CN111540111A - Personnel information verification method and system based on block chain - Google Patents

Personnel information verification method and system based on block chain Download PDF

Info

Publication number
CN111540111A
CN111540111A CN202010317484.8A CN202010317484A CN111540111A CN 111540111 A CN111540111 A CN 111540111A CN 202010317484 A CN202010317484 A CN 202010317484A CN 111540111 A CN111540111 A CN 111540111A
Authority
CN
China
Prior art keywords
personal information
instruction
verification
gate
intelligent
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010317484.8A
Other languages
Chinese (zh)
Inventor
刘涛
于中阳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Wangchain Information Technology Co ltd
Original Assignee
Shanghai Wangchain Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Wangchain Information Technology Co ltd filed Critical Shanghai Wangchain Information Technology Co ltd
Priority to CN202010317484.8A priority Critical patent/CN111540111A/en
Publication of CN111540111A publication Critical patent/CN111540111A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/38Individual registration on entry or exit not involving the use of a pass with central registration
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/32Individual registration on entry or exit not involving the use of a pass in combination with an identity check
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1095Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Theoretical Computer Science (AREA)
  • Bioethics (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses a personnel information verification method and a system based on a block chain, wherein the method comprises the following steps: the user terminal receives personal information, a verification request and a chain-up operation request input by an access level person, executes chain-up operation and sends the personal information and the verification request to an intelligent verification node in a block chain; the intelligent verification node receives the verification request, verifies the personal information, verifies whether the personal information is legal or not, sends a starting instruction to the checkpoint controller if the personal information is legal, and sends the personal information and a release instruction to the verifier terminal; if not, sending a closing instruction to the checkpoint controller, and sending personal information and an isolation instruction to the verifier terminal; when the gate card controller receives an opening instruction, the gate card gate is opened, and when the gate card controller receives a closing instruction, the gate card gate is kept closed. The method can guarantee the authenticity of the personal information, prevent the personal information from being tampered, realize automatic verification and improve the working efficiency.

Description

Personnel information verification method and system based on block chain
Technical Field
The invention relates to the technical field of block chains, in particular to a personnel information verification method and a personnel information verification system based on a block chain.
Background
At present, some patients meet the discharge requirements, need to receive guidance suggestions of doctors for home treatment, are communicated with hospitals, have urban treatment challenges besides medical systems, have many improvements in the urban treatment, and need to be fused more deeply for technologies such as big data and block chains. The reality of the information data is guaranteed by realizing the sharing of the information data in the intelligent mode, and the technologies such as the block chain technology internet of things and cloud computing are integrated into social governance, so that the social governance of a new era is served. There is a great challenge to reasonably and effectively control the flow of a patient and track the patient's stroke, and there is room for improvement.
At the present verification of the entry and exit personnel, cases of trying to make fake by a plurality of people, covering the real information of the individual and the like appear, the personal information is tampered, and the personal authenticity is low. In addition, the personnel investment is large, the information verifier is basically verified manually, the risk that the information verifier is infected is greatly improved, and in the actual verification progress, due to the fact that manual verification is adopted, related forms are filled manually, the verification progress is slow, and therefore the working efficiency is low.
Therefore, how to guarantee the authenticity of the personal information, prevent the personal information from being tampered, realize automatic verification, and improve the working efficiency is an urgent problem to be solved.
Disclosure of Invention
The invention aims to provide a personnel information verification method and a personnel information verification system based on a block chain, so as to ensure the authenticity of personal information, prevent personal information from being falsified, realize automatic verification and improve the working efficiency.
In order to solve the technical problem, the invention provides a personnel information verification method based on a block chain, which comprises the following steps:
the user terminal receives personal information, a verification request and a chain-up operation request input by an access level person, executes chain-up operation and sends the personal information and the verification request to an intelligent verification node in a block chain;
the intelligent verification node receives the verification request, verifies the personal information, verifies whether the personal information is legal or not, sends a starting instruction to the checkpoint controller if the personal information is legal, and sends the personal information and a release instruction to the verifier terminal; if not, sending a closing instruction to the checkpoint controller, and sending personal information and an isolation instruction to the verifier terminal;
when the gate card controller receives an opening instruction, the gate card gate is opened, and when the gate card controller receives a closing instruction, the gate card gate is kept closed.
Preferably, the method further comprises:
and the inspector terminal receives the release instruction or the isolation instruction and displays the release instruction or the isolation instruction.
Preferably, the method further comprises:
the intelligent verification node synchronizes the personal information broadcast to other intelligent verification nodes in the blockchain.
Preferably, before the intelligent verification node receives the verification request, the method further includes:
the intelligent verification node receives the personal information and stores the personal information.
The invention also provides a personnel information verification system based on the block chain, which is used for realizing the method and comprises the following steps:
the user terminal is used for receiving personal information, a verification request and a chain-up operation request input by the access checkpoint personnel, executing chain-up operation and sending the personal information and the verification request to the intelligent verification node in the block chain;
the intelligent verification node is used for receiving the verification request, verifying the personal information, verifying whether the personal information is legal or not, if so, sending a starting instruction to the checkpoint controller, and sending the personal information and a release instruction to the verifier terminal; if not, sending a closing instruction to the checkpoint controller, and sending personal information and an isolation instruction to the verifier terminal;
and the gate controller is used for opening the gate when receiving the opening instruction, and keeping the gate closed when the gate controller receives the closing instruction.
Preferably, the system further comprises:
and the inspector terminal is used for receiving the release instruction or the isolation instruction and displaying the release instruction or the isolation instruction.
Preferably, the intelligent verification node further comprises:
and the broadcasting module is used for synchronizing the personal information broadcast to other intelligent verification nodes in the block chain.
Preferably, the intelligent verification node further comprises:
and the storage module is used for receiving the personal information and storing the personal information.
The invention provides a personnel information verification method and a system based on a block chain.A user terminal receives personal information, a verification request and a chain-up operation request input by access level personnel, executes chain-up operation and sends the personal information and the verification request to an intelligent verification node in the block chain; the intelligent verification node receives the verification request, verifies the personal information, verifies whether the personal information is legal or not, sends a starting instruction to the checkpoint controller if the personal information is legal, and sends the personal information and a release instruction to the verifier terminal; if not, sending a closing instruction to the checkpoint controller, and sending personal information and an isolation instruction to the verifier terminal; when the gate card controller receives an opening instruction, the gate card gate is opened, and when the gate card controller receives a closing instruction, the gate card gate is kept closed. Therefore, the personal information is uploaded to the block chain, the uplink ensures the authenticity and the non-tampering property of the personal information data, and the whole verification process does not need manual verification but automatic verification, so that the authenticity of the personal information is ensured, the personal information is prevented from being tampered, the automatic verification is realized, and the working efficiency is improved.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the provided drawings without creative efforts.
Fig. 1 is a flowchart of a personnel information verification method based on a block chain according to the present invention;
FIG. 2 is a flow chart of the implementation steps of the human information verification;
FIG. 3 is a schematic diagram illustrating interaction among an entry-exit applicant, a verifier and an intelligent verification node according to the present invention;
FIG. 4 is a schematic structural diagram of a block chain-based personnel information verification system according to the present invention;
FIG. 5 is a diagram of information uplink according to the present invention.
Detailed Description
The core of the invention is to provide a personnel information verification method and a system based on a block chain, so as to ensure the authenticity of personal information, prevent personal information from being falsified, realize automatic verification and improve the working efficiency.
In order to make the technical solutions of the present invention better understood, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1, fig. 1 is a flowchart of a block chain-based personnel information verification method according to the present invention, which includes the following steps:
s11: the user terminal receives personal information, a verification request and a chain-up operation request input by an access level person, executes chain-up operation and sends the personal information and the verification request to an intelligent verification node in a block chain;
s12: the intelligent verification node receives the verification request, verifies the personal information, verifies whether the personal information is legal or not, sends a starting instruction to the checkpoint controller if the personal information is legal, and sends the personal information and a release instruction to the verifier terminal; if not, sending a closing instruction to the checkpoint controller, and sending personal information and an isolation instruction to the verifier terminal;
s13: when the gate card controller receives an opening instruction, the gate card gate is opened, and when the gate card controller receives a closing instruction, the gate card gate is kept closed.
Therefore, in the method, the personal information is uploaded to the block chain, the uplink ensures the authenticity and the non-tampering property of the personal information data, and the whole verification process does not need manual verification but automatic verification, so that the authenticity of the personal information is ensured, the personal information is prevented from being tampered, the automatic verification is realized, and the working efficiency is improved.
The entrance and exit gate in the method comprises an entrance and exit gate, an expressway gate, an airport gate, a railway station gate or a community entrance and exit gate. Access level personnel refers to personnel who need to go out of or into a level, such as people going out of or into a cell. The user terminal includes a mobile terminal, such as a mobile phone.
Based on the above method, further, the method further comprises the following steps:
s21: and the inspector terminal receives the release instruction or the isolation instruction and displays the release instruction or the isolation instruction.
Further, the method comprises the following steps:
s31: the intelligent verification node synchronizes the personal information broadcast to other intelligent verification nodes in the blockchain.
Further, in step S12, before the intelligent verification node receives the verification request, the method further includes the following steps:
s41: the intelligent verification node receives the personal information and stores the personal information.
Referring to fig. 2, fig. 2 is a flowchart illustrating steps of checking the personal information. Based on the method, the implementation steps are as follows:
the method comprises the following steps: applying for the entry-exit person to complete the personal information filling and signature confirmation during entry-exit;
step two: selecting and uploading the personal information confirmed to be signed to a block chain, and sending a verification request;
step three: the information data module receives the verification request, and acquires and verifies the uploaded personal information applying for verification;
step four: the intelligent check node makes a relevant reaction, if the information of the entry-exit person is verified to be authentic and legal, the automatic release operation is executed and the entry-exit person checks the information synchronously;
step five: if the information of the entry-exit person is verified as authentic and illegal, automatically closing the gate and synchronizing to the entry-exit checker;
step six: the entry and exit checker automatically releases legal personnel uploaded by the intelligent check node, and for illegal personnel, the entry and exit checker executes specific isolation operation;
step seven: the intelligent verification node broadcasts the information of illegal personnel to other intelligent verification nodes at the entry and exit positions, so that the information is unified and shared;
step eight: the information authority of the legal passer is closed after the legal passer passes the verification and is automatically released after the verification, and the legal passer can be checked only by re-authorization, so that the personal information safety and privacy protection are ensured.
At the checkpoint building information acquisition and verification place, each entry and exit person uploads the personal information and confirms the signature. This process information is all uploaded to the blockchain. The personal information comprises a real name, an identity card, a walking track, personal health conditions and the like, the information filling can be completed on personal terminal equipment such as a mobile phone, and then the information is selected to be uploaded to a block chain after the personal signature is confirmed. The authority for the personal information is only opened to public officers, namely, the uploaded personal information can be only checked by the public officers in the entry and exit management department, and other social personnel do not check the personal information in an open mode. Therefore, the personal information security and privacy infringement are guaranteed to the maximum extent, and the risk of tampering the personal information by lawbreakers is reduced. Referring to fig. 3, fig. 3 is a schematic view of interaction among an entry and exit applicant, an inspector, and an intelligent inspection node in the present invention, where the entry and exit applicant is a person who wants to enter and exit, the entry and exit applicant uploads personal information including a real name, an identity card, a walking track, personal health conditions, etc., and the entry and exit inspector calls the intelligent inspection node to receive an application for verification, inspects the personal information of the entry and exit and makes a relevant response, if the entry and exit applicant passes the legal passer, and if the entry and exit passer does not pass the legal passer, the isolation operation is performed.
Referring to fig. 4, fig. 4 is a schematic structural diagram of a block chain-based personnel information verification system for implementing the above method, the system including:
the user terminal 101 is configured to receive personal information, a verification request and a cochain operation request input by an access level person, execute cochain operation, and send the personal information and the verification request to an intelligent verification node in a block chain;
the intelligent verification node 102 is used for receiving the verification request, verifying the personal information, verifying whether the personal information is legal or not, if so, sending a starting instruction to the checkpoint controller, and sending the personal information and a release instruction to the verifier terminal; if not, sending a closing instruction to the checkpoint controller, and sending personal information and an isolation instruction to the verifier terminal;
and the gate controller 103 is used for opening the gate when receiving the opening instruction, and keeping the gate closed when receiving the closing instruction.
Therefore, in the system, the personal information is uploaded to the block chain, the cochain ensures the authenticity and the non-tampering property of the personal information data, and the whole verification process does not need manual verification but automatic verification, so that the authenticity of the personal information is ensured, the personal information is prevented from being tampered, the automatic verification is realized, and the working efficiency is improved.
The intelligent verification node comprises an information data module and an intelligent contract module, provides personal information communication acquisition service for the entry and exit application person, is specifically completed by the information data module, and acquires, verifies and chains the personal information. The intelligent verification node performs statistics, acquisition and verification on verified personal information, automatically releases legal entry and exit persons, synchronously verifies and checks by a verifier, releases illegal entry and exit persons, and makes a decision to be delivered to the verifier to specifically execute isolation operation.
All original data of the personal information are collected by the information data module and stored, shared and audited on the intelligent check node. Due to the fact that the uplink operation is carried out, the information of the illegal entry-exit persons can be broadcasted and synchronized to the intelligent verification nodes of other entry-exit places, and information unification and sharing are achieved. After the information in the information data module is personally signed, confirmed and authorized, the information is only opened to the entry and exit public staff, other staff do not have the right to check the information, and the personal information safety is guaranteed to the maximum extent, namely the information is only used as entry and exit verification and is not used for other purposes. The deposited blocks each contain a cryptographic hash for tracking and verification.
The intelligent contract module is used for storing intelligent contracts, realizing specific services, realizing specific information acquisition and verification in a script mode and realizing automatic execution of the experiment entry and exit. The intelligent contract is encrypted through an encryption algorithm, authenticity and integrity of data are guaranteed, and information can be prevented from being tampered while information acquisition and verification are carried out. The intelligent contract automatically executes the exit-entry passing and releasing strategy, automatically releases the information of legal exits and entrances after the chain check is finished, closes the gate for the information of illegal exits and entrances, and decides to give the exit-entry checker to specifically execute the isolation operation. The uplink ensures authenticity, non-tampering and traceability of personal information data. The intelligent contract closes the information authority after the automatic releasing operation is carried out on the information of the legal entry-exit person, and the personal information can be checked only after the personal information is authorized again, so that the safety and privacy protection of the personal information are guaranteed to the maximum extent. Referring to fig. 5, fig. 5 is a schematic diagram of information uplink according to the present invention.
Based on the above system, further, the system further includes:
and the inspector terminal is used for receiving the release instruction or the isolation instruction and displaying the release instruction or the isolation instruction.
Further, the intelligent verification node further comprises:
and the broadcasting module is used for synchronizing the personal information broadcast to other intelligent verification nodes in the block chain.
Further, the intelligent verification node further comprises:
the storage module is used for receiving the personal information and storing the personal information;
aiming at the problems of counterfeiting and hiding personal real information in entry and exit, the system introduces a block chain technology, and the authenticity of the personal information is ensured by using the anti-tampering characteristic in the block chain technology, so as to prevent the personal information from being tampered. Aiming at the infected risk and the verification progress of a verifier in the manual verification, the system realizes the automatic verification.
The embodiments are described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same or similar parts among the embodiments are referred to each other. For the system disclosed by the embodiment, the description is relatively simple because the system corresponds to the method disclosed by the embodiment, and the relevant points can be referred to the method part for description.
Those of skill would further appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, computer software, or combinations of both, and that the various illustrative components and steps have been described above generally in terms of their functionality in order to clearly illustrate this interchangeability of hardware and software. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
The steps of a method or algorithm described in connection with the embodiments disclosed herein may be embodied directly in hardware, in a software module executed by a processor, or in a combination of the two. A software module may reside in Random Access Memory (RAM), memory, Read Only Memory (ROM), electrically programmable ROM, electrically erasable programmable ROM, registers, hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art.
The above detailed description is provided for the personnel information verification method and system based on the block chain. The principles and embodiments of the present invention are explained herein using specific examples, which are presented only to assist in understanding the method and its core concepts. It should be noted that, for those skilled in the art, it is possible to make various improvements and modifications to the present invention without departing from the principle of the present invention, and those improvements and modifications also fall within the scope of the claims of the present invention.

Claims (8)

1. A personnel information verification method based on a block chain is characterized by comprising the following steps:
the user terminal receives personal information, a verification request and a chain-up operation request input by an access level person, executes chain-up operation and sends the personal information and the verification request to an intelligent verification node in a block chain;
the intelligent verification node receives the verification request, verifies the personal information, verifies whether the personal information is legal or not, sends a starting instruction to the checkpoint controller if the personal information is legal, and sends the personal information and a release instruction to the verifier terminal; if not, sending a closing instruction to the checkpoint controller, and sending personal information and an isolation instruction to the verifier terminal;
when the gate card controller receives an opening instruction, the gate card gate is opened, and when the gate card controller receives a closing instruction, the gate card gate is kept closed.
2. The method of claim 1, further comprising:
and the inspector terminal receives the release instruction or the isolation instruction and displays the release instruction or the isolation instruction.
3. The method of claim 1, further comprising:
the intelligent verification node synchronizes the personal information broadcast to other intelligent verification nodes in the blockchain.
4. The method of claim 1, wherein prior to the intelligent verification node receiving the verification request, further comprising:
the intelligent verification node receives the personal information and stores the personal information.
5. A block chain based personnel information verification system for implementing the method of any one of claims 1 to 4, comprising:
the user terminal is used for receiving personal information, a verification request and a chain-up operation request input by the access checkpoint personnel, executing chain-up operation and sending the personal information and the verification request to the intelligent verification node in the block chain;
the intelligent verification node is used for receiving the verification request, verifying the personal information, verifying whether the personal information is legal or not, if so, sending a starting instruction to the checkpoint controller, and sending the personal information and a release instruction to the verifier terminal; if not, sending a closing instruction to the checkpoint controller, and sending personal information and an isolation instruction to the verifier terminal;
and the gate controller is used for opening the gate when receiving the opening instruction, and keeping the gate closed when the gate controller receives the closing instruction.
6. The system of claim 5, wherein the system further comprises:
and the inspector terminal is used for receiving the release instruction or the isolation instruction and displaying the release instruction or the isolation instruction.
7. The system of claim 5, wherein the intelligent verification node further comprises:
and the broadcasting module is used for synchronizing the personal information broadcast to other intelligent verification nodes in the block chain.
8. The system of claim 5, wherein the intelligent verification node further comprises:
and the storage module is used for receiving the personal information and storing the personal information.
CN202010317484.8A 2020-04-21 2020-04-21 Personnel information verification method and system based on block chain Pending CN111540111A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010317484.8A CN111540111A (en) 2020-04-21 2020-04-21 Personnel information verification method and system based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010317484.8A CN111540111A (en) 2020-04-21 2020-04-21 Personnel information verification method and system based on block chain

Publications (1)

Publication Number Publication Date
CN111540111A true CN111540111A (en) 2020-08-14

Family

ID=71977011

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010317484.8A Pending CN111540111A (en) 2020-04-21 2020-04-21 Personnel information verification method and system based on block chain

Country Status (1)

Country Link
CN (1) CN111540111A (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106533696A (en) * 2016-11-18 2017-03-22 江苏通付盾科技有限公司 Block chain-based identity authentication methods, authentication server and user terminal
CN107016759A (en) * 2017-04-11 2017-08-04 合肥龙图腾信息技术有限公司 A kind of intelligent gate system and control method
CN109285256A (en) * 2018-10-31 2019-01-29 国网黑龙江省电力有限公司信息通信公司 Computer room based on block chain authentication enter permission give method
CN109767534A (en) * 2019-01-17 2019-05-17 平安科技(深圳)有限公司 Gate inhibition's access method, system, management terminal and door control terminal based on block chain
CN109993490A (en) * 2017-12-29 2019-07-09 中思博安科技(北京)有限公司 A kind of declaration system and declaration method
CN110414984A (en) * 2019-08-06 2019-11-05 广东飞企互联科技股份有限公司 Auth method and Related product based on block chain
CN110753016A (en) * 2018-07-23 2020-02-04 国网辽宁招标有限公司 Real name authentication method based on block chain
KR102096746B1 (en) * 2019-09-03 2020-04-03 주식회사 스마트엠투엠 System and method for gate management for harbor security based on blockchain
CN110995670A (en) * 2019-11-20 2020-04-10 深圳市雄帝科技股份有限公司 Block chain-based digital identity information management method and system

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106533696A (en) * 2016-11-18 2017-03-22 江苏通付盾科技有限公司 Block chain-based identity authentication methods, authentication server and user terminal
CN107016759A (en) * 2017-04-11 2017-08-04 合肥龙图腾信息技术有限公司 A kind of intelligent gate system and control method
CN109993490A (en) * 2017-12-29 2019-07-09 中思博安科技(北京)有限公司 A kind of declaration system and declaration method
CN110753016A (en) * 2018-07-23 2020-02-04 国网辽宁招标有限公司 Real name authentication method based on block chain
CN109285256A (en) * 2018-10-31 2019-01-29 国网黑龙江省电力有限公司信息通信公司 Computer room based on block chain authentication enter permission give method
CN109767534A (en) * 2019-01-17 2019-05-17 平安科技(深圳)有限公司 Gate inhibition's access method, system, management terminal and door control terminal based on block chain
CN110414984A (en) * 2019-08-06 2019-11-05 广东飞企互联科技股份有限公司 Auth method and Related product based on block chain
KR102096746B1 (en) * 2019-09-03 2020-04-03 주식회사 스마트엠투엠 System and method for gate management for harbor security based on blockchain
CN110995670A (en) * 2019-11-20 2020-04-10 深圳市雄帝科技股份有限公司 Block chain-based digital identity information management method and system

Similar Documents

Publication Publication Date Title
Lavenex Safe third countries: extending the EU asylum and immigration policies to Central and Eastern Europe
CN105205370B (en) Mobile terminal safety means of defence and mobile terminal, security system and methods for using them
CN108446992A (en) A kind of net connection accurate Accident Handling Method of automobile based on block chain
Houborg et al. Drug consumption rooms and the role of politics and governance in policy processes
CN108985818A (en) Advertisement delivery system and method based on block chain technology
CN103442354B (en) A kind of movable police terminal security managing and control system
CN110287167A (en) A kind of testament management system and method based on block chain technology
CN108876369A (en) Data communications method, device and computer readable storage medium based on block chain
CN105488367B (en) A kind of guard method, backstage and the system of SAM device
CN104639624A (en) Method and device for realizing remotely controlling entrance guard through mobile terminal
CN109753817A (en) Medical information secure storage scheme based on block chain
CN108022338A (en) The control method of access control system and access control system
CN108898495A (en) A kind of finance and money management confirmation of responsibility method based on block chain
CN105554018B (en) Genuine cyber identification verification method
CN103793639B (en) A kind of method and device of Real time identification transmission data
CN110309672A (en) A kind of controlled data management method of the secret protection based on block chain
CN107195056A (en) The gate control system and guard method of major hazard installations complex
CN109088857A (en) A kind of distributed authorization management method under scenes of internet of things
CN111353925A (en) Block chain-based fraud prevention system and method
CN114022838A (en) Wisdom people management system based on wisdom thing allies oneself with
CN114357490A (en) Data sharing method, device and system based on block chain
CN111540111A (en) Personnel information verification method and system based on block chain
CN112699418A (en) Floating population management method and system based on block chain
CN108206832A (en) Access control system and management method
CN110992219A (en) Intellectual property protection method and system based on block chain technology

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20200814