CN106779975A - The tamper resistant method of the reputation information based on block chain - Google Patents

The tamper resistant method of the reputation information based on block chain Download PDF

Info

Publication number
CN106779975A
CN106779975A CN201710020031.7A CN201710020031A CN106779975A CN 106779975 A CN106779975 A CN 106779975A CN 201710020031 A CN201710020031 A CN 201710020031A CN 106779975 A CN106779975 A CN 106779975A
Authority
CN
China
Prior art keywords
block
prestige
head
chain
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710020031.7A
Other languages
Chinese (zh)
Other versions
CN106779975B (en
Inventor
李磊
张芳
李培培
吴信东
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hefei University of Technology
Original Assignee
Hefei University of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hefei University of Technology filed Critical Hefei University of Technology
Priority to CN201710020031.7A priority Critical patent/CN106779975B/en
Publication of CN106779975A publication Critical patent/CN106779975A/en
Application granted granted Critical
Publication of CN106779975B publication Critical patent/CN106779975B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0601Electronic shopping [e-shopping]
    • G06Q30/0609Buyer or seller confidence or verification
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]

Landscapes

  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Engineering & Computer Science (AREA)
  • Strategic Management (AREA)
  • Marketing (AREA)
  • Economics (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Development Economics (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of tamper resistant method of the reputation information based on block chain, it is characterized in that carrying out as follows:The 1 prestige block chain for setting up storage reputation information;When transaction system is concluded the business, block is provided to transaction system by user, transaction system calculates its credit value.This Transaction Information is returned to prestige block chain, the new block of prestige block chain building by transaction system after completing transaction.2 when building new block, checks in this prestige block chain with the presence or absence of bifurcated and removes bifurcated that may be present in prestige block chain.The present invention can really record the reputation information of businessman, and this reputation information can not be changed.So as to invisible credit worthiness effectively is switched into tangible not modifiable credit value so that the prestige of businessman is more true, reliable.

Description

The tamper resistant method of the reputation information based on block chain
Technical field
The present invention relates to block chain technical field, the anti-tamper side of specifically a kind of reputation information based on block chain Method.
Background technology
Internet is a milestone for greatness in development of human history, is greatly promoted progress and the hair of human society Exhibition.With continuing to develop for network, increasing user is done shopping and moneytary operations by network.Due to network in itself Characteristic, the reputation information of businessman is easily tampered without being discovered.User is typically only capable to passively select phase when service is received Believe the prestige of the seller.Business reputation is a kind of intangible asset of enterprise, with its value.I.e. business reputation refers to that operator is led to Cross fair competition and the acquired good social synthesis of honest operation evaluate.The goodwill height of one enterprise is not only directly affected The buying behavior of customer in certain area, and process effects can be caused." spreading from mouth to mouth ", publicizes widely, to certain model The population effect produced by consumer or user in enclosing, is any advertisement sales promotion function to be replaced.Record businessman Reputation information and can not change, invisible credit worthiness be switched into tangible not modifiable credit value, advantageously in enterprise Competition, advantageously believe businessman in allow user's active, evade reputational risk.
Now by taking Taobao as an example.It is divided into red heart in Taobao's shop grade, diamond, Lan Guan, Jin Guan, each shop etc. Level is all corresponding with seller's merchandising quantity, often sells a dotey and is just evaluated accordingly according to consumer, and seller often obtains One favorable comment shop prestige just rises a point.People psychologically can believe that prestige shop high is their First Choosing.But there is the phenomenon of brush prestige.By return it is existing, threaten buyer, employ people to brush the various ways such as single to carry out brush prestige.Some Offender even invades express company's computer information system, changes express delivery data message, and being that the manufacture of certain net purchase website is false hands over Easily record carrys out " brush is bored " lifting degrees of comparison.Although invisible credit worthiness is switched into tangible credit value, this credit value It is modifiable, it is possible to there is deceptive information.
At present, only some shopping websites have degrees of comparison, and most enterprises can not see its reputation information.Entirely State's credit information of enterprise publicity system also can simply inquire about the registration of main market players, license examination & approval, annual report, administrative service Penalize, sampling result, manage the information such as abnormality, can not directly see the reputation information of enterprise.
The content of the invention
The present invention is, in order to solve the weak point that above-mentioned prior art is present, to propose a kind of prestige letter based on block chain The tamper resistant method of breath, can not change to the reputation information of the distributed real record businessman of energy, and this reputation information, So as to invisible credit worthiness effectively is switched into tangible not modifiable credit value so that the prestige of businessman is more true, It is reliable.
The present invention is adopted the following technical scheme that to solve technical problem:
A kind of tamper resistant method of the reputation information based on block chain of the present invention, is to be applied to several buyers and seller's ginseng With transaction system in, remember any one seller be prestige user u;It is characterized in, the tamper resistant method is as follows Carry out:
Step one, the prestige block chain for setting up the storage reputation information:
Step 1.1, the original block for setting up the prestige block chain;
The block head of the original block is made for the ID of prestige user u;The block main body of the original block is made to build The time of the original block;The block tail for making the original block is the block head of the original block and adding for block main body Confidential information;
Step 1.2, defined variable i, and initialize i=1;Using the original block as i-th block;
I-th block is supplied to the transaction system by step 1.3, the hypothesis prestige user u;The transaction system profit I-th credit value of the prestige user u is calculated with preceding i block;
Step 1.4, any one buyer determine whether to be traded according to i-th credit value of the prestige user u, If being traded, the transaction system obtains the i & lt Transaction Information of the prestige user u;Otherwise, return to step 1.4;
Step 1.5, the i+1 block for setting up the prestige block chain;
The block head for making the i+1 block is i-th address of block;Make the block master of the i+1 block Body is i & lt Transaction Information;The block tail for making the i+1 block is block head and the block master of the i+1 block The encryption information of body;
Bifurcated that may be present in step 2, the removal prestige block chain:
Step 2.1, the prestige block chain for traveling through the prestige user u, obtain forerunner's block of all blocks address and The number m of all blocks in the address of follow-up block and the prestige block chain;
Step 2.2, defined variable j, and initialize j=1;
Step 2.3, judge j-th block in the prestige block chain of the prestige user u with the presence or absence of 2 follow-up blocks Address;If in the presence of execution step 2.4;Otherwise, after j+1 being assigned into j, return to step 2.3 untill j=m, and is performed Step 2.8;
Step 2.4, j-th the 2 of block follow-up block is designated as block α and block β respectively, and will be without follow-up block 2 blocks be designated as block λ and block γ;Judge whether block α is block λ, if so, represent that block α is bifurcated, and by block The block head of α is changed to the address of block γ;The block tail for making block α is the block head of the block α and adding for block main body Confidential information;Otherwise, step 2.5 is performed;
Step 2.5, judge whether block α is block γ, if so, represent that block α is bifurcated, and by the block head of block α It is changed to the address of block λ;The block tail for making block α is the block head of the block α and the encryption information of block main body;It is no Then, step 2.6 is performed;
Step 2.6, judge whether block β is block λ, if so, represent that block β is bifurcated, and by the block head of block β more It is changed to the address of block γ;The block tail for making block β is the block head of the block β and the encryption information of block main body;Otherwise, Perform step 2.7;
Step 2.7, expression block β are bifurcated, and the block head of block β are changed to the address of block λ;Make block β's Block tail be the block head of the block β and the encryption information of block main body;
Step 2.8, m is assigned to i after, return to step 1.3.
Compared with prior art, the beneficial effects of the present invention are:
1st, be all placed on the Transaction Information each time of user in a block by the technology based on block chain by the present invention, Prestige block chain is formd, transaction system calculates the current credit value of user by the block that user provides, block chain data The distributed recording of distributed storage and data ensure that the data message of this prestige block chain can not possibly be modified, so that Invisible credit worthiness effectively can be switched into tangible not modifiable credit value.
2nd, bifurcated that may be present during the present invention removes prestige block chain in one block of every structure, by the block of bifurcated Block head point to prestige block chain last block, so as to solve the bifurcation in prestige block chain, solve use Family thinks that newest transaction reputation value is bad, so as to provide the problem of a preferable transaction reputation value in history.
3rd, by the technology based on block chain, the block tail for making each block is to this Transaction Information to the present invention Encryption information, it is ensured that the detailed content of each transaction of user cannot be checked at will, various hidden so as to protect Private data, improve Information Security.
4th, each transaction in prestige block chain of the invention is all by cryptography method and two neighboring block string Connection, therefore the ins and outs of each transaction can be traced back to, so that transaction system is reviewed according to the block that user provides User produced the block of transaction in the past, and then calculated the newest credit value of user.
Brief description of the drawings
Fig. 1 is flow chart of the invention;
The first situation occurred when Fig. 2 a are by bifurcated of the present invention;
Second situation occurred when Fig. 2 b are by bifurcated of the present invention;
The third situation occurred when Fig. 2 c are by bifurcated of the present invention;
The 4th kind of situation occurred when Fig. 2 d are by bifurcated of the present invention.
Specific embodiment
As shown in figure 1, in the present embodiment, a kind of tamper resistant method of the reputation information based on block chain is to apply to exist The transaction system that several buyers and the seller (i.e. prestige block chain user) participate in.Each of which user possesses a prestige area Block chain.Remember that any one seller is prestige user u;Block chain is the chain structure being made up of as basic structure block, wherein Block is made up of block head, block main body and block tail.Block main body includes exchange hour, trading object, evaluation score, evaluation Content;Address information of the block head comprising previous block;Block tail is the encryption information to block head and block main body.Specifically Tamper resistant method be to carry out as follows:
Step one, the prestige block chain for setting up storage reputation information:
Step 1.1, the original block for setting up prestige block chain;
The block head of original block is made for the ID of prestige user u;The block main body of original block is made to build original block Time;It is the block head of original block and the encryption information of block main body to make the block tail of original block;In the present embodiment, make With SHA256 algorithms to the block head of original block and being encrypted for block main body.
Step 1.2, defined variable i, and initialize i=1;Using original block as i-th block;
I-th block is supplied to transaction system by step 1.3, hypothesis prestige user u;Transaction system utilizes preceding i block It is calculated i-th credit value of prestige user u;
In the present embodiment, transaction system obtains the block that prestige user u is provided, transaction system by the interface of prestige block chain System reviews the transaction that preceding i block is produced successively since i-th block head of block, so as to be calculated prestige user u's I-th credit value.Because block is voluntarily provided by user, but there may be user and think newest transaction reputation value not It is good, so as to provide a preferable transaction reputation value in history.Bifurcated so can be formed on prestige block chain.So needing Bifurcated that may be present, i.e. step 2 in prestige block chain are removed when often setting up a block.
Step 1.4, any one buyer determine whether to be traded according to i-th credit value of prestige user u, if entering Row is concluded the business, then transaction system obtains the i & lt Transaction Information of prestige user u;Otherwise, return to step 1.4;In the present embodiment, buy Root decides whether transaction according to the height of user's credit value.
Step 1.5, the i+1 block for setting up prestige block chain;
The block head for making i+1 block is i-th address of block;The block main body for making i+1 block is i & lt Transaction Information;It is the block head of i+1 block and the encryption information of block main body to make the block tail of i+1 block;This reality In applying example, using SHA256 algorithms to the block head of i+1 block and being encrypted for block main body.
Bifurcated that may be present in step 2, removal prestige block chain:
The prestige block chain of step 2.1, traversal prestige user u, obtains the address of forerunner's block of all blocks and follow-up The number m of all blocks in the address of block and prestige block chain;In the present embodiment, all blocks of correspondence are initialized Data structure, including Addri=addressi, NextAddri=null, wherein representing i-th address of block, representing should Whether block has been accessed, and represents i-th address of next block of block in corresponding block chain.Wherein AddriRepresent I-th address of block, NextAddriRepresent i-th address of next block of block in corresponding block chain.By time All blocks of whole piece prestige block chain are gone through so as to store the storage Addr of each blocki, NextAddriValue make unidirectional area Block chain is changed into two-way block chain, and traversal whole piece prestige block chain obtains the address of forerunner's block of all blocks and follow-up block Address and prestige block chain in all blocks number m;
Step 2.2, defined variable j, and initialize j=1;
Step 2.3, judge the prestige block chain of prestige user u in j-th block with the presence or absence of 2 ground of follow-up block Location;If in the presence of execution step 2.4;Otherwise, after j+1 being assigned into j, return to step 2.3 untill j=m, and performs step Rapid 2.8;In the present embodiment, if a block has two follow-up blocks, bifurcated is occurred in that.At this time, it may be necessary to prestige The bifurcated of block chain is processed.The block of bifurcated is put into the end of prestige block chain main chain.
Step 2.4, j-th the 2 of block follow-up block is designated as block α and block β respectively, and will be without follow-up block 2 blocks be designated as block λ and block γ;Judge whether block α is block λ, if so, represent that block α is bifurcated, and by block The block head of α is changed to the address of block γ;The block tail of block α is made to believe for the encryption of the block head and block main body of block α Breath;Otherwise, step 2.5 is performed;
In the present embodiment, judge which bar chain is main chain by α, β, λ and γ, it is believed that chain most long is main chain.Now Four kinds of judged results are had, is respectively step 2.4, step 2.5, step 2.6, step 2.7.Situation shown in step 2.4 is as schemed Shown in 2a.The information of block 6 should be supplied to transaction system by user, but but provide block 2, so after block 2 Generation bifurcated.Now the block head of block 3 ' should be changed to the address of block 6 and again through SHA256 algorithms to the block of block 3 Head and block main body are encrypted.
Step 2.5, as shown in Figure 2 b, judges whether block α is block γ, if so, represent that block α is bifurcated, and by area The block head of block α is changed to the address of block λ;The block tail of block α is made to believe for the encryption of the block head and block main body of block α Breath;Otherwise, step 2.6 is performed;
Step 2.6, as shown in Figure 2 c, judges whether block β is block λ, if so, represent that block β is bifurcated, and by block The block head of β is changed to the address of block γ;The block tail of block β is made to believe for the encryption of the block head and block main body of block β Breath;Otherwise, step 2.7 is performed;.
Step 2.7, as shown in Figure 2 d, represents that block β is bifurcated, and the block head of block β is changed to the ground of block λ Location;It is the block head of block β and the encryption information of block main body to make the block tail of block β;
Step 2.8, m is assigned to i after, return to step 1.3.

Claims (1)

1. a kind of tamper resistant method of the reputation information based on block chain, is to be applied to the transaction that several buyers and the seller participate in In system, remember that any one seller is prestige user u;It is characterized in that, the tamper resistant method is to carry out as follows:
Step one, the prestige block chain for setting up the storage reputation information:
Step 1.1, the original block for setting up the prestige block chain;
The block head of the original block is made for the ID of prestige user u;It is described to build to make the block main body of the original block The time of original block;The block tail for making the original block is the block head of the original block and the encryption letter of block main body Breath;
Step 1.2, defined variable i, and initialize i=1;Using the original block as i-th block;
I-th block is supplied to the transaction system by step 1.3, the hypothesis prestige user u;The transaction system is using preceding I block is calculated i-th credit value of the prestige user u;
Step 1.4, any one buyer determine whether to be traded according to i-th credit value of the prestige user u, if entering Row is concluded the business, then the transaction system obtains the i & lt Transaction Information of the prestige user u;Otherwise, return to step 1.4;
Step 1.5, the i+1 block for setting up the prestige block chain;
The block head for making the i+1 block is i-th address of block;The block main body for making the i+1 block is I & lt Transaction Information;The block tail for making the i+1 block is the block head and block main body of the i+1 block Encryption information;
Bifurcated that may be present in step 2, the removal prestige block chain:
Step 2.1, the prestige block chain for traveling through the prestige user u, obtain the address of forerunner's block of all blocks and follow-up The number m of all blocks in the address of block and the prestige block chain;
Step 2.2, defined variable j, and initialize j=1;
Step 2.3, judge the prestige block chain of the prestige user u in j-th block with the presence or absence of 2 ground of follow-up block Location;If in the presence of execution step 2.4;Otherwise, after j+1 being assigned into j, return to step 2.3 untill j=m, and performs step Rapid 2.8;
Step 2.4, j-th the 2 of block follow-up block is designated as block α and block β respectively, and will without follow-up block 2 Individual block is designated as block λ and block γ;Judge whether block α is block λ, if so, represent that block α is bifurcated, and by block α's Block head is changed to the address of block γ;The block tail for making block α is the block head of the block α and the encryption letter of block main body Breath;Otherwise, step 2.5 is performed;
Step 2.5, judge whether block α is block γ, if so, representing that block α is bifurcated, and the block head of block α is changed It is the address of block λ;The block tail for making block α is the block head of the block α and the encryption information of block main body;Otherwise, hold Row step 2.6;
Step 2.6, judge whether block β is block λ, if so, representing that block β is bifurcated, and the block head of block β is changed to The address of block γ;The block tail for making block β is the block head of the block β and the encryption information of block main body;Otherwise, perform Step 2.7;
Step 2.7, expression block β are bifurcated, and the block head of block β are changed to the address of block λ;Make the area of block β Block tail is the block head of the block β and the encryption information of block main body;
Step 2.8, m is assigned to i after, return to step 1.3.
CN201710020031.7A 2017-01-11 2017-01-11 Tamper-proof method of reputation information based on block chain Active CN106779975B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710020031.7A CN106779975B (en) 2017-01-11 2017-01-11 Tamper-proof method of reputation information based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710020031.7A CN106779975B (en) 2017-01-11 2017-01-11 Tamper-proof method of reputation information based on block chain

Publications (2)

Publication Number Publication Date
CN106779975A true CN106779975A (en) 2017-05-31
CN106779975B CN106779975B (en) 2020-06-26

Family

ID=58947869

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710020031.7A Active CN106779975B (en) 2017-01-11 2017-01-11 Tamper-proof method of reputation information based on block chain

Country Status (1)

Country Link
CN (1) CN106779975B (en)

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107507006A (en) * 2017-08-11 2017-12-22 杭州秘猿科技有限公司 A kind of common recognition bifurcated processing method based on license chain
CN108494560A (en) * 2018-03-15 2018-09-04 南京智格电力科技有限公司 A kind of security service chain-circuit system based on decentralization design
CN108510254A (en) * 2018-02-09 2018-09-07 北京欧链科技有限公司 The two-way block chain structure of chain type, data processing method and device
CN108512649A (en) * 2018-02-09 2018-09-07 北京欧链科技有限公司 The processing method and processing device of the reversed Hash link of block chain
CN108985926A (en) * 2017-06-03 2018-12-11 蔡政育 Output system of object resume identification code
CN109284333A (en) * 2018-08-31 2019-01-29 中国信息通信研究院 Industrial chain data maintaining method and platform based on block chain
CN109300036A (en) * 2018-09-14 2019-02-01 百度在线网络技术(北京)有限公司 The bifurcated homing method and device of block chain network
CN109816323A (en) * 2018-12-12 2019-05-28 上海点融信息科技有限责任公司 Transaction auditing method, calculating equipment, storage medium for block chain network
CN110415008A (en) * 2018-10-23 2019-11-05 腾讯科技(深圳)有限公司 Credit data management method, device, node device, storage medium and system
WO2020000777A1 (en) * 2018-06-28 2020-01-02 平安科技(深圳)有限公司 Method and apparatus for acquiring individual credit information on the basis of block chain, and computer device
CN113269572A (en) * 2021-07-01 2021-08-17 广西师范大学 Credibility-based block chain agricultural product traceability trusted data uploading method
CN113553380A (en) * 2021-07-23 2021-10-26 东北大学 Reputation-behavior association-oriented data traceability system with double block chains

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130117154A1 (en) * 2010-07-23 2013-05-09 Alibaba Group Holding Limited Method and System of Evaluating Credibility of Online Trading User
CN105761143A (en) * 2016-02-01 2016-07-13 上海凭安网络科技有限公司 Multi-party co-construction credit record method based on block chains
CN106097074A (en) * 2016-06-20 2016-11-09 深圳市淘淘谷信息技术有限公司 A kind of block chain realizes the monitoring and managing method of business transaction record
CN106230808A (en) * 2016-07-28 2016-12-14 杭州云象网络技术有限公司 A kind of personal credit information system method based on block chain technology
CN106228344A (en) * 2016-07-28 2016-12-14 杭州云象网络技术有限公司 A kind of electronic government affairs system building method based on block chain technology
CN106250721A (en) * 2016-07-28 2016-12-21 杭州云象网络技术有限公司 A kind of electronic copyright protection method based on block chain

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130117154A1 (en) * 2010-07-23 2013-05-09 Alibaba Group Holding Limited Method and System of Evaluating Credibility of Online Trading User
CN105761143A (en) * 2016-02-01 2016-07-13 上海凭安网络科技有限公司 Multi-party co-construction credit record method based on block chains
CN106097074A (en) * 2016-06-20 2016-11-09 深圳市淘淘谷信息技术有限公司 A kind of block chain realizes the monitoring and managing method of business transaction record
CN106230808A (en) * 2016-07-28 2016-12-14 杭州云象网络技术有限公司 A kind of personal credit information system method based on block chain technology
CN106228344A (en) * 2016-07-28 2016-12-14 杭州云象网络技术有限公司 A kind of electronic government affairs system building method based on block chain technology
CN106250721A (en) * 2016-07-28 2016-12-21 杭州云象网络技术有限公司 A kind of electronic copyright protection method based on block chain

Cited By (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108985926A (en) * 2017-06-03 2018-12-11 蔡政育 Output system of object resume identification code
CN108985926B (en) * 2017-06-03 2022-11-01 蔡政育 Output system of object resume identification code
CN107507006A (en) * 2017-08-11 2017-12-22 杭州秘猿科技有限公司 A kind of common recognition bifurcated processing method based on license chain
CN108510254A (en) * 2018-02-09 2018-09-07 北京欧链科技有限公司 The two-way block chain structure of chain type, data processing method and device
CN108512649A (en) * 2018-02-09 2018-09-07 北京欧链科技有限公司 The processing method and processing device of the reversed Hash link of block chain
CN108512649B (en) * 2018-02-09 2021-09-10 北京欧链科技有限公司 Processing method and device for reverse hash link of block chain
CN108510254B (en) * 2018-02-09 2020-11-20 北京欧链科技有限公司 Chain bidirectional block chain structure, data processing method and device
CN108494560A (en) * 2018-03-15 2018-09-04 南京智格电力科技有限公司 A kind of security service chain-circuit system based on decentralization design
WO2020000777A1 (en) * 2018-06-28 2020-01-02 平安科技(深圳)有限公司 Method and apparatus for acquiring individual credit information on the basis of block chain, and computer device
CN109284333A (en) * 2018-08-31 2019-01-29 中国信息通信研究院 Industrial chain data maintaining method and platform based on block chain
CN109300036B (en) * 2018-09-14 2020-08-14 百度在线网络技术(北京)有限公司 Bifurcation regression method and device of block chain network
CN109300036A (en) * 2018-09-14 2019-02-01 百度在线网络技术(北京)有限公司 The bifurcated homing method and device of block chain network
WO2020082987A1 (en) * 2018-10-23 2020-04-30 腾讯科技(深圳)有限公司 Method and apparatus for credit data management, node device, user equipment, storage medium and system
CN110415008A (en) * 2018-10-23 2019-11-05 腾讯科技(深圳)有限公司 Credit data management method, device, node device, storage medium and system
CN110415008B (en) * 2018-10-23 2021-08-10 腾讯科技(深圳)有限公司 Credit data management method, device, node equipment, storage medium and system
CN109816323A (en) * 2018-12-12 2019-05-28 上海点融信息科技有限责任公司 Transaction auditing method, calculating equipment, storage medium for block chain network
CN113269572A (en) * 2021-07-01 2021-08-17 广西师范大学 Credibility-based block chain agricultural product traceability trusted data uploading method
CN113269572B (en) * 2021-07-01 2023-12-12 广西师范大学 Credibility-based blockchain agricultural product traceability trusted data uploading method
CN113553380A (en) * 2021-07-23 2021-10-26 东北大学 Reputation-behavior association-oriented data traceability system with double block chains
CN113553380B (en) * 2021-07-23 2023-07-28 东北大学 Reputation-behavior association-oriented data tracing system for double-block chain

Also Published As

Publication number Publication date
CN106779975B (en) 2020-06-26

Similar Documents

Publication Publication Date Title
CN106779975A (en) The tamper resistant method of the reputation information based on block chain
Goanta Selling LAND in Decentraland: The regime of non-fungible tokens on the Ethereum blockchain under the digital content directive
CN109034795B (en) Credit barter platform based on block chain
CN110599165B (en) Credit system construction method based on block chaining currency sky destruction
US20220044334A1 (en) Platform and method for preparing a tax return
CN108701325A (en) The transaction system that is self-regulated and the method for the system
JP2020507158A (en) Computer-implemented systems and methods for generating and extracting user-related data stored on a blockchain
CN108619726A (en) Agency by agreement for Distributed Calculation transaction
CN108764877A (en) Digital asset based on block chain technology really weighs method of commerce
CN107180380A (en) global commodity transaction method and system
CN106447362A (en) Method of preventing fake and shoddy commodities from entering into circulation field and device thereof
CN108686375A (en) Agency by agreement interface for equity transaction
US20230281602A1 (en) Platform and method for tokenizing a gaming profile
CN108335174A (en) Store control system and method, information data processing terminal based on block chain
CN107346315A (en) The structure and application process of object data association index system and the system
WO2016172985A1 (en) Commission allocation method and system
CN111340590A (en) Collaborative operation method based on electronic commerce and distributed resale platform thereof
KR102074937B1 (en) Method for managing divided ownership of artwork
Gupta et al. Determinants of customer satisfaction with the online shopping environment: evidence from India
CN111882335B (en) Block chain-based target anti-counterfeiting tracing method and device
TWM573031U (en) Data record system of virtual object trading
CN115660814A (en) Risk prediction method and device, computer readable storage medium and electronic equipment
TWM567924U (en) Financial trading strategy rental platform
US20200279232A1 (en) Method and system for generating super-sovereign currency
CN111222924A (en) Internet trading platform uncertainty evaluation filtering system based on normal distribution probability density function

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant