CN108876399B - Finite field block chain system with closed-loop authentication system - Google Patents

Finite field block chain system with closed-loop authentication system Download PDF

Info

Publication number
CN108876399B
CN108876399B CN201810464400.6A CN201810464400A CN108876399B CN 108876399 B CN108876399 B CN 108876399B CN 201810464400 A CN201810464400 A CN 201810464400A CN 108876399 B CN108876399 B CN 108876399B
Authority
CN
China
Prior art keywords
authentication
commodity
information
block chain
finite field
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810464400.6A
Other languages
Chinese (zh)
Other versions
CN108876399A (en
Inventor
江峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Publication of CN108876399A publication Critical patent/CN108876399A/en
Application granted granted Critical
Publication of CN108876399B publication Critical patent/CN108876399B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
    • G06K17/0022Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device
    • G06K17/0029Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device the arrangement being specially adapted for wireless interrogation of grouped or bundled articles tagged with wireless record carriers
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Abstract

The invention discloses a finite field block chain system with a closed-loop authentication system, which mainly comprises m authentication centers and n external nodes. Each authentication center mainly comprises a recorded event authentication information system and a block chain authentication accounting system. The basic database mainly stores basic authentication data and bibliographic event authentication information. And after scanning the RFID label of the commodity to be tested, the external node accesses the basic database and verifies the authenticity of the commodity to be tested by using a one-time one-certificate method of closed-loop authentication. According to the invention, through the finite field block chain system with the closed-loop authentication system, a counterfeiter can be effectively prevented from passing through the security loophole of the electronic tag or the security loophole of other anti-counterfeiting system components, and the scale amplitude value RFID electronic tag is effectively prevented, so that the security of the anti-counterfeiting system is ensured.

Description

Finite field block chain system with closed-loop authentication system
Technical Field
The invention relates to the field of digital authentication, in particular to a finite field block chain system with a closed-loop authentication system.
Background
With the development of mobile communication technology, especially mobile internet and internet of things are permeating into the living field of people, and various demands for authentication services based on internet are appeared. Such as authentication of authenticity of goods, transaction information, collection information, virtual account information, virtual property, personal/enterprise identity information, credit investigation information, justice information, etc.
In the prior art, a server connected to the internet needs to be built, and then the server is accessed through an external node to inquire the information.
However, it is a difficult matter to hack the system server by means of hackers. Hackers often achieve illegal purposes by rewriting the information stored in the server. Accordingly, there is a need for an improvement in existing internet-based authentication systems.
According to the invention, through a closed-loop authentication mode, the security and reliability of authentication are improved, and the problem of double flowers in a block chain is well solved.
Disclosure of Invention
The present invention is directed to solving the problems of the prior art.
The technical scheme adopted for achieving the purpose of the invention is that the finite field block chain system with the closed-loop authentication system mainly comprises m authentication centers and k external nodes. The authentication center is a main server. And m authentication centers have the same authority.
The external node is a mobile terminal with the function of reading and writing the commodity RFID label.
Having digital identity certificate information E in RFID tag of any one articlei,j. Wherein i is a commodity production serial number. i is 1,2, …, l. j is the number of times the RFID tag writes a message. j is 1,2, …, k. Digital identity certificate information E of commodityi,jAnd corresponds to the commodity authentication information set Q. The digital identity certificate information is a random number.
When any commodity leaves factory for the first time, the RFID label arranged on the commodity writes a message Ei,1The basic database stores a commodity verification information set Q ═ { Q ═ Qi,1},I.e., j equals 1.
Each authentication center mainly comprises a recorded event authentication information system and a block chain authentication accounting system.
Any of the authentication centers reads data from the underlying database. The basic database is a server with a data storage function and performs data interaction with a finite field blockchain system with a closed-loop authentication system.
The basic database mainly stores basic authentication data and bibliographic event authentication information.
The initial basic authentication data is provided by the authentication requirement of the authentication center node and is basic information of commodity authentication.
The basis is a commodity verification information set Q. Product authentication information set Q ═ Qi,1、Qi,2、…、Qi,j}. And i is the commodity production serial number. i is 1,2, …, l. j is the number of times the RFID tag of the article writes a message. j is 1,2, …, k. Commodity authentication information Qi,jIs digital identity certificate information Ei,jAnd (4) carrying out hash operation on the obtained hash value.
The bibliographic event authentication information comprises verification information of the to-be-detected commodity and verified digital identity certificate information E of the to-be-detected commodityi,jAnd (4) forming.
The commodity to be tested is verified to be false, the commodity is true or false and suspicious or the commodity is false or true.
The bibliographic event information is the operation record information of the bibliographic event authentication information system to the basic database according to the external authentication requirement.
And the bibliographic event authentication information system generates bibliographic transaction information and basic bibliographic event authentication information according to the format requirement of the block chain authentication accounting system on the operation of the basic database according to the authentication requirement.
The bibliographic event authentication information system broadcasts bibliographic transaction information during a block record distribution period T.
The blockchain authentication billing system records the broadcasted bibliographic transaction information.
The block chain authentication and accounting system generates and stores block data according to a certain rule based on the received recorded transaction information.
The main steps of generating and storing block data are as follows:
1) and setting a block issuing period T of the finite field block chain system with the closed-loop authentication system and the block issuing mechanism.
2) In a block release period T, the authentication center node bibliographic event authentication information system carries out authentication operation on an authentication request according to an authentication rule on the basis of the basic authentication data according to external requirements; storing the corresponding generated bibliographic event authentication information in a basic database; and meanwhile, generating bibliographic transaction information and uploading the bibliographic transaction information to a block chain authentication and accounting system of each authentication center node in a broadcasting manner.
3) In a block issuing period T, the multi-center authentication system selects any n authentication centers as block issuing nodes in a random mode. The other m-n authentication centers are non-block issuing nodes. m and n are finite positive integers. n ≦ m.
4) And the block issuing node generates block data with a time stamp according to the bibliographic transaction information received in the authentication system within a period of time and broadcasts and issues the block data to the whole authentication system.
The block data includes a block header region and a block body region. The block area collects the recorded transaction information broadcasted during time t. And processing the bibliographic transaction information broadcasted in the time t into root data as a calculation parameter. The root data is processed into authentication data as a calculation parameter. The authentication data is recorded in a block header area.
5) And the block chain authentication accounting system of the block issuing node broadcasts the block data.
6) And the block chain authentication accounting system of each central node of the finite field block chain system with the closed-loop authentication system receives the broadcasted block data.
7) And the m authentication centers determine the finally determined new block data according to the set verification rule.
8) When a block data is verified and confirmed by the system, the block data is used as the latest block to be connected to the back of the previous block and is stored in a block chain; the system enters the next block record distribution cycle.
And after scanning the RFID label of the commodity to be tested, the external node accesses the basic database and verifies the authenticity of the commodity to be tested by using a one-time one-certificate method of closed-loop authentication.
The method for verifying the authenticity of the commodity by utilizing the closed-loop authentication one-time method mainly comprises the following steps:
1) and the external node scans the RFID label of the to-be-detected commodity and initiates a request for verifying the authenticity of the to-be-detected commodity to the finite field block chain system. The external node transmits digital identity certificate information E in the RFID label of the commodity to be detectedi,jAnd sending the information to a verification center node of a corresponding commodity with a closed-loop authentication system.
2) The digital identity certificate information E is authenticated by the bibliographic event authentication information system of the authentication centeri,jCarrying out Hash operation to obtain information Hi,j
The authentication center sends information Hi,jAnd respectively carrying out comparison operation with each element in the commodity verification information set Q.
If the message Hi,jAnd if any element in the commodity verification information set Q is not matched, the commodity to be detected is a fake commodity, and the verification information of the commodity to be detected, which indicates that the commodity to be detected is fake, is generated.
If the message Hi,jAnd Q is divided from the commodity verification information set Qi,jAnd if other elements are matched, the commodity to be detected is suspicious, and verification information of the commodity to be detected is generated.
If the message Hi,1And Q in the commodity authentication information set Qi,jAnd if the verification information is matched, the commodity to be detected is a genuine commodity, and verification information of the commodity to be detected which is genuine is generated.
Each authentication center verifies the information of the commodity to be tested and the information Ei,jProcessed as bibliographic transaction information and broadcast the bibliographic transaction information in a finite field blockchain system.
3) And the finite field block chain system receives the judgment results of the m authentication centers and judges whether the commodity is true or false according to a set verification principle. The checking principle is a majority principle.
And if the commodity is false, the finite field block chain system sends the judgment result to the external node. The external node displays that the commodity is false. And the finite field block chain system records the scanning time and the physical address of the external node. And the finite field block chain system finishes the authenticity verification of the commodity, enters the next closed-loop authentication process and waits for the next commodity authenticity verification request of the external node.
And if the commodity is true or false and suspicious, the finite field block chain system sends the judgment result to the external node. And the external node displays that the commodity is true or false and suspicious. And the finite field block chain system records the scanning time and the physical address of the external node. And the finite field block chain system finishes the authenticity verification of the commodity, enters the next closed-loop authentication process and waits for the next commodity authenticity verification request of the external node.
If the goods is true, go to step 4.
4) The authentication center generates digital identity certificate information Ei,j+1And transmitted to the external node. The external node sends digital identity certificate information Ei,j+1Writing into the RFID label of the tested commodity judged to be true to replace the original Ei,j. The digital identity certificate information Ei,j+1The information of the new commodity digital identity certificate is used for verifying the authenticity of the commodity to be tested next time by the external node.
For digital identity certificate information Ei,j+1Carrying out Hash operation to obtain a commodity verification message Qi,j+1. The base database stores and message corresponds to Ei,j+1Commodity authentication message Q ofi,j+1That is, the product authentication information set is updated to Q ═ Qi,1、Qi,2、…、Qi,j、Qi,j+1}. The goods authentication message Qi,j+1And the product is used for verifying the authenticity of the next product. The second commodity verification message Q in the updated commodity verification information set Qi,2As event information, and broadcast with closed loop authentication systemCommodity authentication message Q of the first in a conventional finite field block chain systemi,1And newly generated commodity authentication information Qi,j+1And no broadcast. And the finite field block chain system enters the next closed-loop authentication process and waits for the next commodity authenticity verification request of the external node.
Update to Q ═ { Q ═ Q in the commodity authentication information seti,1、Qi,2、…、Qi,j、Qi,j+1On the premise that the authentication center receives the information E sent by the external nodei,k. The authentication center the digital identity certificate information Ei,kCarrying out Hash operation to obtain information Hi,j+1. If the information Hi,j+1And commodity authentication information Q in the commodity authentication information set Qi,kMatching, and k is less than or equal to j, then the digital identity certificate information Ei,kHas been stolen and written into RFID tags of counterfeit goods. The finite field blockchain system records the scanning time and the physical address of the external node.
Further, the blockchain bibliographic accounting system at least comprises: self-checking parameters, health values and engagement.
The health parameter values form the following rules:
a) if the block data issued by one block issuing node is not verified as a majority, the health parameter value of the authentication center is decreased.
And/or b) the authentication center performs self-checking on the data in the basic database. The result of the self-test affects the value of the health parameter.
And/or c) the health value may be reduced if an authentication center does not issue the basic bibliographic information during the block record issuing period.
The participation degree value is formed according to the following rules:
a) if an authentication center participates in the distribution of block data, the participation degree value increases. And/or b) if an authentication center refuses to participate in issuing block data, the participation degree value is decreased.
And if the self-checking parameters, the health values and the participation degrees continuously agree that the issuing period of the blocks is not reduced, the issuing period is automatically recovered to be the normal initial value. If the self-verification parameters, health values and engagement levels are below the defined lower limits, the center will be alerted or kicked out of the multi-center blockchain system.
The technical effect of the present invention is undoubted. According to the invention, through the finite field block chain system with the closed-loop authentication system, a counterfeiter can be effectively prevented from passing through the security loophole of the electronic tag or the security loophole of other anti-counterfeiting system components, and the scale amplitude value RFID electronic tag is effectively prevented, so that the security of the anti-counterfeiting system is ensured. The invention constructs a brand-new mutual-aid system framework based on a 'people-oriented person-I-man' belt-block issuing machine system, and replaces a mining mechanism and a workload proving mechanism in a traditional block chain with a 'people-oriented person-I-man' mutual-aid mode. Therefore, a brand-new block issuing mechanism and a multi-center distributed authentication system architecture are established, and issuing functions of centers are different. The method can be applied to a high-fault-tolerance distributed computing system, and mixed consistency is possible. The invention also solves the problem of double flowers in the block chain. The invention has wide application value in the important fields of non-virtual currency application scenes, such as identity authentication, mastership currency issuance and the like.
Drawings
FIG. 1 is a schematic diagram of an authentication system;
FIG. 2 is a block data structure diagram.
Detailed Description
The present invention is further illustrated by the following examples, but it should not be construed that the scope of the above-described subject matter is limited to the following examples. Various substitutions and alterations can be made without departing from the technical idea of the invention and the scope of the invention is covered by the present invention according to the common technical knowledge and the conventional means in the field.
Example 1:
referring to fig. 1 and 2, a finite field blockchain system with a closed-loop authentication system mainly includes m authentication centers and n external nodes. The authentication center is a main server. And m authentication centers have the same authority.
The external node is a mobile terminal with the function of reading and writing the commodity RFID label.
Having digital identity certificate information E in RFID tag of any one articlei,j. Wherein i is a commodity production serial number. i is 1,2, …, l. j is the number of times the RFID tag writes a message. j is 1,2, …, k. Digital identity certificate information E of commodityi,jAnd corresponds to the commodity authentication information set Q. The digital identity certificate information is a random number.
When any commodity leaves factory for the first time, the RFID label arranged on the commodity writes a message Ei,1The basic database stores a commodity verification information set Q ═ { Q ═ Qi,1I.e., j is 1.
Each authentication center mainly comprises a recorded event authentication information system and a block chain authentication accounting system.
Any of the authentication centers reads data from the underlying database. The basic database is a server with a data storage function and performs data interaction with a finite field blockchain system with a closed-loop authentication system.
The basic database mainly stores basic authentication data and bibliographic event authentication information.
The initial basic authentication data is provided by the authentication requirement of the authentication center node and is basic information of commodity authentication.
The basis is a commodity verification information set Q. Product authentication information set Q ═ Qi,1、Qi,2、…、Qi,j}. And i is the commodity production serial number. i is 1,2, …, l. j is the number of times the RFID tag of the article writes a message. j is 1,2, …, k. Commodity authentication information Qi,jIs digital identity certificate information Ei,jAnd (4) carrying out hash operation on the obtained hash value. .
The bibliographic event authentication information comprises verification information of the to-be-detected commodity and verified digital identity certificate information E of the to-be-detected commodityi,jAnd (4) forming.
The commodity to be tested is verified to be false, the commodity is true or false and suspicious or the commodity is false or true.
The bibliographic event information is the operation record information of the bibliographic event authentication information system to the basic database according to the external authentication requirement.
And the bibliographic event authentication information system generates bibliographic transaction information and basic bibliographic event authentication information according to the format requirement of the block chain authentication accounting system on the operation of the basic database according to the authentication requirement.
The bibliographic event authentication information system broadcasts bibliographic transaction information during a block record distribution period T.
The blockchain authentication billing system records the broadcasted bibliographic transaction information.
The block chain authentication and accounting system generates and stores block data according to a certain rule based on the received recorded transaction information.
The main steps of generating and storing block data are as follows:
1) and setting a block issuing period T of the finite field block chain system with the closed-loop authentication system and the block issuing mechanism.
2) In a block release period T, the authentication center node bibliographic event authentication information system carries out authentication operation on an authentication request according to an authentication rule on the basis of the basic authentication data according to external requirements; storing the corresponding generated bibliographic event authentication information in a basic database; and meanwhile, generating bibliographic transaction information and uploading the bibliographic transaction information to a block chain authentication and accounting system of each authentication center node in a broadcasting manner.
3) In a block issuing period T, the finite field block chain system with the closed-loop authentication system selects any n central nodes as block issuing nodes in a random mode. The other m-n central nodes are non-block issuing nodes.
Further, the step of selecting the block issuing node is mainly as follows:
1.1) selecting the authentication center as a block issuing node in a random mode.
1.2) records the number of times d each authentication center was selected as a chunk issue node in the period of T2.
1.3) setting a time threshold epsilon.
1.4) judging the magnitude relation between d and a threshold epsilon. If d > epsilon, the corresponding authentication center is moved out of the random list in the next period and reset for a number of times d. If d is less than or equal to epsilon, directly resetting the times d.
4) And the block issuing node generates block data with a time stamp according to the bibliographic transaction information received in the authentication system within a period of time and broadcasts and issues the block data to the whole authentication system.
The block data includes a block header region and a block body region. The block area collects the recorded transaction information broadcasted during time t. And processing the bibliographic transaction information broadcasted in the time t into root data as a calculation parameter. The root data is used as a calculation parameter and is processed into authentication data; the authentication data is recorded in a block header area. the t time is a set time. .
5) And the block chain authentication accounting system of the block issuing node broadcasts the block data.
6) And the block chain authentication accounting system of each central node of the finite field block chain system with the closed-loop authentication system receives the broadcasted block data.
7) And the m authentication centers determine the finally determined new block data according to the set verification rule.
8) When a block data is verified and confirmed by the system, the block data is used as the latest block to be connected to the back of the previous block and is stored in a block chain; the system enters the next block record distribution cycle.
And after scanning the RFID label of the commodity to be tested, the external node accesses the basic database and verifies the authenticity of the commodity to be tested by using a one-time one-certificate method of closed-loop authentication.
The method for verifying the authenticity of the commodity by utilizing the closed-loop authentication one-time method mainly comprises the following steps:
a) and the external node scans the RFID label of the to-be-detected commodity and initiates a request for verifying the authenticity of the to-be-detected commodity to the finite field block chain system. The external node transmits digital identity certificate information E in the RFID label of the commodity to be detectedi,jAnd sending the information to a verification center node of a corresponding commodity with a closed-loop authentication system.
b) Bibliography of the authentication centerEvent authentication information system for said digital identity certificate information Ei,jCarrying out Hash operation to obtain information Hi,j
The authentication center sends information Hi,jAnd respectively carrying out comparison operation with each element in the commodity verification information set Q.
If the message Hi,jAnd if any element in the commodity verification information set Q is not matched, the commodity to be detected is a fake commodity, and the verification information of the commodity to be detected, which indicates that the commodity to be detected is fake, is generated.
If the message Hi,jAnd Q is divided from the commodity verification information set Qi,jAnd if other elements are matched, the commodity to be detected is suspicious, and verification information of the commodity to be detected is generated.
If the message Hi,1And Q in the commodity authentication information set Qi,jAnd if the verification information is matched, the commodity to be detected is a genuine commodity, and verification information of the commodity to be detected which is genuine is generated.
Each authentication center verifies the information of the commodity to be tested and the information Ei,jProcessed as bibliographic transaction information and broadcast the bibliographic transaction information in a finite field blockchain system.
c) And the finite field block chain system receives the judgment results of the m authentication centers and judges whether the commodity is true or false according to a set verification principle. The checking principle is a majority principle.
And if the commodity is false, the finite field block chain system sends the judgment result to the external node. The external node displays that the commodity is false. And the finite field block chain system records the scanning time and the physical address of the external node. And the finite field block chain system finishes the authenticity verification of the commodity, enters the next closed-loop authentication process and waits for the next commodity authenticity verification request of the external node.
And if the commodity is false, the finite field block chain system sends the judgment result to the external node. The external node displays that the commodity is false. And the finite field block chain system records the scanning time and the physical address of the external node. And the finite field block chain system finishes the authenticity verification of the commodity, enters the next closed-loop authentication process and waits for the next commodity authenticity verification request of the external node.
And if the commodity is true or false and suspicious, the finite field block chain system sends the judgment result to the external node. And the external node displays that the commodity is true or false and suspicious. And the finite field block chain system records the scanning time and the physical address of the external node. And the finite field block chain system finishes the authenticity verification of the commodity, enters the next closed-loop authentication process and waits for the next commodity authenticity verification request of the external node.
If the goods is true, go to step 4.
d) The authentication center generates digital identity certificate information Ei,j+1And transmitted to the external node. The external node sends digital identity certificate information Ei,j+1Writing into the RFID label of the tested commodity judged to be true to replace the original Ei,j. The digital identity certificate information Ei,j+1The information of the new commodity digital identity certificate is used for verifying the authenticity of the commodity to be tested at the j +1 th time of the external node.
For digital identity certificate information Ei,j+1Carrying out Hash operation to obtain a commodity verification message Qi,j+1. The base database stores and message corresponds to Ei,j+1Commodity authentication message Q ofi,j+1That is, the product authentication information set is updated to Q ═ Qi,1、Qi,2、…、Qi,j、Qi,j+1}. The second commodity verification message Q in the updated commodity verification information set Qi,2As the bibliographic event information, and broadcasting the first commodity verification message Q in the finite field blockchain system with closed-loop authentication systemi,1And newly generated commodity authentication information Qi,j+1And no broadcast. And the finite field block chain system finishes the authenticity verification of the commodity, enters the next closed-loop authentication process and waits for the next commodity authenticity verification request of the external node.
Update to Q ═ { Q ═ Q in the commodity authentication information seti,1、Qi,2、…、Qi,j、Qi,j+1On the premise of the previous step, the authentication centerReceiving the digital identity certificate information E sent by the external nodei,k. The authentication center the digital identity certificate information Ei,kCarrying out Hash operation to obtain information Hi,j+1. If the information Hi,j+1And commodity authentication information Q in the commodity authentication information set Qi,kMatching, and k is less than or equal to j, then the digital identity certificate information Ei,kHas been stolen and written into RFID tags of counterfeit goods. The finite field blockchain system records the scanning time and the physical address of the external node.
Further, the blockchain bibliographic accounting system at least comprises: self-checking parameters, health values and engagement.
The health parameter values form the following rules:
a) if the block data issued by one block issuing node is not verified as a majority, the health parameter value of the authentication center is decreased.
And/or b) the authentication center performs self-checking on the data in the basic database. The result of the self-test affects the value of the health parameter.
And/or c) the health value may be reduced if an authentication center does not issue the basic bibliographic information during the block record issuing period.
The participation degree value is formed according to the following rules:
a) if an authentication center participates in the distribution of block data, the participation degree value increases.
And/or b) if an authentication center refuses to participate in issuing block data, the participation degree value is decreased.
And if the self-checking parameters, the health values and the participation degrees continuously agree that the issuing period of the blocks is not reduced, the issuing period is automatically recovered to be the normal initial value. If the self-verification parameters, health values and engagement levels are below the defined lower limits, the center will be alerted or kicked out of the multi-center blockchain system.
Example 2:
the method for verifying the authenticity of the Helianna Lvbao essence by using the finite field block chain system with the closed-loop authentication system mainly comprises the following steps:
1) and establishing a finite field block chain system with a closed-loop authentication system, wherein the finite field block chain system mainly comprises m authentication centers and k external nodes. The authentication center is a main server. And m authentication centers have the same authority. The external node is a mobile terminal with the function of reading and writing the commodity RFID label.
2) A certain user utilizes a mobile phone with an RFID identification function as an external node. Scanning the RFID label on the essence bottle body of the Helianna Lvbao bottle by the external node to obtain digital identity certificate information E101,25. 101 is the production serial number of Helianna's bottle essence of green treasure, and 25 shows that this bottle essence has been written into and has been updated 25 times digital identity certificate information.
3) And the external node initiates a 25 th authenticity verification request of the commodity to be tested to the finite field block chain system. The external node transmits information E in the RFID label of the commodity to be tested101,25Sending the data to a finite field block chain system with a closed loop authentication system.
4) Each authentication center pairs the digital identity certificate information E101,25Carrying out Hash operation to obtain information H101,25
Each authentication center sends information H101,25And respectively carrying out comparison operation with each element in the commodity verification information set Q. The commodity authentication information set Q ═ { Q ═ Q101,1、Q101,2、…、Q101,25}
The comparison results in this example are: the message H101,25And any element in the commodity verification information set Q is not matched. Therefore, the commodity to be tested is a fake commodity, and each authentication center generates verification information of the commodity to be tested, wherein the commodity to be tested is fake.
5) And the finite field block chain system receives the judgment results of the m authentication centers and judges whether the commodity is true or false according to a set verification principle. The checking principle is a majority principle.
And the finite field block chain system sends the judgment result to the external node because the commodity is false. The external node displays that the commodity is false. And the finite field block chain system records the scanning time and the physical address of the external node. The scanning time and the physical address are the possible fake making time and the address of a fake maker. And the finite field block chain system finishes the authenticity verification of the commodity, enters the next closed-loop authentication process and waits for the next commodity authenticity verification request of the external node.
Example 3:
the method for verifying the authenticity of the Helianna Lvbao essence by using the finite field block chain system with the closed-loop authentication system mainly comprises the following steps:
1) and establishing a finite field block chain system with a closed-loop authentication system, wherein the finite field block chain system mainly comprises m authentication centers and k external nodes. The authentication center is a main server. And m authentication centers have the same authority. The external node is a mobile terminal with the function of reading and writing the commodity RFID label.
2) A certain user utilizes a mobile phone with an RFID identification function as an external node. Scanning the RFID label on the essence bottle body of the Helianna Lvbao bottle by the external node to obtain digital identity certificate information E102,27. 102 is the production serial number of Helianna' Lubao bottle essence, and 27 indicates that the bottle essence is written with the digital identity certificate information which is updated 27 times.
3) And the external node initiates a 27 th authenticity verification request of the commodity to be tested to the finite field block chain system. The external node transmits information E in the RFID label of the commodity to be tested102,27Sending the data to a finite field block chain system with a closed loop authentication system.
4) Each authentication center pairs the digital identity certificate information E102,27Carrying out Hash operation to obtain information H102,27
Each authentication center sends information H101,25And respectively carrying out comparison operation with each element in the commodity verification information set Q. The commodity authentication information set Q ═ { Q ═ Q102,1、Q102,2、…、Q102,27}
The comparison results in this example are: the message Hi,jAnd Q is divided from the commodity verification information set Q102,27If other elements are matched, the commodity to be tested is true or false and the verification of the commodity to be tested is generatedAnd (4) information.
5) And the finite field block chain system receives the judgment results of the m authentication centers and judges whether the commodity is true or false according to a set verification principle. The checking principle is a majority principle.
And if the commodity is true or false and suspicious, the finite field block chain system sends the judgment result to the external node. And the external node displays that the commodity is true or false and suspicious. And the finite field block chain system records the scanning time and the physical address of the external node. And the finite field block chain system finishes the authenticity verification of the commodity, enters the next closed-loop authentication process and waits for the next commodity authenticity verification request of the external node.
Example 4:
the method for verifying the authenticity of the Helianna Lvbao essence by using the finite field block chain system with the closed-loop authentication system mainly comprises the following steps:
1) and establishing a finite field block chain system with a closed-loop authentication system, wherein the finite field block chain system mainly comprises m authentication centers and k external nodes. The authentication center is a main server. And m authentication centers have the same authority. The external node is a mobile terminal with the function of reading and writing the commodity RFID label.
2) A certain user utilizes a mobile phone with an RFID identification function as an external node. Scanning the RFID label on the essence bottle body of the Helianna Lvbao bottle by the external node to obtain digital identity certificate information E103,30. 103 is the production serial number of Helianna' Lubao bottle essence, and 30 shows that the bottle essence is written in and updated with 30 times of digital identity certificate information.
3) And the external node initiates a 30-time authenticity verification request of the commodity to be tested to the finite field block chain system. The external node transmits information E in the RFID label of the commodity to be tested103,30Sending the data to a finite field block chain system with a closed loop authentication system.
4) Each authentication center pairs the digital identity certificate information E103,30Carrying out Hash operation to obtain information H103,30
Each authentication center sends information H103,30And respectively carrying out comparison operation with each element in the commodity verification information set Q.The commodity authentication information set Q ═ { Q ═ Q103,1、Q103,2、…、Q103,30}
The comparison results in this example are: the message Hi,jAnd Q in the commodity authentication information set Q103,30If the matching result is positive, the commodity is true, and the authentication center generates digital identity certificate information E103,31And transmitted to the external node. The external node sends digital identity certificate information E103,31Writing into the RFID label of the tested commodity judged to be true to replace the original E103,30. The digital identity certificate information E103,31The digital identity certificate information of the new commodity is used for verifying the authenticity of the commodity to be tested at the 31 st time by the external node.
For digital identity certificate information E103,31Carrying out Hash operation to obtain a commodity verification message Qi,j+1. The base database stores and message corresponds to E103,31Commodity authentication message Q of103,31That is, the product authentication information set is updated to Q ═ Q103,1、Q103,2、…、Q103,j、Q103,31}. And the finite field block chain system finishes the authenticity verification of the commodity, enters the next closed-loop authentication process and waits for the next commodity authenticity verification request of the external node.
5) And the finite field block chain system receives the judgment results of the m authentication centers and judges whether the commodity is true or false according to a set verification principle. The checking principle is a majority principle.
And if the commodity is true, the finite field block chain system sends the judgment result to the external node. And the external node displays that the commodity is true or false and suspicious. And the finite field block chain system records the scanning time and the physical address of the external node. And the finite field block chain system finishes the authenticity verification of the commodity, enters the next closed-loop authentication process and waits for the next commodity authenticity verification request of the external node.
Example 5:
the method for verifying the authenticity of the Helianna Lvbao essence by using the finite field block chain system with the closed-loop authentication system mainly comprises the following steps:
1) and establishing a finite field block chain system with a closed-loop authentication system, wherein the finite field block chain system mainly comprises m authentication centers and k external nodes. The authentication center is a main server. And m authentication centers have the same authority. The external node is a mobile terminal with the function of reading and writing the commodity RFID label.
2) A certain user utilizes a mobile phone with an RFID identification function as an external node. Scanning the RFID label on the essence bottle body of the Helianna Lvbao bottle by the external node to obtain digital identity certificate information E104,50. 104 is the production serial number of Helianna' Lubao bottle essence, and 50 indicates that the bottle essence is written in the digital identity certificate information which is updated 50 times.
3) And the external node initiates a request for verifying the authenticity of the commodity to be tested to the finite field block chain system. The external node transmits information E in the RFID label of the commodity to be tested104,50Sending the data to a finite field block chain system with a closed loop authentication system.
4) Each authentication center pairs the digital identity certificate information E104,50Carrying out Hash operation to obtain information H104,50
Each authentication center sends information H104,50And respectively carrying out comparison operation with each element in the commodity verification information set Q. The commodity authentication information set Q ═ { Q ═ Q104,1、Q104,2、…、Q104,52}
The comparison results in this example are: the message H104,50And an element Q in the commodity authentication information set Q104,50The latest commodity verification information corresponding to the commodity with the serial number 104 in the commodity verification information set Q is Q104,52If the commodity to be tested is false, generating verification information of the commodity to be tested, wherein the commodity to be tested is false. Commodity digital identity certificate information E104,50Has been stolen and written into RFID tags of counterfeit goods. The finite field blockchain system records the scanning time and the physical address of the external node. The scan time and physical address are the fake time and fake address of a possible counterfeiter.
5) And the finite field block chain system receives the judgment results of the m authentication centers and judges whether the commodity is true or false according to a set verification principle. The checking principle is a majority principle.
And if the commodity is false, the finite field block chain system sends the judgment result to the external node. The external node displays that the commodity is false. And the finite field block chain system records the scanning time and the physical address of the external node. And the finite field block chain system finishes the authenticity verification of the commodity, enters the next closed-loop authentication process and waits for the next commodity authenticity verification request of the external node.

Claims (6)

1. A finite field block chain system with a closed-loop authentication system is characterized in that: the system comprises m authentication centers and n external nodes; the authentication center is a main server; m authentication centers have the same authority; the external node is a mobile terminal with the function of reading and writing the RFID label of the commodity;
each authentication center comprises a recorded event authentication information system and a block chain authentication and accounting system;
any authentication center reads data from a basic database; the basic database is a server with a data storage function and used for carrying out data interaction with a finite field block chain system with a closed-loop authentication system;
the basic database stores basic authentication data and bibliographic event authentication information;
the initial basic authentication data is provided by the authentication requirement of the authentication center node and is basic information of commodity authentication; the basic authentication data is a commodity verification information set Q; product authentication information set Q ═ Qi,1、Qi,2、…、Qi,j}; i is the commodity production serial number; 1,2, …, l; j is the number of times of writing messages into the RFID label of the commodity; j ═ 1,2, …, k; commodity authentication message Qi,jIs digital identity certificate information Ei,jCarrying out Hash operation on the obtained Hash value;
the bibliographic event authentication information comprises verification information of the to-be-detected commodity and verified digital identity certificate information E of the to-be-detected commodityi,jComposition is carried out;
after scanning the RFID label of the commodity to be tested, the external node accesses the basic database and verifies the authenticity of the commodity to be tested by using a one-time one-certificate method of closed-loop authentication; the commodity to be tested is verified to be whether the commodity is false, whether the commodity is true or false or whether the commodity is true;
the bibliographic event authentication information is operation record information of the bibliographic event authentication information system on a basic database according to external authentication requirements;
the bibliographic event authentication information system generates bibliographic transaction information and basic bibliographic event authentication information according to the format requirement of the block chain authentication accounting system on the operation of a basic database according to the authentication requirement;
the bibliographic event authentication information system broadcasts bibliographic transaction information in a block record release period T;
the blockchain authentication and accounting system records the broadcasted bibliographic transaction information;
the block chain authentication and accounting system generates and stores block data according to a certain rule on the basis of the received recorded transaction information;
the steps of verifying the authenticity of the commodity by using a one-time one-certificate method of closed-loop authentication are as follows:
1) the external node scans the RFID label of the commodity to be tested and initiates a request for verifying the authenticity of the commodity to be tested to the finite field block chain system; the external node transmits digital identity certificate information E in the RFID label of the commodity to be detectedi,jSending the information to a verification center node of a corresponding commodity in a finite field block chain system with a closed-loop authentication system;
2) the digital identity certificate information E is authenticated by the bibliographic event authentication information system of the authentication centeri,jCarrying out Hash operation to obtain a message Hi,j
The authentication center sends a message Hi,jRespectively carrying out comparison operation with each element in the commodity verification information set Q;
if the message Hi,jIf the detected commodity is not matched with any element in the commodity verification information set Q, the commodity to be detected is a fake commodity, and verification information of the commodity to be detected, which is false, is generated;
if the message Hi,jAnd Q is divided from the commodity verification information set Qi,jIf other elements are matched, the commodity to be detected is suspicious, and verification information of the commodity to be detected is generated;
if the message Hi,jAnd Q in the commodity authentication information set Qi,jIf the verification information is matched with the commodity to be detected, the commodity to be detected is a genuine commodity, and verification information of the commodity to be detected which is genuine is generated;
each authentication center verifies the information of the commodity to be tested and the digital identity certificate information Ei,jProcessing the transaction information into bibliographic transaction information, and broadcasting the bibliographic transaction information in a limited domain blockchain system;
3) the finite field block chain system receives the judgment results of the m authentication centers and judges whether the commodity is true or false according to a set verification principle;
if the commodity is false, the finite field block chain system sends the judgment result to the external node; the external node displays that the commodity is false; the finite field block chain system records the scanning time and the physical address of the external node; the finite field block chain system finishes the authenticity verification of the commodity, enters the next closed-loop authentication process and waits for the next commodity authenticity verification request of the external node;
if the commodity is true or false and suspicious, the finite field block chain system sends a judgment result to the external node; the external node displays that the commodity is true or false and suspicious; the finite field block chain system records the scanning time and the physical address of the external node; the finite field block chain system finishes the authenticity verification of the commodity, enters the next closed-loop authentication process and waits for the next commodity authenticity verification request of the external node;
if the commodity is true, turning to the step 4;
4) the authentication center generates digital identity certificate information Ei,j+1And sending to the external node; the external node sends digital identity certificate information Ei,j+1Writing into the RFID label of the tested commodity judged to be true to replace the original Ei,j(ii) a The digital identity certificate information Ei, j+1Is a new commodity digital identity cardThe book information is used for verifying the authenticity of the commodity to be tested next time by the external node;
for digital identity certificate information Ei,j+1Carrying out Hash operation to obtain a commodity verification message Qi,j+1(ii) a The base database stores and message corresponds to Ei,j+1Commodity authentication message Q ofi,j+1That is, the product authentication information set is updated to Q ═ Qi,1、Qi,2、…、Qi,j、Qi,j+1}; the goods authentication message Qi,j+1The method is used for verifying the authenticity of the next commodity; the second commodity verification message Q in the updated commodity verification information set Qi,2As the bibliographic event information, and broadcasting the first commodity verification message Q in the finite field blockchain system with closed-loop authentication systemi,1And newly generated goods authentication message Qi,j+1Not broadcasting;
and the finite field block chain system finishes the authenticity verification of the commodity, enters the next closed-loop authentication process and waits for the next commodity authenticity verification request of the external node.
2. The finite field blockchain system with closed-loop authentication system as claimed in claim 1, wherein: having digital identity certificate information E in RFID tag of any one articlei,j(ii) a Wherein i is a commodity production serial number; 1,2, …, l; j is the number of times that the RFID tag writes in the digital identity certificate information; j ═ 1,2, …, k; the digital identity certificate information is a random number;
when any commodity leaves factory for the first time, the RFID label arranged on the commodity is written in the digital identity certificate information E of the commodityi,1(ii) a The basic database of each authentication center stores a commodity verification information set Q ═ { Q ═ Qi,1I.e., j is 1.
3. The finite field blockchain system with closed loop authentication system as claimed in claim 2, wherein: the checking principle is a majority principle.
4. The finite field blockchain system with closed-loop authentication system as claimed in claim 3, wherein: update to Q ═ { Q ═ Q in the commodity authentication information seti,1、Qi,2、…、Qi,j、Qi,j+1On the premise that the authentication center receives the commodity digital identity certificate information E sent by the external nodei,k(ii) a The authentication center performs authentication on the commodity digital identity certificate information Ei,kCarrying out Hash operation to obtain a message Hi,j+1(ii) a If the message Hi,j+1And commodity authentication information Q in commodity authentication information set Qi,kMatching, and k is less than or equal to j, the commodity digital identity certificate information Ei,kHas been stolen and written into the RFID tag of a counterfeit article; the finite field blockchain system records the scanning time and the physical address of the external node.
5. The finite field blockchain system with closed-loop authentication system as claimed in claim 1, wherein: the steps of generating and storing tile data are as follows:
1) setting a block release period T of a finite field block chain system with a closed-loop authentication system and a block release mechanism;
2) in a block release period T, the authentication center node bibliographic event authentication information system carries out authentication operation on an authentication request according to an authentication rule on the basis of the basic authentication data according to external requirements; storing the corresponding generated bibliographic event authentication information in a basic database; meanwhile, generating bibliographic transaction information and uploading the bibliographic transaction information to a block chain authentication and accounting system of each authentication center node in a broadcasting manner;
3) in a block release period T, a finite field block chain system with a closed-loop authentication system selects any n central nodes as block release nodes in a random mode; the other m-n central nodes are non-block issuing nodes;
4) the block issuing node generates block data with a timestamp according to the bibliographic transaction information received in the authentication system within a period of time and broadcasts and issues the block data to the whole authentication system;
the block data comprises a block head area and a block body area; collecting the recorded transaction information broadcasted in a period of time in the block area, wherein the recorded transaction information is used as a calculation parameter and processed into root data; the root data is used as a calculation parameter and is processed into authentication data; the authentication data is recorded in a block header area;
5) the block chain authentication and accounting system of the block issuing node broadcasts the block data;
6) the block chain authentication accounting system of each central node of the finite field block chain system with the closed-loop authentication system receives the broadcasted block data;
7) the m authentication centers determine finally identified new block data according to a set check rule;
8) when a block data is verified and confirmed by the system, the block data is used as the latest block to be connected to the back of the previous block and is stored in a block chain; the system enters the next block record distribution cycle.
6. The finite field blockchain system with closed-loop authentication system as claimed in claim 1, wherein: the blockchain bibliographic accounting system at least comprises: self-checking parameters, health values and engagement;
the health value forms the following rules:
a) if the block data issued by one block issuing node is not verified as a plurality of blocks, the health value of the authentication center is reduced;
and/or b) the authentication center carries out self-checking on the data in the basic database; the health value is influenced by the self-checking result;
and/or c) if an authentication center does not issue basic bibliographic information during the tile record issuance period, the health value may decrease;
the participation degree value is formed according to the following rules:
a) if one authentication center participates in the data distribution of the block, the participation degree value is increased;
and/or b) if an authentication center refuses to participate in issuing block data, the participation degree value is reduced;
the self-checking parameters, the health values and the participation degrees continuously agree that the issuing period of each block is not reduced, and the issuing period is automatically recovered to be a normal initial value; if the self-verification parameters, health values and engagement levels are below the prescribed lower limit values, the center will be alerted or kicked out of the multi-center blockchain system.
CN201810464400.6A 2017-05-16 2018-05-15 Finite field block chain system with closed-loop authentication system Active CN108876399B (en)

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
CN2017103443838 2017-05-16
CN201710344383 2017-05-16
CN201710534947 2017-07-04
CN2017105349474 2017-07-04

Publications (2)

Publication Number Publication Date
CN108876399A CN108876399A (en) 2018-11-23
CN108876399B true CN108876399B (en) 2022-04-29

Family

ID=64333909

Family Applications (12)

Application Number Title Priority Date Filing Date
CN201810462739.2A Active CN108874890B (en) 2017-05-16 2018-05-15 Block chain system with public bibliographic mechanism
CN201810463885.7A Active CN108876365B (en) 2017-05-16 2018-05-15 Intelligent contract for generating block release mechanism
CN201810464400.6A Active CN108876399B (en) 2017-05-16 2018-05-15 Finite field block chain system with closed-loop authentication system
CN201810464384.0A Active CN108921692B (en) 2017-05-16 2018-05-15 Multi-chain block chain system with block issuing mechanism
CN201810462757.0A Active CN108881165B (en) 2017-05-16 2018-05-15 Multi-center authentication system with block issuing mechanism
CN201810462760.2A Pending CN108875386A (en) 2017-05-16 2018-05-15 A kind of multicenter finite field block catenary system framework with block issue mechanism and application demand issue mechanism
CN201810463335.5A Active CN108881166B (en) 2017-05-16 2018-05-15 Virtual account block chain verification system with external fixed physical node
CN202110237010.7A Pending CN113037738A (en) 2017-05-16 2018-05-15 Virtual account block chain verification system with external fixed physical node
CN201810463897.XA Active CN108881167B (en) 2017-05-16 2018-05-15 Intelligent contract of finite field block chain system
CN202110235074.3A Pending CN112929383A (en) 2017-05-16 2018-05-15 Multi-center authentication system with block issuing mechanism
CN201810462740.5A Active CN108881163B (en) 2017-05-16 2018-05-15 Multi-center block chain system with block issuing mechanism
CN201810462747.7A Active CN108876364B (en) 2017-05-16 2018-05-15 Block chain system with annihilation mechanism

Family Applications Before (2)

Application Number Title Priority Date Filing Date
CN201810462739.2A Active CN108874890B (en) 2017-05-16 2018-05-15 Block chain system with public bibliographic mechanism
CN201810463885.7A Active CN108876365B (en) 2017-05-16 2018-05-15 Intelligent contract for generating block release mechanism

Family Applications After (9)

Application Number Title Priority Date Filing Date
CN201810464384.0A Active CN108921692B (en) 2017-05-16 2018-05-15 Multi-chain block chain system with block issuing mechanism
CN201810462757.0A Active CN108881165B (en) 2017-05-16 2018-05-15 Multi-center authentication system with block issuing mechanism
CN201810462760.2A Pending CN108875386A (en) 2017-05-16 2018-05-15 A kind of multicenter finite field block catenary system framework with block issue mechanism and application demand issue mechanism
CN201810463335.5A Active CN108881166B (en) 2017-05-16 2018-05-15 Virtual account block chain verification system with external fixed physical node
CN202110237010.7A Pending CN113037738A (en) 2017-05-16 2018-05-15 Virtual account block chain verification system with external fixed physical node
CN201810463897.XA Active CN108881167B (en) 2017-05-16 2018-05-15 Intelligent contract of finite field block chain system
CN202110235074.3A Pending CN112929383A (en) 2017-05-16 2018-05-15 Multi-center authentication system with block issuing mechanism
CN201810462740.5A Active CN108881163B (en) 2017-05-16 2018-05-15 Multi-center block chain system with block issuing mechanism
CN201810462747.7A Active CN108876364B (en) 2017-05-16 2018-05-15 Block chain system with annihilation mechanism

Country Status (1)

Country Link
CN (12) CN108874890B (en)

Families Citing this family (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109583896A (en) * 2018-11-30 2019-04-05 元灵通智能科技(深圳)有限公司 Transaction verification method, block chain node and storage medium
CN109726201B (en) * 2018-12-12 2020-05-05 杭州基尔区块链科技有限公司 Chip research and development transaction data storage method and system based on intelligent contract
CN109831483A (en) * 2018-12-28 2019-05-31 山东康威通信技术股份有限公司 Distributed block chain control system and method applied to the underground space
CN109656177A (en) * 2018-12-28 2019-04-19 成都易慧家科技有限公司 A kind of intelligent door and window communication system
CN109885258B (en) * 2019-02-01 2023-02-21 立旃(上海)科技有限公司 Data deleting device and method based on block chain
CN110062041B (en) * 2019-04-12 2023-04-07 深圳前海微众银行股份有限公司 Method and device for changing IOT (input/output) equipment based on block chain
CN111931245A (en) * 2019-05-13 2020-11-13 阿里巴巴集团控股有限公司 Information processing method and device
CN110135194B (en) * 2019-05-20 2020-10-30 北京邮电大学 Block chain-based industrial internet digital object management method
CN110535967B (en) * 2019-09-06 2022-08-23 江苏物联网研究发展中心 Vehicle transportation data judgment system
CN110597911B (en) * 2019-09-12 2021-08-17 腾讯科技(深圳)有限公司 Certificate processing method and device for block chain network, electronic equipment and storage medium
CN110780847B (en) * 2019-10-15 2022-02-25 腾讯科技(深圳)有限公司 Random number generation method, random number generation device and electronic equipment
CN113162889B (en) * 2020-01-22 2023-02-17 北京车和家信息技术有限公司 Authentication method and device for route updating information
CN112115116B (en) * 2020-08-05 2024-04-16 西安电子科技大学 Construction method of high-performance tamper-proof database based on blockchain
CN113516487B (en) * 2021-05-19 2022-10-14 广西科技大学 Agricultural product traceability system based on block chain
CN115695055B (en) * 2023-01-05 2023-03-14 中国电子科技集团公司第三十研究所 High-reliability high-concurrency security authentication system and method based on memory database
CN117709947B (en) * 2024-02-05 2024-04-19 广东通莞科技股份有限公司 POS machine settlement authority management method based on blockchain

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2008028291A1 (en) * 2006-09-08 2008-03-13 Certicom Corp. Authenticated radio frequency identification and key distribution system therefor
CN105844472A (en) * 2015-01-13 2016-08-10 四川谦泰仁投资管理有限公司 RFID merchandise anti-counterfeiting tracing system compatible with two-dimensional code counterfeiting prevention
CN105956923A (en) * 2016-04-20 2016-09-21 上海如鸽投资有限公司 Asset transaction platform and digital certification and transaction method for assets
CN106209877A (en) * 2016-07-19 2016-12-07 井创(北京)科技有限公司 A kind of be certification core with block chain backstage false-proof authentication system
CN106339880A (en) * 2016-08-23 2017-01-18 白大文 Product production method and system for users to trace and examine filling process easily

Family Cites Families (47)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CA2291430A1 (en) * 1999-01-28 2000-07-28 Tao Lu Internet transaction security system
US8582777B2 (en) * 2006-05-03 2013-11-12 Samsung Electronics Co., Ltd. Method and system for lightweight key distribution in a wireless network
CN103971250B (en) * 2014-04-09 2017-04-05 四川谦泰仁投资管理有限公司 A kind of one time one card anti-fake traceability system based on mobile terminal and RFID
US20160098730A1 (en) * 2014-10-01 2016-04-07 The Filing Cabinet, LLC System and Method for Block-Chain Verification of Goods
CN104392354B (en) * 2014-11-05 2017-10-03 中国科学院合肥物质科学研究院 A kind of public key address is associated and search method and its system with user account
CN106296184A (en) * 2015-06-05 2017-01-04 地气股份有限公司 Electronic money management method and electronic-monetary system
WO2017027484A1 (en) * 2015-08-09 2017-02-16 Ramasamy Celambarasan System and method for microshare based content funding and distribution
US10402792B2 (en) * 2015-08-13 2019-09-03 The Toronto-Dominion Bank Systems and method for tracking enterprise events using hybrid public-private blockchain ledgers
US10504178B2 (en) * 2015-11-04 2019-12-10 Chicago Mercantile Exchange Inc. System for physically delivering virtual currencies
US20170132626A1 (en) * 2015-11-05 2017-05-11 Mastercard International Incorporated Method and system for processing of a blockchain transaction in a transaction processing network
CN105488675B (en) * 2015-11-25 2019-12-24 布比(北京)网络技术有限公司 Block chain distributed shared general ledger construction method
CN105719172A (en) * 2016-01-19 2016-06-29 布比(北京)网络技术有限公司 Information issuing method and device
CN105761146B (en) * 2016-01-24 2021-06-01 杭州复杂美科技有限公司 Block chain matching exchange
CN105610578B (en) * 2016-01-25 2019-05-03 杭州复杂美科技有限公司 Block chain information deposits card and method for secret protection
CN105809062B (en) * 2016-03-01 2019-01-25 布比(北京)网络技术有限公司 A kind of building of contract executes method and device
CN105893042A (en) * 2016-03-31 2016-08-24 北京航空航天大学 Intelligent contract implementation method based on block chain
CN105912618B (en) * 2016-04-07 2019-04-23 浙江万马新能源有限公司 The charging pile charging transaction means of communication and device based on block chain
KR101701131B1 (en) * 2016-04-28 2017-02-13 주식회사 라피 Data recording and validation methods and systems using the connecting of blockchain between different type
CN105976231A (en) * 2016-06-24 2016-09-28 深圳前海微众银行股份有限公司 Asset management method based on intelligent block chain contracts and nodes
CN106339939B (en) * 2016-08-26 2020-05-15 南京喜玛拉云信息技术有限公司 Non-tamper-able distributed bill system based on secure hardware and transaction processing method
CN106385315B (en) * 2016-08-30 2019-05-17 北京三未信安科技发展有限公司 A kind of digital certificate management method and system
CN106384236B (en) * 2016-08-31 2019-07-16 江苏通付盾科技有限公司 Based on the ca authentication management method of block chain, apparatus and system
CN106375317A (en) * 2016-08-31 2017-02-01 北京明朝万达科技股份有限公司 Block chain-based big data security authentication method and system
CN106503574B (en) * 2016-09-13 2019-11-05 中国电子科技集团公司第三十二研究所 Block chain safe storage method
CN106372533B (en) * 2016-09-14 2020-04-21 中国银联股份有限公司 Content storage method based on block chain technology
US10157295B2 (en) * 2016-10-07 2018-12-18 Acronis International Gmbh System and method for file authenticity certification using blockchain network
CN106548091A (en) * 2016-10-14 2017-03-29 北京爱接力科技发展有限公司 A kind of data deposit card, the method and device of checking
CN106534097B (en) * 2016-10-27 2018-05-18 上海亿账通区块链科技有限公司 Permission method of control and system based on the transaction of block chain
CN106504091B (en) * 2016-10-27 2018-06-29 深圳壹账通智能科技有限公司 The method and device merchandised on block chain
CN106570710A (en) * 2016-10-27 2017-04-19 纸飞机(北京)科技有限公司 Commodity anti-counterfeiting method and device
CN106528775B (en) * 2016-10-28 2020-01-03 济南大学 Private block chain operation support system supporting logic multi-chain and working method thereof
CN106447309A (en) * 2016-11-13 2017-02-22 杭州复杂美科技有限公司 Across-chain transaction of source chain and lateral chain
CN106453636A (en) * 2016-11-22 2017-02-22 深圳银链科技有限公司 Credible block generation method and system
CN106559211B (en) * 2016-11-22 2019-12-13 中国电子科技集团公司第三十研究所 Privacy protection intelligent contract method in block chain
CN106453407B (en) * 2016-11-23 2019-10-15 江苏通付盾科技有限公司 Identity identifying method, certificate server and user terminal based on block chain
CN106651303B (en) * 2016-12-02 2020-05-26 北京轻信科技有限公司 Intelligent contract processing method and system based on template
CN106534160B (en) * 2016-12-02 2020-02-21 江苏通付盾科技有限公司 Identity authentication method and system based on block chain
CN106600252A (en) * 2016-12-15 2017-04-26 咪咕文化科技有限公司 Payment method and payment system based on block chain
CN106530088B (en) * 2016-12-19 2023-11-17 杜伯仁 Method for trading certificate products based on blockchain security nodes
CN106656509B (en) * 2016-12-29 2019-11-29 深圳市检验检疫科学研究院 A kind of RFID alliance chain collaboration authentication method for the monitoring of defeated port food
CN106651332B (en) * 2016-12-29 2020-11-06 成都质数斯达克科技有限公司 Method for generating new block in block chain and block chain
CN106656798B (en) * 2016-12-30 2020-03-27 质数链网科技成都有限公司 Method for calculating decision path and distributed node
CN107122477A (en) * 2017-05-02 2017-09-01 成都中远信电子科技有限公司 A kind of block chain storage system
CN107273760A (en) * 2017-06-09 2017-10-20 济南浪潮高新科技投资发展有限公司 One kind is based on many CA application authentication methods of block chain
CN107358438A (en) * 2017-06-27 2017-11-17 上海霸贤网络科技有限公司 Supply chain dynamic multicenter collaboration authentication model and its implementation based on block chain
CN107249009B (en) * 2017-08-02 2020-02-21 广东工业大学 Data verification method and system based on block chain
CN107995197A (en) * 2017-12-04 2018-05-04 中国电子科技集团公司第三十研究所 A kind of method for realizing across management domain identity and authority information is shared

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2008028291A1 (en) * 2006-09-08 2008-03-13 Certicom Corp. Authenticated radio frequency identification and key distribution system therefor
CN105844472A (en) * 2015-01-13 2016-08-10 四川谦泰仁投资管理有限公司 RFID merchandise anti-counterfeiting tracing system compatible with two-dimensional code counterfeiting prevention
CN105956923A (en) * 2016-04-20 2016-09-21 上海如鸽投资有限公司 Asset transaction platform and digital certification and transaction method for assets
CN106209877A (en) * 2016-07-19 2016-12-07 井创(北京)科技有限公司 A kind of be certification core with block chain backstage false-proof authentication system
CN106339880A (en) * 2016-08-23 2017-01-18 白大文 Product production method and system for users to trace and examine filling process easily

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
"An agri-food supply chain traceability system for China based on RFID & blockchain technology";Feng Tian;《 2016 13th International Conference on Service Systems and Service Management (ICSSSM)》;20160811;全文 *
"CUIAS - A User Identity Authentication Service for Discovery Service";Peng Liu等;《2014 IEEE International Conference on Internet of Things (iThings), and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom)》;20150316;全文 *
"RFID tag data processing in manufacturing for track-and-trace anti-counterfeiting";S.H.Choi等;《Computers in Industry》;20150430;全文 *
"VeChain 发布全球首款基于区块链技术的NFC 防伪芯片";无;《金卡工程》;20160531;全文 *

Also Published As

Publication number Publication date
CN108881167B (en) 2021-06-22
CN108921692A (en) 2018-11-30
CN108874890A (en) 2018-11-23
CN108876364A (en) 2018-11-23
CN108881166B (en) 2021-03-26
CN108881165B (en) 2021-03-26
CN108881165A (en) 2018-11-23
CN108921692B (en) 2022-01-18
CN108881163A (en) 2018-11-23
CN112929383A (en) 2021-06-08
CN108875386A (en) 2018-11-23
CN108876365A (en) 2018-11-23
CN108876364B (en) 2021-11-09
CN108874890B (en) 2020-10-23
CN108881166A (en) 2018-11-23
CN108876365B (en) 2023-08-29
CN113037738A (en) 2021-06-25
CN108881163B (en) 2021-05-14
CN108881167A (en) 2018-11-23
CN108876399A (en) 2018-11-23

Similar Documents

Publication Publication Date Title
CN108876399B (en) Finite field block chain system with closed-loop authentication system
CN102609846B (en) Anti-false verification method and system based on communication network
US10880080B1 (en) Cryptographic key generation from biometric data
US9648496B2 (en) Authentication of web content
CN110458560A (en) For carrying out the method and device of transaction verification
CN110570308A (en) block chain-based electronic warehouse receipt transaction system with incentive mechanism
CN109327312A (en) Authentication method and device, electronic equipment
CN112801778B (en) Alliance type bad asset block chain system
CN109615402A (en) Product quality back-tracing anti-fake system based on block chain technology
WO2015154482A1 (en) One-time certificate anti-counterfeiting tracing system based on mobile terminal and rfid
US20230100422A1 (en) Systems and Methods for Transaction Management in NFT-Directed Environments
CN110933088A (en) Decentralization verifiable hiding representing method and system based on block chain and storage medium
CN116527684B (en) Multi-chain information interaction method based on 1+1+N relay consensus committee
CN110689343A (en) Transaction verification method and device based on directed acyclic graph
CN110598459B (en) Block chain-based data storage card management method and device
CN107483427A (en) A kind of self-reinforcing type anti-counterfeiting technology based on Ntag21X family chips
US10061981B2 (en) Security improvements for tickets
CN110011805A (en) Two-way authentication anti-counterfeiting system and method based on low-power consumption bluetooth system
WO2023015312A1 (en) Methods for securely adding data to a blockchain using dynamic time quanta and version authentication
Hoffman et al. Securing number plates based on digital signatures and RFID
CN110598043A (en) Video processing method and device, computer equipment and storage medium
JP7367270B1 (en) Appraisal certification system and appraisal certification method
JP7371301B2 (en) Product authentication system and method
KR102472427B1 (en) Artificial intelligence-based counterfeit screening inspection and digital certificate issuance method, device and program
CN110648143A (en) Closed-loop anti-counterfeiting verification system based on Merkle trusted tree

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant