20 16 12 "Blockchain" was first written into the Notice of the State Council on Printing and Distributing the 13th Five-Year National Informatization Plan. The prison system should keep up with the pace and actively explore new development paths. Blockchain technology was first put forward in a paper published by Satoshi Nakamoto in 2008, and then went through the blockchain in turn.
Nowadays, the development of blockchain technology has attracted great attention at home and abroad. The following three aspects describe the development of blockchain technology in recent years.
Supervision level of foreign systems:
2065438+On June 4th, 2005, NYDFS released BitLincense, a regulatory framework for digital cryptocurrency companies. On 20 15, 10, the Obama administration and private companies formed a "blockchain alliance" partnership to monitor and prevent the use of digital cryptocurrency for illegal purposes.
20 16 65438+ 10/9 h, the British government announced "Distributed General Ledger Technology: Beyond Blockchain"; 20 16 February, Council of Europe (EC) announced the European financial supervision plan against money laundering and terrorism.
2065438+On May 25th, 2007, the Defense Advanced Research Projects Agency asked Indian Technology and Manufacturing Company (ITAMCO) to develop a platform using blockchain protocol.
Development level of education and scientific research:
2065438+September 2005, Xiao Feng and Tai Fang founder Vitalik Buterin and Bitstock co-founder Shen Bo jointly established the "Blockchain Lab" to promote blockchain science and technology education;
20 16 University of California at Berkeley implements undergraduate education for prisoners in blockchain;
2065438+In March 2008, a number of scholars from Oxford University jointly initiated and established the first university "Woolf University" based on blockchain technology.
Enterprise application research level:
Many enterprises at home and abroad are committed to the architectural design and application promotion of blockchain. As mentioned in the literature, TransActiveGrid, a New York State electric power company, has established a microgrid network. Linux Foundation put forward the super ledger project on 20 15; 2065438+On May 3, 20061day, Tencent's blockchain cooperation alliance (Shenzhen) in financial applications was established; China People's Bank establishes digital currency Institute 20 17.
Although the blockchain technology has made great progress, it needs to be further strengthened in terms of feasibility, security and supervision. It is estimated that it will take 5~ 10 years to reach maturity. With the gradual improvement of blockchain technology, based on the concept that theory should always guide practice, blockchain technology has been widely used, otherwise it will only be a virtual concept.
There are many successful examples of blockchain applied to medicine. For example, Guardtime, the world's largest blockchain company, uses the negotiation between blockchain nodes to improve the security protection of data in smart medical care and realize the safe storage of 1 10,000 data. However, there are few cases in which blockchain technology is applied to prison informatization.
For smart prisons, security is the basic condition for all business development, and information security and data security are the core elements. By analyzing the problems existing in the current prison informatization construction, this paper discusses how to reduce the trust process based on blockchain technology, provide safe and reliable data storage, improve work processing efficiency, and make necessary knowledge reserves for the application of blockchain in prison system.
Analysis on the present situation of intelligent prison
1. 1 the concept of smart prison
Smart Prison integrates the environment, people flow and information flow in the prison system by using the Internet, cloud computing and big data, realizes digital information collection, networked information transmission and intelligent information management with smart communication and smart control, builds a data linkage mechanism, and uses data mining to form prison big data, analyze big data and build a smart prison.
1.2 Analysis of Intelligent Prison Problems
Up to now, all prisons in China have basically laid out intelligent alarm systems, prison walls and comprehensive access control systems. The level of prison informatization construction has been significantly improved, but there is still a gap with the ideal state, mainly in the following aspects:
The degree of information enjoyment is low.
The problem of data barrier has seriously hindered the informatization of prisons. The information of developmental criminals is diverse, complementary and complex. Prison data integration is low, lack of information sharing mechanism, and it is difficult to form a synergistic effect. There is cross-entry of information in the system, which results in redundant storage and waste of police force.
The accuracy of information is difficult to guarantee.
Most of the existing database construction is based on basic data, such as criminal information system, which must ensure the accuracy of information and can be used as judicial basis. However, at present, due to human or error, the identity information is biased and the prison sentence data is inaccurate, which seriously damages the image of law enforcement.
The information security mechanism is imperfect.
The information security architecture is immature, the details are unclear, the specific management lacks security standards, and the application lacks practical experience, which can not guarantee the complete storage and safe transmission of information, and the information may be lost, leaked and tampered with.
Leaks in early warning equipment are inevitable.
The ratio of alarm equipment largely determines the safety of prison. The current access control system has added one door after another, and the isolation net wall is also built one after another. But after all, it is a "material" defense line, and there are still many technical problems to be solved. For example, the positioning technology based on video roll call and bar code scanning sometimes leads to inaccurate roll call.
High-investment video surveillance is mainly used for obtaining evidence afterwards, and it is impossible to make full use of big data to analyze criminals' telephone records, behavior habits, social circles, family background and other information. And make necessary monitoring and early warning and intelligent image analysis to avoid the possibility of escape or suicide.
Advantages of blockchain technology
Blockchain uses data encryption technology to store data blocks in the form of chain storage structure. Each block includes a block head and a block. The block header stores the hash value of the previous block, similar to a pointer, and the block stores the verified legal record and timestamp.
Blockchain uses P2P and * * * knowledge mechanism to establish the trust of distributed storage nodes;
Using smart contracts to realize the automatic execution of transactions and accurate operation without external interference;
Using "script" to automatically manipulate data and realize programmable database.
Blockchain may become a protocol to create trust, similar to HTTP protocol and TCP/IP protocol, using computer programming language to develop decentralized products.
Data storage: Blockchain is a decentralized storage structure, and multiple nodes form an end-to-end network. Each node has equal status, and the failure of individual nodes will not affect the whole system, which can solve the problem of poor enjoyment within the prison system;
If you change the data of a block in the blockchain, you must change all the data behind the block, so this is difficult to achieve. The mechanism of the blockchain itself realizes that even insiders cannot change it, ensuring that the data in the prison system cannot be changed once it is online;
The more nodes connected in the blockchain, the higher the security. When six blocks are connected behind the blockchain, it is almost impossible to tamper with the information, which is called the stable state circle, which can realize the reliable storage of data in the intelligent prison.
Data traceability: use the chain storage structure of time stamp and encryption technology to ensure that every transaction can be traced back. Realize data forensics operation in smart prison. Blockchain nodes use mutual authentication to ensure accuracy. If they are in doubt about the transaction, they can use the backtracking transaction records to accurately judge the authenticity. For example, the product information of the prison production workshop is stored in the chain, and the product information includes the traceability information of the accessories and the inspection certificate of the accessories, so that the quality qualification of the products can be detected.
Data transaction: All data transmission is based on the public key address, not on the real identity of the individual. Blockchain transactions are done anonymously, but their true identity cannot be known. Anonymous function provides security protection for informants; Blockchain is a network that creates trust. Nodes operate according to rules, realizing the trust of the whole system. The data records and rules of blockchain are transparent. Anyone can query the data through the public interface, and it cannot be changed artificially, so that all the data of the prison system can be uploaded to the blockchain and transmitted in real time.
Data security: Blockchain can be regarded as a set of protocols that use encryption algorithms and * * * knowledge mechanisms to ensure that data is not tampered with. Blockchain uses the longest chain as proof of workload. As long as the long chain is created by honest miners, the blockchain is safe, and the timestamp is used to identify orders and avoid repeated transactions.
Blockchain uses hash function to ensure the ownership of data, as shown in table 1.
Satoshi Nakamoto of the United States put forward the probability theory model of Poisson distribution. After calculating a new hash header, it will be recognized only after adding n headers (name, entry, lamp, etc.). ), which is difficult to achieve when the attacker does not have more than 5 1% computing power. The probability of an attacker catching up with the Z block is as follows: p represents the probability of an honest person finding the next node, and 0 represents the probability of an attacker finding the next node.
The analysis shows that with the increase of Z, the chances of catching up are getting smaller and smaller. Therefore, it is proved that the special structure of blockchain can not be tampered with by mathematical methods.
Research on the Application of Blockchain Technology
Blockchain is divided into public chain, alliance chain and private chain. Because private chain mainly provides a safe, traceable, tamper-proof and automatic computing platform, which can avoid internal and external attacks on data at the same time, it conforms to a fair, just, strict and reliable prison environment.
First, the blockchain is used to save information and ensure that it cannot be changed.
Secondly, realize information sharing and build a good cross-platform collaboration.
Using IPFS (Interstellar File System) to encrypt and save data, and combining with smart contract to realize information protection and * * * enjoyment. The blockchain system is connected with the original system through the interface, which actually protects the original information system. IPFS includes block exchange, hash table, etc. When you save a file, you will get the fingerprint of the file. After you get the document, you take it out for verification and then return it.
3. 1 Feasibility analysis
In the field of smart prisons, the decentralization of blockchain can integrate different data resources into a blockchain, and use the distributed storage of blockchain combined with certain cloud storage technology to realize the storage of smart prison information.
Use the * * * knowledge mechanism of blockchain to realize information anonymity and ensure privacy protection. * * * The knowledge mechanism is to confirm the transaction by voting. The * * * knowledge mechanism of blockchain ensures that all honest miners' blockchain prefixes are the same, and at the same time ensures that the information released by honest miners will be added to their own blockchain by other honest miners. * * * Knowledge mechanism has power of PoW (proof of work) and financial power of PoS (proof of interest). The faster the blockchain runs, the higher the cost.
The data encryption hash algorithm is used to solve the permission problem of * * *, which ensures that the data cannot be tampered with and reduces the trust risk of the system. Apply blockchain to intelligent prisons, save the original data, prevent artificial tampering, prevent "taking the relationship" from tampering with the basic data of criminals, and improve the credibility of the data.
Every node in the blockchain has a complete data backup, and even if one node loses data, it can recover data from other nodes. It is a low-cost verification process to apply blockchain technology to data acquisition and add time stamp to the original data that has joined the blockchain, thus proving the true reliability of the data.
3.2 Architecture
Make full use of the characteristics of the blockchain to design the system architecture, as shown in Figure 2, to realize the collection of data resources of prisons into the blockchain, and the prison administration is responsible for supervising the blockchain to complete data uploading and information sharing.
3.2. 1 criminal module
Personal basic information
Blockchain is used to keep the basic information records of prisoners, that is, each prisoner has an account book, thus having a complete database about his past. The owner of these data is the prisoner himself, which fully embodies an important consideration standard of the modernization of smart prisons, "humanity", and avoids the criminal psychological loopholes from the human nature.
Prison performance data
Criminals will undergo labor reform and ideological reform in prison, and the performance data in prison is very important, which is an important basis for criminals to reduce their sentences, so it is necessary to ensure the authenticity and non-tampering of the data. Based on the unique data security of blockchain, we can make full use of the records on blockchain to decide whether to meet the commutation conditions. Based on the data obtained from the video surveillance of the prison system, the "blockchain+artificial intelligence" technology is used to analyze the prisoner's behavior trajectory in order to avoid prison break and suicide.
Police unit
Resume of police officer
Including the birth background, education level, work experience, work performance and year-end assessment of police officers. , form a multi-directional electronic file of police personnel, use technical means to avoid tedious information integration and reduce file management.
Police patrol management
Record the patrol route of police officers and save it to accurately evaluate the performance of working hours; Recording whether the police can walk among criminals, understand their ideological fluctuations and establish a good relationship between the police and the people is called
3.2.3 Financial data management module
per diem expenses
All prison expenditure data are stored in the blockchain in real time, which realizes the transparency of the process and the accuracy of information, and better realizes the supervision of financial funds.
Labor income
Due to the particularity of labor, the traceability certification of labor products is regulated through blockchain, and the fingerprint records stored in the whole manufacturing process are used as data storage vouchers. Because of the openness of the process, the destructive behavior of extremists is avoided and the safety of products is guaranteed.
Information management module
Every day's documents, work arrangements and meeting minutes are stored in the blockchain in time, and the real-time transmission of blockchain information enables everyone to get the latest information in time. Hierarchical control of data access rights is set for the data in the chain, and the amount of information obtained at different levels is different. Through encryption algorithm, data can only be read by relevant personnel, thus strengthening the protection of private content and improving the security of data.
Monitoring center module
Real-time monitoring of prisons, production workshops, canteens and areas around prisons, and timely alarm in case of emergency. Conduct early warning and judgment on the data of the monitoring center, and erase the incident in the bud. Monitoring data should be packaged and linked in time. Important passages in the prison record people entering and leaving in real time, and increase access control to the restricted area. Clean the prison every hour, and call the police if the number of people is uneven. Workplaces should also be counted every half hour. Through the necessary monitoring measures, reduce the police force and improve the security of the prison.
3.3 Data types of blockchain in smart prisons
Blockchain in smart prison uses multiple data types to store and process different data. The blockchain API/SDK will adapt to receiving and formatting these data. After the core data and measurement certificate are signed, they will be uploaded and stored. After the hash value of the file is stored in the blockchain, the user will search for the file on the client and obtain the target file by using the IPFS network. Use the tamper resistance of blockchain to avoid artificial tampering; By using the time stamp and hash value in the chain, the whole process of data change can be tracked in real time, and the security of data is enhanced. As shown in figure 3.
3.4 Using the idea of intelligent contract virtual machine layering
Smart contracts are code generation of blockchain, which can be run by all nodes. It manages assets according to the set rules, eliminates the risk of errors through multi-party cooperation, and realizes the transparent operation of each user. The script on the chain realizes the programmability of blockchain and the automatic execution of intelligent contracts. With the strengthening of the scripting mechanism, the integration of blockchain and smart contracts has been realized. The script on the chain provides an extended interface for the blockchain, and anyone can use the script to realize the application of blockchain.
The top-level DSL engine translates DSL into Solidity, the development language of smart contracts. Ruggedness is a static language. Compiled and sent to the network, it can be called by Ethereum to realize web application. The reliability language of the middle layer is converted into EVM instruction set after being checked by the security analysis tool. EVM enables developers to compile smart contracts in high-level languages. Then the EVM is compiled into bytecode and deployed in the blockchain to realize the development of smart contracts. The bottom layer is a pluggable architecture, which can be directly run on EVM virtual machine or converted to run on WASM virtual machine.
Strict contracts and virtual machines must be used in advance, and they must be strictly reviewed and formally proved before going online, and then operational control and accountability should be strengthened.
3.5 Privacy data processing
Because the blockchain is a P2P network, it is difficult to guess the direction of information dissemination, because it uses relay forwarding for communication. Because the anonymous operation is realized by using the address created by the user in the specific transaction, it has nothing to do with the specific personal information, and the security of data storage is well realized. The privacy of blockchain is divided into transaction privacy and identity privacy, and the hierarchical design of permissions is shown in Figure 5.
The data can only disclose some information. For sensitive data, private key authorization is used to set privacy data protection. The combination of encryption algorithm and smart contract is used to protect private data. For example, the information of the personal information module of criminals and police is stored in the blockchain together with the encryption key, and information leakage is prevented through digital fingerprints. Parties can use smart contracts to change the network of data access rights. Have the following access rights:
Master the authority: for the prisoner module, the prisoner owns it himself; For the police module, the police are responsible.
Virtual permission: You can only see its ciphertext but can't really access the internal data.
label
Conscientiously implement the spirit of the 19th National Congress of the Communist Party of China, actively implement the strategic deployment of "science and technology power, network power, digital China, smart society", adhere to the working idea of "no modernization without informationization", make efforts to be scientific, refined and intelligent, create a new atmosphere of "prison police brain", "perception antenna" everywhere and "smart prison" safe, and promote blockchain.
Smart prison is the basic direction of future prison system information construction. It is the mapping of integrating the concepts of smart city and smart earth into the prison field, strengthening the research and exploration of smart prisons, and striving to guide the development of prison informatization in a broader and deeper direction, which has provided great impetus for prison modernization.
This paper discusses some problems existing in the intelligent prison, discusses how to use the characteristics of blockchain technology to realize the non-tampering and traceability of data information, including how to store data in the blockchain and protect data privacy, and discusses the methods to solve the problems existing in the intelligent prison.
If the successful case of practical application of blockchain can be re-developed, it can not only save costs, but also ensure the stability of operation. Next, we will actively explore the practical and effective application of blockchain, adhere to Do not forget your initiative mind, keep in mind the mission, actively explore the development of prison informatization in by going up one flight of stairs, and achieve greater results.