CN108876399B - Finite field block chain system with closed-loop authentication system - Google Patents
Finite field block chain system with closed-loop authentication system Download PDFInfo
- Publication number
- CN108876399B CN108876399B CN201810464400.6A CN201810464400A CN108876399B CN 108876399 B CN108876399 B CN 108876399B CN 201810464400 A CN201810464400 A CN 201810464400A CN 108876399 B CN108876399 B CN 108876399B
- Authority
- CN
- China
- Prior art keywords
- authentication
- commodity
- information
- block chain
- finite field
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K17/00—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
- G06K17/0022—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device
- G06K17/0029—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device the arrangement being specially adapted for wireless interrogation of grouped or bundled articles tagged with wireless record carriers
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/018—Certifying business or products
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3297—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
Abstract
The invention discloses a finite field block chain system with a closed-loop authentication system, which mainly comprises m authentication centers and n external nodes. Each authentication center mainly comprises a recorded event authentication information system and a block chain authentication accounting system. The basic database mainly stores basic authentication data and bibliographic event authentication information. And after scanning the RFID label of the commodity to be tested, the external node accesses the basic database and verifies the authenticity of the commodity to be tested by using a one-time one-certificate method of closed-loop authentication. According to the invention, through the finite field block chain system with the closed-loop authentication system, a counterfeiter can be effectively prevented from passing through the security loophole of the electronic tag or the security loophole of other anti-counterfeiting system components, and the scale amplitude value RFID electronic tag is effectively prevented, so that the security of the anti-counterfeiting system is ensured.
Description
Technical Field
The invention relates to the field of digital authentication, in particular to a finite field block chain system with a closed-loop authentication system.
Background
With the development of mobile communication technology, especially mobile internet and internet of things are permeating into the living field of people, and various demands for authentication services based on internet are appeared. Such as authentication of authenticity of goods, transaction information, collection information, virtual account information, virtual property, personal/enterprise identity information, credit investigation information, justice information, etc.
In the prior art, a server connected to the internet needs to be built, and then the server is accessed through an external node to inquire the information.
However, it is a difficult matter to hack the system server by means of hackers. Hackers often achieve illegal purposes by rewriting the information stored in the server. Accordingly, there is a need for an improvement in existing internet-based authentication systems.
According to the invention, through a closed-loop authentication mode, the security and reliability of authentication are improved, and the problem of double flowers in a block chain is well solved.
Disclosure of Invention
The present invention is directed to solving the problems of the prior art.
The technical scheme adopted for achieving the purpose of the invention is that the finite field block chain system with the closed-loop authentication system mainly comprises m authentication centers and k external nodes. The authentication center is a main server. And m authentication centers have the same authority.
The external node is a mobile terminal with the function of reading and writing the commodity RFID label.
Having digital identity certificate information E in RFID tag of any one articlei,j. Wherein i is a commodity production serial number. i is 1,2, …, l. j is the number of times the RFID tag writes a message. j is 1,2, …, k. Digital identity certificate information E of commodityi,jAnd corresponds to the commodity authentication information set Q. The digital identity certificate information is a random number.
When any commodity leaves factory for the first time, the RFID label arranged on the commodity writes a message Ei,1The basic database stores a commodity verification information set Q ═ { Q ═ Qi,1},I.e., j equals 1.
Each authentication center mainly comprises a recorded event authentication information system and a block chain authentication accounting system.
Any of the authentication centers reads data from the underlying database. The basic database is a server with a data storage function and performs data interaction with a finite field blockchain system with a closed-loop authentication system.
The basic database mainly stores basic authentication data and bibliographic event authentication information.
The initial basic authentication data is provided by the authentication requirement of the authentication center node and is basic information of commodity authentication.
The basis is a commodity verification information set Q. Product authentication information set Q ═ Qi,1、Qi,2、…、Qi,j}. And i is the commodity production serial number. i is 1,2, …, l. j is the number of times the RFID tag of the article writes a message. j is 1,2, …, k. Commodity authentication information Qi,jIs digital identity certificate information Ei,jAnd (4) carrying out hash operation on the obtained hash value.
The bibliographic event authentication information comprises verification information of the to-be-detected commodity and verified digital identity certificate information E of the to-be-detected commodityi,jAnd (4) forming.
The commodity to be tested is verified to be false, the commodity is true or false and suspicious or the commodity is false or true.
The bibliographic event information is the operation record information of the bibliographic event authentication information system to the basic database according to the external authentication requirement.
And the bibliographic event authentication information system generates bibliographic transaction information and basic bibliographic event authentication information according to the format requirement of the block chain authentication accounting system on the operation of the basic database according to the authentication requirement.
The bibliographic event authentication information system broadcasts bibliographic transaction information during a block record distribution period T.
The blockchain authentication billing system records the broadcasted bibliographic transaction information.
The block chain authentication and accounting system generates and stores block data according to a certain rule based on the received recorded transaction information.
The main steps of generating and storing block data are as follows:
1) and setting a block issuing period T of the finite field block chain system with the closed-loop authentication system and the block issuing mechanism.
2) In a block release period T, the authentication center node bibliographic event authentication information system carries out authentication operation on an authentication request according to an authentication rule on the basis of the basic authentication data according to external requirements; storing the corresponding generated bibliographic event authentication information in a basic database; and meanwhile, generating bibliographic transaction information and uploading the bibliographic transaction information to a block chain authentication and accounting system of each authentication center node in a broadcasting manner.
3) In a block issuing period T, the multi-center authentication system selects any n authentication centers as block issuing nodes in a random mode. The other m-n authentication centers are non-block issuing nodes. m and n are finite positive integers. n ≦ m.
4) And the block issuing node generates block data with a time stamp according to the bibliographic transaction information received in the authentication system within a period of time and broadcasts and issues the block data to the whole authentication system.
The block data includes a block header region and a block body region. The block area collects the recorded transaction information broadcasted during time t. And processing the bibliographic transaction information broadcasted in the time t into root data as a calculation parameter. The root data is processed into authentication data as a calculation parameter. The authentication data is recorded in a block header area.
5) And the block chain authentication accounting system of the block issuing node broadcasts the block data.
6) And the block chain authentication accounting system of each central node of the finite field block chain system with the closed-loop authentication system receives the broadcasted block data.
7) And the m authentication centers determine the finally determined new block data according to the set verification rule.
8) When a block data is verified and confirmed by the system, the block data is used as the latest block to be connected to the back of the previous block and is stored in a block chain; the system enters the next block record distribution cycle.
And after scanning the RFID label of the commodity to be tested, the external node accesses the basic database and verifies the authenticity of the commodity to be tested by using a one-time one-certificate method of closed-loop authentication.
The method for verifying the authenticity of the commodity by utilizing the closed-loop authentication one-time method mainly comprises the following steps:
1) and the external node scans the RFID label of the to-be-detected commodity and initiates a request for verifying the authenticity of the to-be-detected commodity to the finite field block chain system. The external node transmits digital identity certificate information E in the RFID label of the commodity to be detectedi,jAnd sending the information to a verification center node of a corresponding commodity with a closed-loop authentication system.
2) The digital identity certificate information E is authenticated by the bibliographic event authentication information system of the authentication centeri,jCarrying out Hash operation to obtain information Hi,j。
The authentication center sends information Hi,jAnd respectively carrying out comparison operation with each element in the commodity verification information set Q.
If the message Hi,jAnd if any element in the commodity verification information set Q is not matched, the commodity to be detected is a fake commodity, and the verification information of the commodity to be detected, which indicates that the commodity to be detected is fake, is generated.
If the message Hi,jAnd Q is divided from the commodity verification information set Qi,jAnd if other elements are matched, the commodity to be detected is suspicious, and verification information of the commodity to be detected is generated.
If the message Hi,1And Q in the commodity authentication information set Qi,jAnd if the verification information is matched, the commodity to be detected is a genuine commodity, and verification information of the commodity to be detected which is genuine is generated.
Each authentication center verifies the information of the commodity to be tested and the information Ei,jProcessed as bibliographic transaction information and broadcast the bibliographic transaction information in a finite field blockchain system.
3) And the finite field block chain system receives the judgment results of the m authentication centers and judges whether the commodity is true or false according to a set verification principle. The checking principle is a majority principle.
And if the commodity is false, the finite field block chain system sends the judgment result to the external node. The external node displays that the commodity is false. And the finite field block chain system records the scanning time and the physical address of the external node. And the finite field block chain system finishes the authenticity verification of the commodity, enters the next closed-loop authentication process and waits for the next commodity authenticity verification request of the external node.
And if the commodity is true or false and suspicious, the finite field block chain system sends the judgment result to the external node. And the external node displays that the commodity is true or false and suspicious. And the finite field block chain system records the scanning time and the physical address of the external node. And the finite field block chain system finishes the authenticity verification of the commodity, enters the next closed-loop authentication process and waits for the next commodity authenticity verification request of the external node.
If the goods is true, go to step 4.
4) The authentication center generates digital identity certificate information Ei,j+1And transmitted to the external node. The external node sends digital identity certificate information Ei,j+1Writing into the RFID label of the tested commodity judged to be true to replace the original Ei,j. The digital identity certificate information Ei,j+1The information of the new commodity digital identity certificate is used for verifying the authenticity of the commodity to be tested next time by the external node.
For digital identity certificate information Ei,j+1Carrying out Hash operation to obtain a commodity verification message Qi,j+1. The base database stores and message corresponds to Ei,j+1Commodity authentication message Q ofi,j+1That is, the product authentication information set is updated to Q ═ Qi,1、Qi,2、…、Qi,j、Qi,j+1}. The goods authentication message Qi,j+1And the product is used for verifying the authenticity of the next product. The second commodity verification message Q in the updated commodity verification information set Qi,2As event information, and broadcast with closed loop authentication systemCommodity authentication message Q of the first in a conventional finite field block chain systemi,1And newly generated commodity authentication information Qi,j+1And no broadcast. And the finite field block chain system enters the next closed-loop authentication process and waits for the next commodity authenticity verification request of the external node.
Update to Q ═ { Q ═ Q in the commodity authentication information seti,1、Qi,2、…、Qi,j、Qi,j+1On the premise that the authentication center receives the information E sent by the external nodei,k. The authentication center the digital identity certificate information Ei,kCarrying out Hash operation to obtain information Hi,j+1. If the information Hi,j+1And commodity authentication information Q in the commodity authentication information set Qi,kMatching, and k is less than or equal to j, then the digital identity certificate information Ei,kHas been stolen and written into RFID tags of counterfeit goods. The finite field blockchain system records the scanning time and the physical address of the external node.
Further, the blockchain bibliographic accounting system at least comprises: self-checking parameters, health values and engagement.
The health parameter values form the following rules:
a) if the block data issued by one block issuing node is not verified as a majority, the health parameter value of the authentication center is decreased.
And/or b) the authentication center performs self-checking on the data in the basic database. The result of the self-test affects the value of the health parameter.
And/or c) the health value may be reduced if an authentication center does not issue the basic bibliographic information during the block record issuing period.
The participation degree value is formed according to the following rules:
a) if an authentication center participates in the distribution of block data, the participation degree value increases. And/or b) if an authentication center refuses to participate in issuing block data, the participation degree value is decreased.
And if the self-checking parameters, the health values and the participation degrees continuously agree that the issuing period of the blocks is not reduced, the issuing period is automatically recovered to be the normal initial value. If the self-verification parameters, health values and engagement levels are below the defined lower limits, the center will be alerted or kicked out of the multi-center blockchain system.
The technical effect of the present invention is undoubted. According to the invention, through the finite field block chain system with the closed-loop authentication system, a counterfeiter can be effectively prevented from passing through the security loophole of the electronic tag or the security loophole of other anti-counterfeiting system components, and the scale amplitude value RFID electronic tag is effectively prevented, so that the security of the anti-counterfeiting system is ensured. The invention constructs a brand-new mutual-aid system framework based on a 'people-oriented person-I-man' belt-block issuing machine system, and replaces a mining mechanism and a workload proving mechanism in a traditional block chain with a 'people-oriented person-I-man' mutual-aid mode. Therefore, a brand-new block issuing mechanism and a multi-center distributed authentication system architecture are established, and issuing functions of centers are different. The method can be applied to a high-fault-tolerance distributed computing system, and mixed consistency is possible. The invention also solves the problem of double flowers in the block chain. The invention has wide application value in the important fields of non-virtual currency application scenes, such as identity authentication, mastership currency issuance and the like.
Drawings
FIG. 1 is a schematic diagram of an authentication system;
FIG. 2 is a block data structure diagram.
Detailed Description
The present invention is further illustrated by the following examples, but it should not be construed that the scope of the above-described subject matter is limited to the following examples. Various substitutions and alterations can be made without departing from the technical idea of the invention and the scope of the invention is covered by the present invention according to the common technical knowledge and the conventional means in the field.
Example 1:
referring to fig. 1 and 2, a finite field blockchain system with a closed-loop authentication system mainly includes m authentication centers and n external nodes. The authentication center is a main server. And m authentication centers have the same authority.
The external node is a mobile terminal with the function of reading and writing the commodity RFID label.
Having digital identity certificate information E in RFID tag of any one articlei,j. Wherein i is a commodity production serial number. i is 1,2, …, l. j is the number of times the RFID tag writes a message. j is 1,2, …, k. Digital identity certificate information E of commodityi,jAnd corresponds to the commodity authentication information set Q. The digital identity certificate information is a random number.
When any commodity leaves factory for the first time, the RFID label arranged on the commodity writes a message Ei,1The basic database stores a commodity verification information set Q ═ { Q ═ Qi,1I.e., j is 1.
Each authentication center mainly comprises a recorded event authentication information system and a block chain authentication accounting system.
Any of the authentication centers reads data from the underlying database. The basic database is a server with a data storage function and performs data interaction with a finite field blockchain system with a closed-loop authentication system.
The basic database mainly stores basic authentication data and bibliographic event authentication information.
The initial basic authentication data is provided by the authentication requirement of the authentication center node and is basic information of commodity authentication.
The basis is a commodity verification information set Q. Product authentication information set Q ═ Qi,1、Qi,2、…、Qi,j}. And i is the commodity production serial number. i is 1,2, …, l. j is the number of times the RFID tag of the article writes a message. j is 1,2, …, k. Commodity authentication information Qi,jIs digital identity certificate information Ei,jAnd (4) carrying out hash operation on the obtained hash value. .
The bibliographic event authentication information comprises verification information of the to-be-detected commodity and verified digital identity certificate information E of the to-be-detected commodityi,jAnd (4) forming.
The commodity to be tested is verified to be false, the commodity is true or false and suspicious or the commodity is false or true.
The bibliographic event information is the operation record information of the bibliographic event authentication information system to the basic database according to the external authentication requirement.
And the bibliographic event authentication information system generates bibliographic transaction information and basic bibliographic event authentication information according to the format requirement of the block chain authentication accounting system on the operation of the basic database according to the authentication requirement.
The bibliographic event authentication information system broadcasts bibliographic transaction information during a block record distribution period T.
The blockchain authentication billing system records the broadcasted bibliographic transaction information.
The block chain authentication and accounting system generates and stores block data according to a certain rule based on the received recorded transaction information.
The main steps of generating and storing block data are as follows:
1) and setting a block issuing period T of the finite field block chain system with the closed-loop authentication system and the block issuing mechanism.
2) In a block release period T, the authentication center node bibliographic event authentication information system carries out authentication operation on an authentication request according to an authentication rule on the basis of the basic authentication data according to external requirements; storing the corresponding generated bibliographic event authentication information in a basic database; and meanwhile, generating bibliographic transaction information and uploading the bibliographic transaction information to a block chain authentication and accounting system of each authentication center node in a broadcasting manner.
3) In a block issuing period T, the finite field block chain system with the closed-loop authentication system selects any n central nodes as block issuing nodes in a random mode. The other m-n central nodes are non-block issuing nodes.
Further, the step of selecting the block issuing node is mainly as follows:
1.1) selecting the authentication center as a block issuing node in a random mode.
1.2) records the number of times d each authentication center was selected as a chunk issue node in the period of T2.
1.3) setting a time threshold epsilon.
1.4) judging the magnitude relation between d and a threshold epsilon. If d > epsilon, the corresponding authentication center is moved out of the random list in the next period and reset for a number of times d. If d is less than or equal to epsilon, directly resetting the times d.
4) And the block issuing node generates block data with a time stamp according to the bibliographic transaction information received in the authentication system within a period of time and broadcasts and issues the block data to the whole authentication system.
The block data includes a block header region and a block body region. The block area collects the recorded transaction information broadcasted during time t. And processing the bibliographic transaction information broadcasted in the time t into root data as a calculation parameter. The root data is used as a calculation parameter and is processed into authentication data; the authentication data is recorded in a block header area. the t time is a set time. .
5) And the block chain authentication accounting system of the block issuing node broadcasts the block data.
6) And the block chain authentication accounting system of each central node of the finite field block chain system with the closed-loop authentication system receives the broadcasted block data.
7) And the m authentication centers determine the finally determined new block data according to the set verification rule.
8) When a block data is verified and confirmed by the system, the block data is used as the latest block to be connected to the back of the previous block and is stored in a block chain; the system enters the next block record distribution cycle.
And after scanning the RFID label of the commodity to be tested, the external node accesses the basic database and verifies the authenticity of the commodity to be tested by using a one-time one-certificate method of closed-loop authentication.
The method for verifying the authenticity of the commodity by utilizing the closed-loop authentication one-time method mainly comprises the following steps:
a) and the external node scans the RFID label of the to-be-detected commodity and initiates a request for verifying the authenticity of the to-be-detected commodity to the finite field block chain system. The external node transmits digital identity certificate information E in the RFID label of the commodity to be detectedi,jAnd sending the information to a verification center node of a corresponding commodity with a closed-loop authentication system.
b) Bibliography of the authentication centerEvent authentication information system for said digital identity certificate information Ei,jCarrying out Hash operation to obtain information Hi,j。
The authentication center sends information Hi,jAnd respectively carrying out comparison operation with each element in the commodity verification information set Q.
If the message Hi,jAnd if any element in the commodity verification information set Q is not matched, the commodity to be detected is a fake commodity, and the verification information of the commodity to be detected, which indicates that the commodity to be detected is fake, is generated.
If the message Hi,jAnd Q is divided from the commodity verification information set Qi,jAnd if other elements are matched, the commodity to be detected is suspicious, and verification information of the commodity to be detected is generated.
If the message Hi,1And Q in the commodity authentication information set Qi,jAnd if the verification information is matched, the commodity to be detected is a genuine commodity, and verification information of the commodity to be detected which is genuine is generated.
Each authentication center verifies the information of the commodity to be tested and the information Ei,jProcessed as bibliographic transaction information and broadcast the bibliographic transaction information in a finite field blockchain system.
c) And the finite field block chain system receives the judgment results of the m authentication centers and judges whether the commodity is true or false according to a set verification principle. The checking principle is a majority principle.
And if the commodity is false, the finite field block chain system sends the judgment result to the external node. The external node displays that the commodity is false. And the finite field block chain system records the scanning time and the physical address of the external node. And the finite field block chain system finishes the authenticity verification of the commodity, enters the next closed-loop authentication process and waits for the next commodity authenticity verification request of the external node.
And if the commodity is false, the finite field block chain system sends the judgment result to the external node. The external node displays that the commodity is false. And the finite field block chain system records the scanning time and the physical address of the external node. And the finite field block chain system finishes the authenticity verification of the commodity, enters the next closed-loop authentication process and waits for the next commodity authenticity verification request of the external node.
And if the commodity is true or false and suspicious, the finite field block chain system sends the judgment result to the external node. And the external node displays that the commodity is true or false and suspicious. And the finite field block chain system records the scanning time and the physical address of the external node. And the finite field block chain system finishes the authenticity verification of the commodity, enters the next closed-loop authentication process and waits for the next commodity authenticity verification request of the external node.
If the goods is true, go to step 4.
d) The authentication center generates digital identity certificate information Ei,j+1And transmitted to the external node. The external node sends digital identity certificate information Ei,j+1Writing into the RFID label of the tested commodity judged to be true to replace the original Ei,j. The digital identity certificate information Ei,j+1The information of the new commodity digital identity certificate is used for verifying the authenticity of the commodity to be tested at the j +1 th time of the external node.
For digital identity certificate information Ei,j+1Carrying out Hash operation to obtain a commodity verification message Qi,j+1. The base database stores and message corresponds to Ei,j+1Commodity authentication message Q ofi,j+1That is, the product authentication information set is updated to Q ═ Qi,1、Qi,2、…、Qi,j、Qi,j+1}. The second commodity verification message Q in the updated commodity verification information set Qi,2As the bibliographic event information, and broadcasting the first commodity verification message Q in the finite field blockchain system with closed-loop authentication systemi,1And newly generated commodity authentication information Qi,j+1And no broadcast. And the finite field block chain system finishes the authenticity verification of the commodity, enters the next closed-loop authentication process and waits for the next commodity authenticity verification request of the external node.
Update to Q ═ { Q ═ Q in the commodity authentication information seti,1、Qi,2、…、Qi,j、Qi,j+1On the premise of the previous step, the authentication centerReceiving the digital identity certificate information E sent by the external nodei,k. The authentication center the digital identity certificate information Ei,kCarrying out Hash operation to obtain information Hi,j+1. If the information Hi,j+1And commodity authentication information Q in the commodity authentication information set Qi,kMatching, and k is less than or equal to j, then the digital identity certificate information Ei,kHas been stolen and written into RFID tags of counterfeit goods. The finite field blockchain system records the scanning time and the physical address of the external node.
Further, the blockchain bibliographic accounting system at least comprises: self-checking parameters, health values and engagement.
The health parameter values form the following rules:
a) if the block data issued by one block issuing node is not verified as a majority, the health parameter value of the authentication center is decreased.
And/or b) the authentication center performs self-checking on the data in the basic database. The result of the self-test affects the value of the health parameter.
And/or c) the health value may be reduced if an authentication center does not issue the basic bibliographic information during the block record issuing period.
The participation degree value is formed according to the following rules:
a) if an authentication center participates in the distribution of block data, the participation degree value increases.
And/or b) if an authentication center refuses to participate in issuing block data, the participation degree value is decreased.
And if the self-checking parameters, the health values and the participation degrees continuously agree that the issuing period of the blocks is not reduced, the issuing period is automatically recovered to be the normal initial value. If the self-verification parameters, health values and engagement levels are below the defined lower limits, the center will be alerted or kicked out of the multi-center blockchain system.
Example 2:
the method for verifying the authenticity of the Helianna Lvbao essence by using the finite field block chain system with the closed-loop authentication system mainly comprises the following steps:
1) and establishing a finite field block chain system with a closed-loop authentication system, wherein the finite field block chain system mainly comprises m authentication centers and k external nodes. The authentication center is a main server. And m authentication centers have the same authority. The external node is a mobile terminal with the function of reading and writing the commodity RFID label.
2) A certain user utilizes a mobile phone with an RFID identification function as an external node. Scanning the RFID label on the essence bottle body of the Helianna Lvbao bottle by the external node to obtain digital identity certificate information E101,25. 101 is the production serial number of Helianna's bottle essence of green treasure, and 25 shows that this bottle essence has been written into and has been updated 25 times digital identity certificate information.
3) And the external node initiates a 25 th authenticity verification request of the commodity to be tested to the finite field block chain system. The external node transmits information E in the RFID label of the commodity to be tested101,25Sending the data to a finite field block chain system with a closed loop authentication system.
4) Each authentication center pairs the digital identity certificate information E101,25Carrying out Hash operation to obtain information H101,25。
Each authentication center sends information H101,25And respectively carrying out comparison operation with each element in the commodity verification information set Q. The commodity authentication information set Q ═ { Q ═ Q101,1、Q101,2、…、Q101,25}
The comparison results in this example are: the message H101,25And any element in the commodity verification information set Q is not matched. Therefore, the commodity to be tested is a fake commodity, and each authentication center generates verification information of the commodity to be tested, wherein the commodity to be tested is fake.
5) And the finite field block chain system receives the judgment results of the m authentication centers and judges whether the commodity is true or false according to a set verification principle. The checking principle is a majority principle.
And the finite field block chain system sends the judgment result to the external node because the commodity is false. The external node displays that the commodity is false. And the finite field block chain system records the scanning time and the physical address of the external node. The scanning time and the physical address are the possible fake making time and the address of a fake maker. And the finite field block chain system finishes the authenticity verification of the commodity, enters the next closed-loop authentication process and waits for the next commodity authenticity verification request of the external node.
Example 3:
the method for verifying the authenticity of the Helianna Lvbao essence by using the finite field block chain system with the closed-loop authentication system mainly comprises the following steps:
1) and establishing a finite field block chain system with a closed-loop authentication system, wherein the finite field block chain system mainly comprises m authentication centers and k external nodes. The authentication center is a main server. And m authentication centers have the same authority. The external node is a mobile terminal with the function of reading and writing the commodity RFID label.
2) A certain user utilizes a mobile phone with an RFID identification function as an external node. Scanning the RFID label on the essence bottle body of the Helianna Lvbao bottle by the external node to obtain digital identity certificate information E102,27. 102 is the production serial number of Helianna' Lubao bottle essence, and 27 indicates that the bottle essence is written with the digital identity certificate information which is updated 27 times.
3) And the external node initiates a 27 th authenticity verification request of the commodity to be tested to the finite field block chain system. The external node transmits information E in the RFID label of the commodity to be tested102,27Sending the data to a finite field block chain system with a closed loop authentication system.
4) Each authentication center pairs the digital identity certificate information E102,27Carrying out Hash operation to obtain information H102,27。
Each authentication center sends information H101,25And respectively carrying out comparison operation with each element in the commodity verification information set Q. The commodity authentication information set Q ═ { Q ═ Q102,1、Q102,2、…、Q102,27}
The comparison results in this example are: the message Hi,jAnd Q is divided from the commodity verification information set Q102,27If other elements are matched, the commodity to be tested is true or false and the verification of the commodity to be tested is generatedAnd (4) information.
5) And the finite field block chain system receives the judgment results of the m authentication centers and judges whether the commodity is true or false according to a set verification principle. The checking principle is a majority principle.
And if the commodity is true or false and suspicious, the finite field block chain system sends the judgment result to the external node. And the external node displays that the commodity is true or false and suspicious. And the finite field block chain system records the scanning time and the physical address of the external node. And the finite field block chain system finishes the authenticity verification of the commodity, enters the next closed-loop authentication process and waits for the next commodity authenticity verification request of the external node.
Example 4:
the method for verifying the authenticity of the Helianna Lvbao essence by using the finite field block chain system with the closed-loop authentication system mainly comprises the following steps:
1) and establishing a finite field block chain system with a closed-loop authentication system, wherein the finite field block chain system mainly comprises m authentication centers and k external nodes. The authentication center is a main server. And m authentication centers have the same authority. The external node is a mobile terminal with the function of reading and writing the commodity RFID label.
2) A certain user utilizes a mobile phone with an RFID identification function as an external node. Scanning the RFID label on the essence bottle body of the Helianna Lvbao bottle by the external node to obtain digital identity certificate information E103,30. 103 is the production serial number of Helianna' Lubao bottle essence, and 30 shows that the bottle essence is written in and updated with 30 times of digital identity certificate information.
3) And the external node initiates a 30-time authenticity verification request of the commodity to be tested to the finite field block chain system. The external node transmits information E in the RFID label of the commodity to be tested103,30Sending the data to a finite field block chain system with a closed loop authentication system.
4) Each authentication center pairs the digital identity certificate information E103,30Carrying out Hash operation to obtain information H103,30。
Each authentication center sends information H103,30And respectively carrying out comparison operation with each element in the commodity verification information set Q.The commodity authentication information set Q ═ { Q ═ Q103,1、Q103,2、…、Q103,30}
The comparison results in this example are: the message Hi,jAnd Q in the commodity authentication information set Q103,30If the matching result is positive, the commodity is true, and the authentication center generates digital identity certificate information E103,31And transmitted to the external node. The external node sends digital identity certificate information E103,31Writing into the RFID label of the tested commodity judged to be true to replace the original E103,30. The digital identity certificate information E103,31The digital identity certificate information of the new commodity is used for verifying the authenticity of the commodity to be tested at the 31 st time by the external node.
For digital identity certificate information E103,31Carrying out Hash operation to obtain a commodity verification message Qi,j+1. The base database stores and message corresponds to E103,31Commodity authentication message Q of103,31That is, the product authentication information set is updated to Q ═ Q103,1、Q103,2、…、Q103,j、Q103,31}. And the finite field block chain system finishes the authenticity verification of the commodity, enters the next closed-loop authentication process and waits for the next commodity authenticity verification request of the external node.
5) And the finite field block chain system receives the judgment results of the m authentication centers and judges whether the commodity is true or false according to a set verification principle. The checking principle is a majority principle.
And if the commodity is true, the finite field block chain system sends the judgment result to the external node. And the external node displays that the commodity is true or false and suspicious. And the finite field block chain system records the scanning time and the physical address of the external node. And the finite field block chain system finishes the authenticity verification of the commodity, enters the next closed-loop authentication process and waits for the next commodity authenticity verification request of the external node.
Example 5:
the method for verifying the authenticity of the Helianna Lvbao essence by using the finite field block chain system with the closed-loop authentication system mainly comprises the following steps:
1) and establishing a finite field block chain system with a closed-loop authentication system, wherein the finite field block chain system mainly comprises m authentication centers and k external nodes. The authentication center is a main server. And m authentication centers have the same authority. The external node is a mobile terminal with the function of reading and writing the commodity RFID label.
2) A certain user utilizes a mobile phone with an RFID identification function as an external node. Scanning the RFID label on the essence bottle body of the Helianna Lvbao bottle by the external node to obtain digital identity certificate information E104,50. 104 is the production serial number of Helianna' Lubao bottle essence, and 50 indicates that the bottle essence is written in the digital identity certificate information which is updated 50 times.
3) And the external node initiates a request for verifying the authenticity of the commodity to be tested to the finite field block chain system. The external node transmits information E in the RFID label of the commodity to be tested104,50Sending the data to a finite field block chain system with a closed loop authentication system.
4) Each authentication center pairs the digital identity certificate information E104,50Carrying out Hash operation to obtain information H104,50。
Each authentication center sends information H104,50And respectively carrying out comparison operation with each element in the commodity verification information set Q. The commodity authentication information set Q ═ { Q ═ Q104,1、Q104,2、…、Q104,52}
The comparison results in this example are: the message H104,50And an element Q in the commodity authentication information set Q104,50The latest commodity verification information corresponding to the commodity with the serial number 104 in the commodity verification information set Q is Q104,52If the commodity to be tested is false, generating verification information of the commodity to be tested, wherein the commodity to be tested is false. Commodity digital identity certificate information E104,50Has been stolen and written into RFID tags of counterfeit goods. The finite field blockchain system records the scanning time and the physical address of the external node. The scan time and physical address are the fake time and fake address of a possible counterfeiter.
5) And the finite field block chain system receives the judgment results of the m authentication centers and judges whether the commodity is true or false according to a set verification principle. The checking principle is a majority principle.
And if the commodity is false, the finite field block chain system sends the judgment result to the external node. The external node displays that the commodity is false. And the finite field block chain system records the scanning time and the physical address of the external node. And the finite field block chain system finishes the authenticity verification of the commodity, enters the next closed-loop authentication process and waits for the next commodity authenticity verification request of the external node.
Claims (6)
1. A finite field block chain system with a closed-loop authentication system is characterized in that: the system comprises m authentication centers and n external nodes; the authentication center is a main server; m authentication centers have the same authority; the external node is a mobile terminal with the function of reading and writing the RFID label of the commodity;
each authentication center comprises a recorded event authentication information system and a block chain authentication and accounting system;
any authentication center reads data from a basic database; the basic database is a server with a data storage function and used for carrying out data interaction with a finite field block chain system with a closed-loop authentication system;
the basic database stores basic authentication data and bibliographic event authentication information;
the initial basic authentication data is provided by the authentication requirement of the authentication center node and is basic information of commodity authentication; the basic authentication data is a commodity verification information set Q; product authentication information set Q ═ Qi,1、Qi,2、…、Qi,j}; i is the commodity production serial number; 1,2, …, l; j is the number of times of writing messages into the RFID label of the commodity; j ═ 1,2, …, k; commodity authentication message Qi,jIs digital identity certificate information Ei,jCarrying out Hash operation on the obtained Hash value;
the bibliographic event authentication information comprises verification information of the to-be-detected commodity and verified digital identity certificate information E of the to-be-detected commodityi,jComposition is carried out;
after scanning the RFID label of the commodity to be tested, the external node accesses the basic database and verifies the authenticity of the commodity to be tested by using a one-time one-certificate method of closed-loop authentication; the commodity to be tested is verified to be whether the commodity is false, whether the commodity is true or false or whether the commodity is true;
the bibliographic event authentication information is operation record information of the bibliographic event authentication information system on a basic database according to external authentication requirements;
the bibliographic event authentication information system generates bibliographic transaction information and basic bibliographic event authentication information according to the format requirement of the block chain authentication accounting system on the operation of a basic database according to the authentication requirement;
the bibliographic event authentication information system broadcasts bibliographic transaction information in a block record release period T;
the blockchain authentication and accounting system records the broadcasted bibliographic transaction information;
the block chain authentication and accounting system generates and stores block data according to a certain rule on the basis of the received recorded transaction information;
the steps of verifying the authenticity of the commodity by using a one-time one-certificate method of closed-loop authentication are as follows:
1) the external node scans the RFID label of the commodity to be tested and initiates a request for verifying the authenticity of the commodity to be tested to the finite field block chain system; the external node transmits digital identity certificate information E in the RFID label of the commodity to be detectedi,jSending the information to a verification center node of a corresponding commodity in a finite field block chain system with a closed-loop authentication system;
2) the digital identity certificate information E is authenticated by the bibliographic event authentication information system of the authentication centeri,jCarrying out Hash operation to obtain a message Hi,j;
The authentication center sends a message Hi,jRespectively carrying out comparison operation with each element in the commodity verification information set Q;
if the message Hi,jIf the detected commodity is not matched with any element in the commodity verification information set Q, the commodity to be detected is a fake commodity, and verification information of the commodity to be detected, which is false, is generated;
if the message Hi,jAnd Q is divided from the commodity verification information set Qi,jIf other elements are matched, the commodity to be detected is suspicious, and verification information of the commodity to be detected is generated;
if the message Hi,jAnd Q in the commodity authentication information set Qi,jIf the verification information is matched with the commodity to be detected, the commodity to be detected is a genuine commodity, and verification information of the commodity to be detected which is genuine is generated;
each authentication center verifies the information of the commodity to be tested and the digital identity certificate information Ei,jProcessing the transaction information into bibliographic transaction information, and broadcasting the bibliographic transaction information in a limited domain blockchain system;
3) the finite field block chain system receives the judgment results of the m authentication centers and judges whether the commodity is true or false according to a set verification principle;
if the commodity is false, the finite field block chain system sends the judgment result to the external node; the external node displays that the commodity is false; the finite field block chain system records the scanning time and the physical address of the external node; the finite field block chain system finishes the authenticity verification of the commodity, enters the next closed-loop authentication process and waits for the next commodity authenticity verification request of the external node;
if the commodity is true or false and suspicious, the finite field block chain system sends a judgment result to the external node; the external node displays that the commodity is true or false and suspicious; the finite field block chain system records the scanning time and the physical address of the external node; the finite field block chain system finishes the authenticity verification of the commodity, enters the next closed-loop authentication process and waits for the next commodity authenticity verification request of the external node;
if the commodity is true, turning to the step 4;
4) the authentication center generates digital identity certificate information Ei,j+1And sending to the external node; the external node sends digital identity certificate information Ei,j+1Writing into the RFID label of the tested commodity judged to be true to replace the original Ei,j(ii) a The digital identity certificate information Ei, j+1Is a new commodity digital identity cardThe book information is used for verifying the authenticity of the commodity to be tested next time by the external node;
for digital identity certificate information Ei,j+1Carrying out Hash operation to obtain a commodity verification message Qi,j+1(ii) a The base database stores and message corresponds to Ei,j+1Commodity authentication message Q ofi,j+1That is, the product authentication information set is updated to Q ═ Qi,1、Qi,2、…、Qi,j、Qi,j+1}; the goods authentication message Qi,j+1The method is used for verifying the authenticity of the next commodity; the second commodity verification message Q in the updated commodity verification information set Qi,2As the bibliographic event information, and broadcasting the first commodity verification message Q in the finite field blockchain system with closed-loop authentication systemi,1And newly generated goods authentication message Qi,j+1Not broadcasting;
and the finite field block chain system finishes the authenticity verification of the commodity, enters the next closed-loop authentication process and waits for the next commodity authenticity verification request of the external node.
2. The finite field blockchain system with closed-loop authentication system as claimed in claim 1, wherein: having digital identity certificate information E in RFID tag of any one articlei,j(ii) a Wherein i is a commodity production serial number; 1,2, …, l; j is the number of times that the RFID tag writes in the digital identity certificate information; j ═ 1,2, …, k; the digital identity certificate information is a random number;
when any commodity leaves factory for the first time, the RFID label arranged on the commodity is written in the digital identity certificate information E of the commodityi,1(ii) a The basic database of each authentication center stores a commodity verification information set Q ═ { Q ═ Qi,1I.e., j is 1.
3. The finite field blockchain system with closed loop authentication system as claimed in claim 2, wherein: the checking principle is a majority principle.
4. The finite field blockchain system with closed-loop authentication system as claimed in claim 3, wherein: update to Q ═ { Q ═ Q in the commodity authentication information seti,1、Qi,2、…、Qi,j、Qi,j+1On the premise that the authentication center receives the commodity digital identity certificate information E sent by the external nodei,k(ii) a The authentication center performs authentication on the commodity digital identity certificate information Ei,kCarrying out Hash operation to obtain a message Hi,j+1(ii) a If the message Hi,j+1And commodity authentication information Q in commodity authentication information set Qi,kMatching, and k is less than or equal to j, the commodity digital identity certificate information Ei,kHas been stolen and written into the RFID tag of a counterfeit article; the finite field blockchain system records the scanning time and the physical address of the external node.
5. The finite field blockchain system with closed-loop authentication system as claimed in claim 1, wherein: the steps of generating and storing tile data are as follows:
1) setting a block release period T of a finite field block chain system with a closed-loop authentication system and a block release mechanism;
2) in a block release period T, the authentication center node bibliographic event authentication information system carries out authentication operation on an authentication request according to an authentication rule on the basis of the basic authentication data according to external requirements; storing the corresponding generated bibliographic event authentication information in a basic database; meanwhile, generating bibliographic transaction information and uploading the bibliographic transaction information to a block chain authentication and accounting system of each authentication center node in a broadcasting manner;
3) in a block release period T, a finite field block chain system with a closed-loop authentication system selects any n central nodes as block release nodes in a random mode; the other m-n central nodes are non-block issuing nodes;
4) the block issuing node generates block data with a timestamp according to the bibliographic transaction information received in the authentication system within a period of time and broadcasts and issues the block data to the whole authentication system;
the block data comprises a block head area and a block body area; collecting the recorded transaction information broadcasted in a period of time in the block area, wherein the recorded transaction information is used as a calculation parameter and processed into root data; the root data is used as a calculation parameter and is processed into authentication data; the authentication data is recorded in a block header area;
5) the block chain authentication and accounting system of the block issuing node broadcasts the block data;
6) the block chain authentication accounting system of each central node of the finite field block chain system with the closed-loop authentication system receives the broadcasted block data;
7) the m authentication centers determine finally identified new block data according to a set check rule;
8) when a block data is verified and confirmed by the system, the block data is used as the latest block to be connected to the back of the previous block and is stored in a block chain; the system enters the next block record distribution cycle.
6. The finite field blockchain system with closed-loop authentication system as claimed in claim 1, wherein: the blockchain bibliographic accounting system at least comprises: self-checking parameters, health values and engagement;
the health value forms the following rules:
a) if the block data issued by one block issuing node is not verified as a plurality of blocks, the health value of the authentication center is reduced;
and/or b) the authentication center carries out self-checking on the data in the basic database; the health value is influenced by the self-checking result;
and/or c) if an authentication center does not issue basic bibliographic information during the tile record issuance period, the health value may decrease;
the participation degree value is formed according to the following rules:
a) if one authentication center participates in the data distribution of the block, the participation degree value is increased;
and/or b) if an authentication center refuses to participate in issuing block data, the participation degree value is reduced;
the self-checking parameters, the health values and the participation degrees continuously agree that the issuing period of each block is not reduced, and the issuing period is automatically recovered to be a normal initial value; if the self-verification parameters, health values and engagement levels are below the prescribed lower limit values, the center will be alerted or kicked out of the multi-center blockchain system.
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2017103443838 | 2017-05-16 | ||
CN201710344383 | 2017-05-16 | ||
CN201710534947 | 2017-07-04 | ||
CN2017105349474 | 2017-07-04 |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108876399A CN108876399A (en) | 2018-11-23 |
CN108876399B true CN108876399B (en) | 2022-04-29 |
Family
ID=64333909
Family Applications (12)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810462739.2A Active CN108874890B (en) | 2017-05-16 | 2018-05-15 | Block chain system with public bibliographic mechanism |
CN201810463885.7A Active CN108876365B (en) | 2017-05-16 | 2018-05-15 | Intelligent contract for generating block release mechanism |
CN201810464400.6A Active CN108876399B (en) | 2017-05-16 | 2018-05-15 | Finite field block chain system with closed-loop authentication system |
CN201810464384.0A Active CN108921692B (en) | 2017-05-16 | 2018-05-15 | Multi-chain block chain system with block issuing mechanism |
CN201810462757.0A Active CN108881165B (en) | 2017-05-16 | 2018-05-15 | Multi-center authentication system with block issuing mechanism |
CN201810462760.2A Pending CN108875386A (en) | 2017-05-16 | 2018-05-15 | A kind of multicenter finite field block catenary system framework with block issue mechanism and application demand issue mechanism |
CN201810463335.5A Active CN108881166B (en) | 2017-05-16 | 2018-05-15 | Virtual account block chain verification system with external fixed physical node |
CN202110237010.7A Pending CN113037738A (en) | 2017-05-16 | 2018-05-15 | Virtual account block chain verification system with external fixed physical node |
CN201810463897.XA Active CN108881167B (en) | 2017-05-16 | 2018-05-15 | Intelligent contract of finite field block chain system |
CN202110235074.3A Pending CN112929383A (en) | 2017-05-16 | 2018-05-15 | Multi-center authentication system with block issuing mechanism |
CN201810462740.5A Active CN108881163B (en) | 2017-05-16 | 2018-05-15 | Multi-center block chain system with block issuing mechanism |
CN201810462747.7A Active CN108876364B (en) | 2017-05-16 | 2018-05-15 | Block chain system with annihilation mechanism |
Family Applications Before (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810462739.2A Active CN108874890B (en) | 2017-05-16 | 2018-05-15 | Block chain system with public bibliographic mechanism |
CN201810463885.7A Active CN108876365B (en) | 2017-05-16 | 2018-05-15 | Intelligent contract for generating block release mechanism |
Family Applications After (9)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810464384.0A Active CN108921692B (en) | 2017-05-16 | 2018-05-15 | Multi-chain block chain system with block issuing mechanism |
CN201810462757.0A Active CN108881165B (en) | 2017-05-16 | 2018-05-15 | Multi-center authentication system with block issuing mechanism |
CN201810462760.2A Pending CN108875386A (en) | 2017-05-16 | 2018-05-15 | A kind of multicenter finite field block catenary system framework with block issue mechanism and application demand issue mechanism |
CN201810463335.5A Active CN108881166B (en) | 2017-05-16 | 2018-05-15 | Virtual account block chain verification system with external fixed physical node |
CN202110237010.7A Pending CN113037738A (en) | 2017-05-16 | 2018-05-15 | Virtual account block chain verification system with external fixed physical node |
CN201810463897.XA Active CN108881167B (en) | 2017-05-16 | 2018-05-15 | Intelligent contract of finite field block chain system |
CN202110235074.3A Pending CN112929383A (en) | 2017-05-16 | 2018-05-15 | Multi-center authentication system with block issuing mechanism |
CN201810462740.5A Active CN108881163B (en) | 2017-05-16 | 2018-05-15 | Multi-center block chain system with block issuing mechanism |
CN201810462747.7A Active CN108876364B (en) | 2017-05-16 | 2018-05-15 | Block chain system with annihilation mechanism |
Country Status (1)
Country | Link |
---|---|
CN (12) | CN108874890B (en) |
Families Citing this family (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109583896A (en) * | 2018-11-30 | 2019-04-05 | 元灵通智能科技(深圳)有限公司 | Transaction verification method, block chain node and storage medium |
CN109726201B (en) * | 2018-12-12 | 2020-05-05 | 杭州基尔区块链科技有限公司 | Chip research and development transaction data storage method and system based on intelligent contract |
CN109831483A (en) * | 2018-12-28 | 2019-05-31 | 山东康威通信技术股份有限公司 | Distributed block chain control system and method applied to the underground space |
CN109656177A (en) * | 2018-12-28 | 2019-04-19 | 成都易慧家科技有限公司 | A kind of intelligent door and window communication system |
CN109885258B (en) * | 2019-02-01 | 2023-02-21 | 立旃(上海)科技有限公司 | Data deleting device and method based on block chain |
CN110062041B (en) * | 2019-04-12 | 2023-04-07 | 深圳前海微众银行股份有限公司 | Method and device for changing IOT (input/output) equipment based on block chain |
CN111931245A (en) * | 2019-05-13 | 2020-11-13 | 阿里巴巴集团控股有限公司 | Information processing method and device |
CN110135194B (en) * | 2019-05-20 | 2020-10-30 | 北京邮电大学 | Block chain-based industrial internet digital object management method |
CN110535967B (en) * | 2019-09-06 | 2022-08-23 | 江苏物联网研究发展中心 | Vehicle transportation data judgment system |
CN110597911B (en) * | 2019-09-12 | 2021-08-17 | 腾讯科技(深圳)有限公司 | Certificate processing method and device for block chain network, electronic equipment and storage medium |
CN110780847B (en) * | 2019-10-15 | 2022-02-25 | 腾讯科技(深圳)有限公司 | Random number generation method, random number generation device and electronic equipment |
CN113162889B (en) * | 2020-01-22 | 2023-02-17 | 北京车和家信息技术有限公司 | Authentication method and device for route updating information |
CN112115116B (en) * | 2020-08-05 | 2024-04-16 | 西安电子科技大学 | Construction method of high-performance tamper-proof database based on blockchain |
CN113516487B (en) * | 2021-05-19 | 2022-10-14 | 广西科技大学 | Agricultural product traceability system based on block chain |
CN115695055B (en) * | 2023-01-05 | 2023-03-14 | 中国电子科技集团公司第三十研究所 | High-reliability high-concurrency security authentication system and method based on memory database |
CN117709947B (en) * | 2024-02-05 | 2024-04-19 | 广东通莞科技股份有限公司 | POS machine settlement authority management method based on blockchain |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2008028291A1 (en) * | 2006-09-08 | 2008-03-13 | Certicom Corp. | Authenticated radio frequency identification and key distribution system therefor |
CN105844472A (en) * | 2015-01-13 | 2016-08-10 | 四川谦泰仁投资管理有限公司 | RFID merchandise anti-counterfeiting tracing system compatible with two-dimensional code counterfeiting prevention |
CN105956923A (en) * | 2016-04-20 | 2016-09-21 | 上海如鸽投资有限公司 | Asset transaction platform and digital certification and transaction method for assets |
CN106209877A (en) * | 2016-07-19 | 2016-12-07 | 井创(北京)科技有限公司 | A kind of be certification core with block chain backstage false-proof authentication system |
CN106339880A (en) * | 2016-08-23 | 2017-01-18 | 白大文 | Product production method and system for users to trace and examine filling process easily |
Family Cites Families (47)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CA2291430A1 (en) * | 1999-01-28 | 2000-07-28 | Tao Lu | Internet transaction security system |
US8582777B2 (en) * | 2006-05-03 | 2013-11-12 | Samsung Electronics Co., Ltd. | Method and system for lightweight key distribution in a wireless network |
CN103971250B (en) * | 2014-04-09 | 2017-04-05 | 四川谦泰仁投资管理有限公司 | A kind of one time one card anti-fake traceability system based on mobile terminal and RFID |
US20160098730A1 (en) * | 2014-10-01 | 2016-04-07 | The Filing Cabinet, LLC | System and Method for Block-Chain Verification of Goods |
CN104392354B (en) * | 2014-11-05 | 2017-10-03 | 中国科学院合肥物质科学研究院 | A kind of public key address is associated and search method and its system with user account |
CN106296184A (en) * | 2015-06-05 | 2017-01-04 | 地气股份有限公司 | Electronic money management method and electronic-monetary system |
WO2017027484A1 (en) * | 2015-08-09 | 2017-02-16 | Ramasamy Celambarasan | System and method for microshare based content funding and distribution |
US10402792B2 (en) * | 2015-08-13 | 2019-09-03 | The Toronto-Dominion Bank | Systems and method for tracking enterprise events using hybrid public-private blockchain ledgers |
US10504178B2 (en) * | 2015-11-04 | 2019-12-10 | Chicago Mercantile Exchange Inc. | System for physically delivering virtual currencies |
US20170132626A1 (en) * | 2015-11-05 | 2017-05-11 | Mastercard International Incorporated | Method and system for processing of a blockchain transaction in a transaction processing network |
CN105488675B (en) * | 2015-11-25 | 2019-12-24 | 布比(北京)网络技术有限公司 | Block chain distributed shared general ledger construction method |
CN105719172A (en) * | 2016-01-19 | 2016-06-29 | 布比(北京)网络技术有限公司 | Information issuing method and device |
CN105761146B (en) * | 2016-01-24 | 2021-06-01 | 杭州复杂美科技有限公司 | Block chain matching exchange |
CN105610578B (en) * | 2016-01-25 | 2019-05-03 | 杭州复杂美科技有限公司 | Block chain information deposits card and method for secret protection |
CN105809062B (en) * | 2016-03-01 | 2019-01-25 | 布比(北京)网络技术有限公司 | A kind of building of contract executes method and device |
CN105893042A (en) * | 2016-03-31 | 2016-08-24 | 北京航空航天大学 | Intelligent contract implementation method based on block chain |
CN105912618B (en) * | 2016-04-07 | 2019-04-23 | 浙江万马新能源有限公司 | The charging pile charging transaction means of communication and device based on block chain |
KR101701131B1 (en) * | 2016-04-28 | 2017-02-13 | 주식회사 라피 | Data recording and validation methods and systems using the connecting of blockchain between different type |
CN105976231A (en) * | 2016-06-24 | 2016-09-28 | 深圳前海微众银行股份有限公司 | Asset management method based on intelligent block chain contracts and nodes |
CN106339939B (en) * | 2016-08-26 | 2020-05-15 | 南京喜玛拉云信息技术有限公司 | Non-tamper-able distributed bill system based on secure hardware and transaction processing method |
CN106385315B (en) * | 2016-08-30 | 2019-05-17 | 北京三未信安科技发展有限公司 | A kind of digital certificate management method and system |
CN106384236B (en) * | 2016-08-31 | 2019-07-16 | 江苏通付盾科技有限公司 | Based on the ca authentication management method of block chain, apparatus and system |
CN106375317A (en) * | 2016-08-31 | 2017-02-01 | 北京明朝万达科技股份有限公司 | Block chain-based big data security authentication method and system |
CN106503574B (en) * | 2016-09-13 | 2019-11-05 | 中国电子科技集团公司第三十二研究所 | Block chain safe storage method |
CN106372533B (en) * | 2016-09-14 | 2020-04-21 | 中国银联股份有限公司 | Content storage method based on block chain technology |
US10157295B2 (en) * | 2016-10-07 | 2018-12-18 | Acronis International Gmbh | System and method for file authenticity certification using blockchain network |
CN106548091A (en) * | 2016-10-14 | 2017-03-29 | 北京爱接力科技发展有限公司 | A kind of data deposit card, the method and device of checking |
CN106534097B (en) * | 2016-10-27 | 2018-05-18 | 上海亿账通区块链科技有限公司 | Permission method of control and system based on the transaction of block chain |
CN106504091B (en) * | 2016-10-27 | 2018-06-29 | 深圳壹账通智能科技有限公司 | The method and device merchandised on block chain |
CN106570710A (en) * | 2016-10-27 | 2017-04-19 | 纸飞机(北京)科技有限公司 | Commodity anti-counterfeiting method and device |
CN106528775B (en) * | 2016-10-28 | 2020-01-03 | 济南大学 | Private block chain operation support system supporting logic multi-chain and working method thereof |
CN106447309A (en) * | 2016-11-13 | 2017-02-22 | 杭州复杂美科技有限公司 | Across-chain transaction of source chain and lateral chain |
CN106453636A (en) * | 2016-11-22 | 2017-02-22 | 深圳银链科技有限公司 | Credible block generation method and system |
CN106559211B (en) * | 2016-11-22 | 2019-12-13 | 中国电子科技集团公司第三十研究所 | Privacy protection intelligent contract method in block chain |
CN106453407B (en) * | 2016-11-23 | 2019-10-15 | 江苏通付盾科技有限公司 | Identity identifying method, certificate server and user terminal based on block chain |
CN106651303B (en) * | 2016-12-02 | 2020-05-26 | 北京轻信科技有限公司 | Intelligent contract processing method and system based on template |
CN106534160B (en) * | 2016-12-02 | 2020-02-21 | 江苏通付盾科技有限公司 | Identity authentication method and system based on block chain |
CN106600252A (en) * | 2016-12-15 | 2017-04-26 | 咪咕文化科技有限公司 | Payment method and payment system based on block chain |
CN106530088B (en) * | 2016-12-19 | 2023-11-17 | 杜伯仁 | Method for trading certificate products based on blockchain security nodes |
CN106656509B (en) * | 2016-12-29 | 2019-11-29 | 深圳市检验检疫科学研究院 | A kind of RFID alliance chain collaboration authentication method for the monitoring of defeated port food |
CN106651332B (en) * | 2016-12-29 | 2020-11-06 | 成都质数斯达克科技有限公司 | Method for generating new block in block chain and block chain |
CN106656798B (en) * | 2016-12-30 | 2020-03-27 | 质数链网科技成都有限公司 | Method for calculating decision path and distributed node |
CN107122477A (en) * | 2017-05-02 | 2017-09-01 | 成都中远信电子科技有限公司 | A kind of block chain storage system |
CN107273760A (en) * | 2017-06-09 | 2017-10-20 | 济南浪潮高新科技投资发展有限公司 | One kind is based on many CA application authentication methods of block chain |
CN107358438A (en) * | 2017-06-27 | 2017-11-17 | 上海霸贤网络科技有限公司 | Supply chain dynamic multicenter collaboration authentication model and its implementation based on block chain |
CN107249009B (en) * | 2017-08-02 | 2020-02-21 | 广东工业大学 | Data verification method and system based on block chain |
CN107995197A (en) * | 2017-12-04 | 2018-05-04 | 中国电子科技集团公司第三十研究所 | A kind of method for realizing across management domain identity and authority information is shared |
-
2018
- 2018-05-15 CN CN201810462739.2A patent/CN108874890B/en active Active
- 2018-05-15 CN CN201810463885.7A patent/CN108876365B/en active Active
- 2018-05-15 CN CN201810464400.6A patent/CN108876399B/en active Active
- 2018-05-15 CN CN201810464384.0A patent/CN108921692B/en active Active
- 2018-05-15 CN CN201810462757.0A patent/CN108881165B/en active Active
- 2018-05-15 CN CN201810462760.2A patent/CN108875386A/en active Pending
- 2018-05-15 CN CN201810463335.5A patent/CN108881166B/en active Active
- 2018-05-15 CN CN202110237010.7A patent/CN113037738A/en active Pending
- 2018-05-15 CN CN201810463897.XA patent/CN108881167B/en active Active
- 2018-05-15 CN CN202110235074.3A patent/CN112929383A/en active Pending
- 2018-05-15 CN CN201810462740.5A patent/CN108881163B/en active Active
- 2018-05-15 CN CN201810462747.7A patent/CN108876364B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2008028291A1 (en) * | 2006-09-08 | 2008-03-13 | Certicom Corp. | Authenticated radio frequency identification and key distribution system therefor |
CN105844472A (en) * | 2015-01-13 | 2016-08-10 | 四川谦泰仁投资管理有限公司 | RFID merchandise anti-counterfeiting tracing system compatible with two-dimensional code counterfeiting prevention |
CN105956923A (en) * | 2016-04-20 | 2016-09-21 | 上海如鸽投资有限公司 | Asset transaction platform and digital certification and transaction method for assets |
CN106209877A (en) * | 2016-07-19 | 2016-12-07 | 井创(北京)科技有限公司 | A kind of be certification core with block chain backstage false-proof authentication system |
CN106339880A (en) * | 2016-08-23 | 2017-01-18 | 白大文 | Product production method and system for users to trace and examine filling process easily |
Non-Patent Citations (4)
Title |
---|
"An agri-food supply chain traceability system for China based on RFID & blockchain technology";Feng Tian;《 2016 13th International Conference on Service Systems and Service Management (ICSSSM)》;20160811;全文 * |
"CUIAS - A User Identity Authentication Service for Discovery Service";Peng Liu等;《2014 IEEE International Conference on Internet of Things (iThings), and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom)》;20150316;全文 * |
"RFID tag data processing in manufacturing for track-and-trace anti-counterfeiting";S.H.Choi等;《Computers in Industry》;20150430;全文 * |
"VeChain 发布全球首款基于区块链技术的NFC 防伪芯片";无;《金卡工程》;20160531;全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN108881167B (en) | 2021-06-22 |
CN108921692A (en) | 2018-11-30 |
CN108874890A (en) | 2018-11-23 |
CN108876364A (en) | 2018-11-23 |
CN108881166B (en) | 2021-03-26 |
CN108881165B (en) | 2021-03-26 |
CN108881165A (en) | 2018-11-23 |
CN108921692B (en) | 2022-01-18 |
CN108881163A (en) | 2018-11-23 |
CN112929383A (en) | 2021-06-08 |
CN108875386A (en) | 2018-11-23 |
CN108876365A (en) | 2018-11-23 |
CN108876364B (en) | 2021-11-09 |
CN108874890B (en) | 2020-10-23 |
CN108881166A (en) | 2018-11-23 |
CN108876365B (en) | 2023-08-29 |
CN113037738A (en) | 2021-06-25 |
CN108881163B (en) | 2021-05-14 |
CN108881167A (en) | 2018-11-23 |
CN108876399A (en) | 2018-11-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108876399B (en) | Finite field block chain system with closed-loop authentication system | |
CN102609846B (en) | Anti-false verification method and system based on communication network | |
US10880080B1 (en) | Cryptographic key generation from biometric data | |
US9648496B2 (en) | Authentication of web content | |
CN110458560A (en) | For carrying out the method and device of transaction verification | |
CN110570308A (en) | block chain-based electronic warehouse receipt transaction system with incentive mechanism | |
CN109327312A (en) | Authentication method and device, electronic equipment | |
CN112801778B (en) | Alliance type bad asset block chain system | |
CN109615402A (en) | Product quality back-tracing anti-fake system based on block chain technology | |
WO2015154482A1 (en) | One-time certificate anti-counterfeiting tracing system based on mobile terminal and rfid | |
US20230100422A1 (en) | Systems and Methods for Transaction Management in NFT-Directed Environments | |
CN110933088A (en) | Decentralization verifiable hiding representing method and system based on block chain and storage medium | |
CN116527684B (en) | Multi-chain information interaction method based on 1+1+N relay consensus committee | |
CN110689343A (en) | Transaction verification method and device based on directed acyclic graph | |
CN110598459B (en) | Block chain-based data storage card management method and device | |
CN107483427A (en) | A kind of self-reinforcing type anti-counterfeiting technology based on Ntag21X family chips | |
US10061981B2 (en) | Security improvements for tickets | |
CN110011805A (en) | Two-way authentication anti-counterfeiting system and method based on low-power consumption bluetooth system | |
WO2023015312A1 (en) | Methods for securely adding data to a blockchain using dynamic time quanta and version authentication | |
Hoffman et al. | Securing number plates based on digital signatures and RFID | |
CN110598043A (en) | Video processing method and device, computer equipment and storage medium | |
JP7367270B1 (en) | Appraisal certification system and appraisal certification method | |
JP7371301B2 (en) | Product authentication system and method | |
KR102472427B1 (en) | Artificial intelligence-based counterfeit screening inspection and digital certificate issuance method, device and program | |
CN110648143A (en) | Closed-loop anti-counterfeiting verification system based on Merkle trusted tree |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |