through independent recording platforms or internal databases of each unit. In the prior art, the recording structures, the recording modes and the time marks among different main bodies have larger differences, so that the recording of the same equipment in the same time period is difficult to form a complete link, and the inconvenience is brought to the follow-up tracing. Meanwhile, the existing operation and maintenance records are often based on result information, and the expression of the time relation and the behavior continuity is insufficient, so that the record integrity is difficult to verify through objective data. In addition, the existing operation and maintenance records are uploaded by the multi-dependence responsibility main body, a structuring means capable of identifying unrecorded behaviors is lacking, and once some operation and maintenance behaviors are not recorded, subsequent investigation and responsibility definition often cannot accurately locate the missing positions. In a cross-unit collaboration scene, an effective corresponding relation is lacking between the running state of the equipment and the operation and maintenance records, so that whether certain abnormal phenomena correspond to the existing operation and maintenance behaviors or not is difficult to judge by external examination, and the reliability and consistency of the records are difficult to guarantee. Along with the expansion of the scale of the electromechanical system, the quantity of equipment and the quantity of operation data are rapidly increased, the traditional mode of manually comparing is low in efficiency, and certain limitation exists in the process of processing large-scale and multi-main-body operation and maintenance links. In order to solve the problems, the application designs an operation and maintenance record tamper-proof method of the electromechanical equipment of the highway based on the block chain. Disclosure of Invention Aiming at the defects of the prior art, the application provides a tamper-proof method for operation and maintenance records of electromechanical equipment of a highway based on a block chain, shadow log bits are pre-generated for each equipment according to time granularity in a block main chain and promise is solidified, actual operation and maintenance behaviors of each responsible main body are generated into abstracts through corresponding operation and maintenance subchains and mapped to target shadow log bits in an activation record mode, and equipment side operation states are generated into state abstracts according to time windows and anchored to the main chain. And in a preset period, establishing an index relation between the state abstract in the time window and the shadow log bit activation condition, carrying out negative space comparison on the state abstract and the shadow log bit activation condition through rules such as field masks, bit sequence comparison, coverage judgment and the like, identifying a window with changed equipment state and corresponding log bit not activated, forming a negative space abnormal record, and writing the negative space abnormal record into a main chain. In order to achieve the above purpose, the present application provides the following technical solutions: The utility model provides a highway electromechanical device operation and maintenance record tamper-proof method based on block chain, is applied to the operation and maintenance record system of many responsible subjects, be furnished with a block main chain in the operation and maintenance record system, the block main chain includes a plurality of operation and maintenance subchains, responsible subjects with operation and maintenance subchains one-to-one, the method includes: According to equipment, a responsibility main body and time granularity, pre-generating at least one shadow log bit for each equipment at each time granularity, and writing the shadow log bit and a promise corresponding to the shadow log bit into a block main chain; When the operation and maintenance behavior is detected, the operation and maintenance record is used as an operation and maintenance subchain written into a corresponding responsibility main body, and operation and maintenance abstract data are generated; Determining a target shadow log bit corresponding to the operation and maintena