CN106779975A - The tamper resistant method of the reputation information based on block chain - Google Patents
The tamper resistant method of the reputation information based on block chain Download PDFInfo
- Publication number
- CN106779975A CN106779975A CN201710020031.7A CN201710020031A CN106779975A CN 106779975 A CN106779975 A CN 106779975A CN 201710020031 A CN201710020031 A CN 201710020031A CN 106779975 A CN106779975 A CN 106779975A
- Authority
- CN
- China
- Prior art keywords
- block
- prestige
- head
- chain
- user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/06—Buying, selling or leasing transactions
- G06Q30/0601—Electronic shopping [e-shopping]
- G06Q30/0609—Buyer or seller confidence or verification
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1097—Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
Landscapes
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Finance (AREA)
- Engineering & Computer Science (AREA)
- Strategic Management (AREA)
- Marketing (AREA)
- Economics (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Development Economics (AREA)
- Theoretical Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a kind of tamper resistant method of the reputation information based on block chain, it is characterized in that carrying out as follows:The 1 prestige block chain for setting up storage reputation information;When transaction system is concluded the business, block is provided to transaction system by user, transaction system calculates its credit value.This Transaction Information is returned to prestige block chain, the new block of prestige block chain building by transaction system after completing transaction.2 when building new block, checks in this prestige block chain with the presence or absence of bifurcated and removes bifurcated that may be present in prestige block chain.The present invention can really record the reputation information of businessman, and this reputation information can not be changed.So as to invisible credit worthiness effectively is switched into tangible not modifiable credit value so that the prestige of businessman is more true, reliable.
Description
Technical field
The present invention relates to block chain technical field, the anti-tamper side of specifically a kind of reputation information based on block chain
Method.
Background technology
Internet is a milestone for greatness in development of human history, is greatly promoted progress and the hair of human society
Exhibition.With continuing to develop for network, increasing user is done shopping and moneytary operations by network.Due to network in itself
Characteristic, the reputation information of businessman is easily tampered without being discovered.User is typically only capable to passively select phase when service is received
Believe the prestige of the seller.Business reputation is a kind of intangible asset of enterprise, with its value.I.e. business reputation refers to that operator is led to
Cross fair competition and the acquired good social synthesis of honest operation evaluate.The goodwill height of one enterprise is not only directly affected
The buying behavior of customer in certain area, and process effects can be caused." spreading from mouth to mouth ", publicizes widely, to certain model
The population effect produced by consumer or user in enclosing, is any advertisement sales promotion function to be replaced.Record businessman
Reputation information and can not change, invisible credit worthiness be switched into tangible not modifiable credit value, advantageously in enterprise
Competition, advantageously believe businessman in allow user's active, evade reputational risk.
Now by taking Taobao as an example.It is divided into red heart in Taobao's shop grade, diamond, Lan Guan, Jin Guan, each shop etc.
Level is all corresponding with seller's merchandising quantity, often sells a dotey and is just evaluated accordingly according to consumer, and seller often obtains
One favorable comment shop prestige just rises a point.People psychologically can believe that prestige shop high is their First
Choosing.But there is the phenomenon of brush prestige.By return it is existing, threaten buyer, employ people to brush the various ways such as single to carry out brush prestige.Some
Offender even invades express company's computer information system, changes express delivery data message, and being that the manufacture of certain net purchase website is false hands over
Easily record carrys out " brush is bored " lifting degrees of comparison.Although invisible credit worthiness is switched into tangible credit value, this credit value
It is modifiable, it is possible to there is deceptive information.
At present, only some shopping websites have degrees of comparison, and most enterprises can not see its reputation information.Entirely
State's credit information of enterprise publicity system also can simply inquire about the registration of main market players, license examination & approval, annual report, administrative service
Penalize, sampling result, manage the information such as abnormality, can not directly see the reputation information of enterprise.
The content of the invention
The present invention is, in order to solve the weak point that above-mentioned prior art is present, to propose a kind of prestige letter based on block chain
The tamper resistant method of breath, can not change to the reputation information of the distributed real record businessman of energy, and this reputation information,
So as to invisible credit worthiness effectively is switched into tangible not modifiable credit value so that the prestige of businessman is more true,
It is reliable.
The present invention is adopted the following technical scheme that to solve technical problem:
A kind of tamper resistant method of the reputation information based on block chain of the present invention, is to be applied to several buyers and seller's ginseng
With transaction system in, remember any one seller be prestige user u;It is characterized in, the tamper resistant method is as follows
Carry out:
Step one, the prestige block chain for setting up the storage reputation information:
Step 1.1, the original block for setting up the prestige block chain;
The block head of the original block is made for the ID of prestige user u;The block main body of the original block is made to build
The time of the original block;The block tail for making the original block is the block head of the original block and adding for block main body
Confidential information;
Step 1.2, defined variable i, and initialize i=1;Using the original block as i-th block;
I-th block is supplied to the transaction system by step 1.3, the hypothesis prestige user u;The transaction system profit
I-th credit value of the prestige user u is calculated with preceding i block;
Step 1.4, any one buyer determine whether to be traded according to i-th credit value of the prestige user u,
If being traded, the transaction system obtains the i & lt Transaction Information of the prestige user u;Otherwise, return to step 1.4;
Step 1.5, the i+1 block for setting up the prestige block chain;
The block head for making the i+1 block is i-th address of block;Make the block master of the i+1 block
Body is i & lt Transaction Information;The block tail for making the i+1 block is block head and the block master of the i+1 block
The encryption information of body;
Bifurcated that may be present in step 2, the removal prestige block chain:
Step 2.1, the prestige block chain for traveling through the prestige user u, obtain forerunner's block of all blocks address and
The number m of all blocks in the address of follow-up block and the prestige block chain;
Step 2.2, defined variable j, and initialize j=1;
Step 2.3, judge j-th block in the prestige block chain of the prestige user u with the presence or absence of 2 follow-up blocks
Address;If in the presence of execution step 2.4;Otherwise, after j+1 being assigned into j, return to step 2.3 untill j=m, and is performed
Step 2.8;
Step 2.4, j-th the 2 of block follow-up block is designated as block α and block β respectively, and will be without follow-up block
2 blocks be designated as block λ and block γ;Judge whether block α is block λ, if so, represent that block α is bifurcated, and by block
The block head of α is changed to the address of block γ;The block tail for making block α is the block head of the block α and adding for block main body
Confidential information;Otherwise, step 2.5 is performed;
Step 2.5, judge whether block α is block γ, if so, represent that block α is bifurcated, and by the block head of block α
It is changed to the address of block λ;The block tail for making block α is the block head of the block α and the encryption information of block main body;It is no
Then, step 2.6 is performed;
Step 2.6, judge whether block β is block λ, if so, represent that block β is bifurcated, and by the block head of block β more
It is changed to the address of block γ;The block tail for making block β is the block head of the block β and the encryption information of block main body;Otherwise,
Perform step 2.7;
Step 2.7, expression block β are bifurcated, and the block head of block β are changed to the address of block λ;Make block β's
Block tail be the block head of the block β and the encryption information of block main body;
Step 2.8, m is assigned to i after, return to step 1.3.
Compared with prior art, the beneficial effects of the present invention are:
1st, be all placed on the Transaction Information each time of user in a block by the technology based on block chain by the present invention,
Prestige block chain is formd, transaction system calculates the current credit value of user by the block that user provides, block chain data
The distributed recording of distributed storage and data ensure that the data message of this prestige block chain can not possibly be modified, so that
Invisible credit worthiness effectively can be switched into tangible not modifiable credit value.
2nd, bifurcated that may be present during the present invention removes prestige block chain in one block of every structure, by the block of bifurcated
Block head point to prestige block chain last block, so as to solve the bifurcation in prestige block chain, solve use
Family thinks that newest transaction reputation value is bad, so as to provide the problem of a preferable transaction reputation value in history.
3rd, by the technology based on block chain, the block tail for making each block is to this Transaction Information to the present invention
Encryption information, it is ensured that the detailed content of each transaction of user cannot be checked at will, various hidden so as to protect
Private data, improve Information Security.
4th, each transaction in prestige block chain of the invention is all by cryptography method and two neighboring block string
Connection, therefore the ins and outs of each transaction can be traced back to, so that transaction system is reviewed according to the block that user provides
User produced the block of transaction in the past, and then calculated the newest credit value of user.
Brief description of the drawings
Fig. 1 is flow chart of the invention;
The first situation occurred when Fig. 2 a are by bifurcated of the present invention;
Second situation occurred when Fig. 2 b are by bifurcated of the present invention;
The third situation occurred when Fig. 2 c are by bifurcated of the present invention;
The 4th kind of situation occurred when Fig. 2 d are by bifurcated of the present invention.
Specific embodiment
As shown in figure 1, in the present embodiment, a kind of tamper resistant method of the reputation information based on block chain is to apply to exist
The transaction system that several buyers and the seller (i.e. prestige block chain user) participate in.Each of which user possesses a prestige area
Block chain.Remember that any one seller is prestige user u;Block chain is the chain structure being made up of as basic structure block, wherein
Block is made up of block head, block main body and block tail.Block main body includes exchange hour, trading object, evaluation score, evaluation
Content;Address information of the block head comprising previous block;Block tail is the encryption information to block head and block main body.Specifically
Tamper resistant method be to carry out as follows:
Step one, the prestige block chain for setting up storage reputation information:
Step 1.1, the original block for setting up prestige block chain;
The block head of original block is made for the ID of prestige user u;The block main body of original block is made to build original block
Time;It is the block head of original block and the encryption information of block main body to make the block tail of original block;In the present embodiment, make
With SHA256 algorithms to the block head of original block and being encrypted for block main body.
Step 1.2, defined variable i, and initialize i=1;Using original block as i-th block;
I-th block is supplied to transaction system by step 1.3, hypothesis prestige user u;Transaction system utilizes preceding i block
It is calculated i-th credit value of prestige user u;
In the present embodiment, transaction system obtains the block that prestige user u is provided, transaction system by the interface of prestige block chain
System reviews the transaction that preceding i block is produced successively since i-th block head of block, so as to be calculated prestige user u's
I-th credit value.Because block is voluntarily provided by user, but there may be user and think newest transaction reputation value not
It is good, so as to provide a preferable transaction reputation value in history.Bifurcated so can be formed on prestige block chain.So needing
Bifurcated that may be present, i.e. step 2 in prestige block chain are removed when often setting up a block.
Step 1.4, any one buyer determine whether to be traded according to i-th credit value of prestige user u, if entering
Row is concluded the business, then transaction system obtains the i & lt Transaction Information of prestige user u;Otherwise, return to step 1.4;In the present embodiment, buy
Root decides whether transaction according to the height of user's credit value.
Step 1.5, the i+1 block for setting up prestige block chain;
The block head for making i+1 block is i-th address of block;The block main body for making i+1 block is i & lt
Transaction Information;It is the block head of i+1 block and the encryption information of block main body to make the block tail of i+1 block;This reality
In applying example, using SHA256 algorithms to the block head of i+1 block and being encrypted for block main body.
Bifurcated that may be present in step 2, removal prestige block chain:
The prestige block chain of step 2.1, traversal prestige user u, obtains the address of forerunner's block of all blocks and follow-up
The number m of all blocks in the address of block and prestige block chain;In the present embodiment, all blocks of correspondence are initialized
Data structure, including Addri=addressi, NextAddri=null, wherein representing i-th address of block, representing should
Whether block has been accessed, and represents i-th address of next block of block in corresponding block chain.Wherein AddriRepresent
I-th address of block, NextAddriRepresent i-th address of next block of block in corresponding block chain.By time
All blocks of whole piece prestige block chain are gone through so as to store the storage Addr of each blocki, NextAddriValue make unidirectional area
Block chain is changed into two-way block chain, and traversal whole piece prestige block chain obtains the address of forerunner's block of all blocks and follow-up block
Address and prestige block chain in all blocks number m;
Step 2.2, defined variable j, and initialize j=1;
Step 2.3, judge the prestige block chain of prestige user u in j-th block with the presence or absence of 2 ground of follow-up block
Location;If in the presence of execution step 2.4;Otherwise, after j+1 being assigned into j, return to step 2.3 untill j=m, and performs step
Rapid 2.8;In the present embodiment, if a block has two follow-up blocks, bifurcated is occurred in that.At this time, it may be necessary to prestige
The bifurcated of block chain is processed.The block of bifurcated is put into the end of prestige block chain main chain.
Step 2.4, j-th the 2 of block follow-up block is designated as block α and block β respectively, and will be without follow-up block
2 blocks be designated as block λ and block γ;Judge whether block α is block λ, if so, represent that block α is bifurcated, and by block
The block head of α is changed to the address of block γ;The block tail of block α is made to believe for the encryption of the block head and block main body of block α
Breath;Otherwise, step 2.5 is performed;
In the present embodiment, judge which bar chain is main chain by α, β, λ and γ, it is believed that chain most long is main chain.Now
Four kinds of judged results are had, is respectively step 2.4, step 2.5, step 2.6, step 2.7.Situation shown in step 2.4 is as schemed
Shown in 2a.The information of block 6 should be supplied to transaction system by user, but but provide block 2, so after block 2
Generation bifurcated.Now the block head of block 3 ' should be changed to the address of block 6 and again through SHA256 algorithms to the block of block 3
Head and block main body are encrypted.
Step 2.5, as shown in Figure 2 b, judges whether block α is block γ, if so, represent that block α is bifurcated, and by area
The block head of block α is changed to the address of block λ;The block tail of block α is made to believe for the encryption of the block head and block main body of block α
Breath;Otherwise, step 2.6 is performed;
Step 2.6, as shown in Figure 2 c, judges whether block β is block λ, if so, represent that block β is bifurcated, and by block
The block head of β is changed to the address of block γ;The block tail of block β is made to believe for the encryption of the block head and block main body of block β
Breath;Otherwise, step 2.7 is performed;.
Step 2.7, as shown in Figure 2 d, represents that block β is bifurcated, and the block head of block β is changed to the ground of block λ
Location;It is the block head of block β and the encryption information of block main body to make the block tail of block β;
Step 2.8, m is assigned to i after, return to step 1.3.
Claims (1)
1. a kind of tamper resistant method of the reputation information based on block chain, is to be applied to the transaction that several buyers and the seller participate in
In system, remember that any one seller is prestige user u;It is characterized in that, the tamper resistant method is to carry out as follows:
Step one, the prestige block chain for setting up the storage reputation information:
Step 1.1, the original block for setting up the prestige block chain;
The block head of the original block is made for the ID of prestige user u;It is described to build to make the block main body of the original block
The time of original block;The block tail for making the original block is the block head of the original block and the encryption letter of block main body
Breath;
Step 1.2, defined variable i, and initialize i=1;Using the original block as i-th block;
I-th block is supplied to the transaction system by step 1.3, the hypothesis prestige user u;The transaction system is using preceding
I block is calculated i-th credit value of the prestige user u;
Step 1.4, any one buyer determine whether to be traded according to i-th credit value of the prestige user u, if entering
Row is concluded the business, then the transaction system obtains the i & lt Transaction Information of the prestige user u;Otherwise, return to step 1.4;
Step 1.5, the i+1 block for setting up the prestige block chain;
The block head for making the i+1 block is i-th address of block;The block main body for making the i+1 block is
I & lt Transaction Information;The block tail for making the i+1 block is the block head and block main body of the i+1 block
Encryption information;
Bifurcated that may be present in step 2, the removal prestige block chain:
Step 2.1, the prestige block chain for traveling through the prestige user u, obtain the address of forerunner's block of all blocks and follow-up
The number m of all blocks in the address of block and the prestige block chain;
Step 2.2, defined variable j, and initialize j=1;
Step 2.3, judge the prestige block chain of the prestige user u in j-th block with the presence or absence of 2 ground of follow-up block
Location;If in the presence of execution step 2.4;Otherwise, after j+1 being assigned into j, return to step 2.3 untill j=m, and performs step
Rapid 2.8;
Step 2.4, j-th the 2 of block follow-up block is designated as block α and block β respectively, and will without follow-up block 2
Individual block is designated as block λ and block γ;Judge whether block α is block λ, if so, represent that block α is bifurcated, and by block α's
Block head is changed to the address of block γ;The block tail for making block α is the block head of the block α and the encryption letter of block main body
Breath;Otherwise, step 2.5 is performed;
Step 2.5, judge whether block α is block γ, if so, representing that block α is bifurcated, and the block head of block α is changed
It is the address of block λ;The block tail for making block α is the block head of the block α and the encryption information of block main body;Otherwise, hold
Row step 2.6;
Step 2.6, judge whether block β is block λ, if so, representing that block β is bifurcated, and the block head of block β is changed to
The address of block γ;The block tail for making block β is the block head of the block β and the encryption information of block main body;Otherwise, perform
Step 2.7;
Step 2.7, expression block β are bifurcated, and the block head of block β are changed to the address of block λ;Make the area of block β
Block tail is the block head of the block β and the encryption information of block main body;
Step 2.8, m is assigned to i after, return to step 1.3.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710020031.7A CN106779975B (en) | 2017-01-11 | 2017-01-11 | Tamper-proof method of reputation information based on block chain |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710020031.7A CN106779975B (en) | 2017-01-11 | 2017-01-11 | Tamper-proof method of reputation information based on block chain |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106779975A true CN106779975A (en) | 2017-05-31 |
CN106779975B CN106779975B (en) | 2020-06-26 |
Family
ID=58947869
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710020031.7A Active CN106779975B (en) | 2017-01-11 | 2017-01-11 | Tamper-proof method of reputation information based on block chain |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106779975B (en) |
Cited By (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107507006A (en) * | 2017-08-11 | 2017-12-22 | 杭州秘猿科技有限公司 | A kind of common recognition bifurcated processing method based on license chain |
CN108494560A (en) * | 2018-03-15 | 2018-09-04 | 南京智格电力科技有限公司 | A kind of security service chain-circuit system based on decentralization design |
CN108510254A (en) * | 2018-02-09 | 2018-09-07 | 北京欧链科技有限公司 | The two-way block chain structure of chain type, data processing method and device |
CN108512649A (en) * | 2018-02-09 | 2018-09-07 | 北京欧链科技有限公司 | The processing method and processing device of the reversed Hash link of block chain |
CN108985926A (en) * | 2017-06-03 | 2018-12-11 | 蔡政育 | Output system of object resume identification code |
CN109284333A (en) * | 2018-08-31 | 2019-01-29 | 中国信息通信研究院 | Industrial chain data maintaining method and platform based on block chain |
CN109300036A (en) * | 2018-09-14 | 2019-02-01 | 百度在线网络技术(北京)有限公司 | The bifurcated homing method and device of block chain network |
CN109816323A (en) * | 2018-12-12 | 2019-05-28 | 上海点融信息科技有限责任公司 | Transaction auditing method, calculating equipment, storage medium for block chain network |
CN110415008A (en) * | 2018-10-23 | 2019-11-05 | 腾讯科技(深圳)有限公司 | Credit data management method, device, node device, storage medium and system |
WO2020000777A1 (en) * | 2018-06-28 | 2020-01-02 | 平安科技(深圳)有限公司 | Method and apparatus for acquiring individual credit information on the basis of block chain, and computer device |
CN113269572A (en) * | 2021-07-01 | 2021-08-17 | 广西师范大学 | Credibility-based block chain agricultural product traceability trusted data uploading method |
CN113553380A (en) * | 2021-07-23 | 2021-10-26 | 东北大学 | Reputation-behavior association-oriented data traceability system with double block chains |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130117154A1 (en) * | 2010-07-23 | 2013-05-09 | Alibaba Group Holding Limited | Method and System of Evaluating Credibility of Online Trading User |
CN105761143A (en) * | 2016-02-01 | 2016-07-13 | 上海凭安网络科技有限公司 | Multi-party co-construction credit record method based on block chains |
CN106097074A (en) * | 2016-06-20 | 2016-11-09 | 深圳市淘淘谷信息技术有限公司 | A kind of block chain realizes the monitoring and managing method of business transaction record |
CN106230808A (en) * | 2016-07-28 | 2016-12-14 | 杭州云象网络技术有限公司 | A kind of personal credit information system method based on block chain technology |
CN106228344A (en) * | 2016-07-28 | 2016-12-14 | 杭州云象网络技术有限公司 | A kind of electronic government affairs system building method based on block chain technology |
CN106250721A (en) * | 2016-07-28 | 2016-12-21 | 杭州云象网络技术有限公司 | A kind of electronic copyright protection method based on block chain |
-
2017
- 2017-01-11 CN CN201710020031.7A patent/CN106779975B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130117154A1 (en) * | 2010-07-23 | 2013-05-09 | Alibaba Group Holding Limited | Method and System of Evaluating Credibility of Online Trading User |
CN105761143A (en) * | 2016-02-01 | 2016-07-13 | 上海凭安网络科技有限公司 | Multi-party co-construction credit record method based on block chains |
CN106097074A (en) * | 2016-06-20 | 2016-11-09 | 深圳市淘淘谷信息技术有限公司 | A kind of block chain realizes the monitoring and managing method of business transaction record |
CN106230808A (en) * | 2016-07-28 | 2016-12-14 | 杭州云象网络技术有限公司 | A kind of personal credit information system method based on block chain technology |
CN106228344A (en) * | 2016-07-28 | 2016-12-14 | 杭州云象网络技术有限公司 | A kind of electronic government affairs system building method based on block chain technology |
CN106250721A (en) * | 2016-07-28 | 2016-12-21 | 杭州云象网络技术有限公司 | A kind of electronic copyright protection method based on block chain |
Cited By (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108985926A (en) * | 2017-06-03 | 2018-12-11 | 蔡政育 | Output system of object resume identification code |
CN108985926B (en) * | 2017-06-03 | 2022-11-01 | 蔡政育 | Output system of object resume identification code |
CN107507006A (en) * | 2017-08-11 | 2017-12-22 | 杭州秘猿科技有限公司 | A kind of common recognition bifurcated processing method based on license chain |
CN108510254A (en) * | 2018-02-09 | 2018-09-07 | 北京欧链科技有限公司 | The two-way block chain structure of chain type, data processing method and device |
CN108512649A (en) * | 2018-02-09 | 2018-09-07 | 北京欧链科技有限公司 | The processing method and processing device of the reversed Hash link of block chain |
CN108512649B (en) * | 2018-02-09 | 2021-09-10 | 北京欧链科技有限公司 | Processing method and device for reverse hash link of block chain |
CN108510254B (en) * | 2018-02-09 | 2020-11-20 | 北京欧链科技有限公司 | Chain bidirectional block chain structure, data processing method and device |
CN108494560A (en) * | 2018-03-15 | 2018-09-04 | 南京智格电力科技有限公司 | A kind of security service chain-circuit system based on decentralization design |
WO2020000777A1 (en) * | 2018-06-28 | 2020-01-02 | 平安科技(深圳)有限公司 | Method and apparatus for acquiring individual credit information on the basis of block chain, and computer device |
CN109284333A (en) * | 2018-08-31 | 2019-01-29 | 中国信息通信研究院 | Industrial chain data maintaining method and platform based on block chain |
CN109300036B (en) * | 2018-09-14 | 2020-08-14 | 百度在线网络技术(北京)有限公司 | Bifurcation regression method and device of block chain network |
CN109300036A (en) * | 2018-09-14 | 2019-02-01 | 百度在线网络技术(北京)有限公司 | The bifurcated homing method and device of block chain network |
WO2020082987A1 (en) * | 2018-10-23 | 2020-04-30 | 腾讯科技(深圳)有限公司 | Method and apparatus for credit data management, node device, user equipment, storage medium and system |
CN110415008A (en) * | 2018-10-23 | 2019-11-05 | 腾讯科技(深圳)有限公司 | Credit data management method, device, node device, storage medium and system |
CN110415008B (en) * | 2018-10-23 | 2021-08-10 | 腾讯科技(深圳)有限公司 | Credit data management method, device, node equipment, storage medium and system |
CN109816323A (en) * | 2018-12-12 | 2019-05-28 | 上海点融信息科技有限责任公司 | Transaction auditing method, calculating equipment, storage medium for block chain network |
CN113269572A (en) * | 2021-07-01 | 2021-08-17 | 广西师范大学 | Credibility-based block chain agricultural product traceability trusted data uploading method |
CN113269572B (en) * | 2021-07-01 | 2023-12-12 | 广西师范大学 | Credibility-based blockchain agricultural product traceability trusted data uploading method |
CN113553380A (en) * | 2021-07-23 | 2021-10-26 | 东北大学 | Reputation-behavior association-oriented data traceability system with double block chains |
CN113553380B (en) * | 2021-07-23 | 2023-07-28 | 东北大学 | Reputation-behavior association-oriented data tracing system for double-block chain |
Also Published As
Publication number | Publication date |
---|---|
CN106779975B (en) | 2020-06-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106779975A (en) | The tamper resistant method of the reputation information based on block chain | |
Goanta | Selling LAND in Decentraland: The regime of non-fungible tokens on the Ethereum blockchain under the digital content directive | |
CN109034795B (en) | Credit barter platform based on block chain | |
CN110599165B (en) | Credit system construction method based on block chaining currency sky destruction | |
US20220044334A1 (en) | Platform and method for preparing a tax return | |
CN108701325A (en) | The transaction system that is self-regulated and the method for the system | |
JP2020507158A (en) | Computer-implemented systems and methods for generating and extracting user-related data stored on a blockchain | |
CN108619726A (en) | Agency by agreement for Distributed Calculation transaction | |
CN108764877A (en) | Digital asset based on block chain technology really weighs method of commerce | |
CN107180380A (en) | global commodity transaction method and system | |
CN106447362A (en) | Method of preventing fake and shoddy commodities from entering into circulation field and device thereof | |
CN108686375A (en) | Agency by agreement interface for equity transaction | |
US20230281602A1 (en) | Platform and method for tokenizing a gaming profile | |
CN108335174A (en) | Store control system and method, information data processing terminal based on block chain | |
CN107346315A (en) | The structure and application process of object data association index system and the system | |
WO2016172985A1 (en) | Commission allocation method and system | |
CN111340590A (en) | Collaborative operation method based on electronic commerce and distributed resale platform thereof | |
KR102074937B1 (en) | Method for managing divided ownership of artwork | |
Gupta et al. | Determinants of customer satisfaction with the online shopping environment: evidence from India | |
CN111882335B (en) | Block chain-based target anti-counterfeiting tracing method and device | |
TWM573031U (en) | Data record system of virtual object trading | |
CN115660814A (en) | Risk prediction method and device, computer readable storage medium and electronic equipment | |
TWM567924U (en) | Financial trading strategy rental platform | |
US20200279232A1 (en) | Method and system for generating super-sovereign currency | |
CN111222924A (en) | Internet trading platform uncertainty evaluation filtering system based on normal distribution probability density function |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |