CN107425969A - A kind of employee's physical examination information authentication method based on block chain technology - Google Patents

A kind of employee's physical examination information authentication method based on block chain technology Download PDF

Info

Publication number
CN107425969A
CN107425969A CN201710806764.3A CN201710806764A CN107425969A CN 107425969 A CN107425969 A CN 107425969A CN 201710806764 A CN201710806764 A CN 201710806764A CN 107425969 A CN107425969 A CN 107425969A
Authority
CN
China
Prior art keywords
employee
physical examination
information
entry
authentication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710806764.3A
Other languages
Chinese (zh)
Inventor
路松峰
孟庆树
徐庚洋
王同洋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huazhong University of Science and Technology
Original Assignee
Huazhong University of Science and Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huazhong University of Science and Technology filed Critical Huazhong University of Science and Technology
Priority to CN201710806764.3A priority Critical patent/CN107425969A/en
Publication of CN107425969A publication Critical patent/CN107425969A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/50Reducing energy consumption in communication networks in wire-line communication networks, e.g. low power modes or reduced link rate

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses a kind of employee's physical examination information authentication method based on block chain technology, belong to the application and development field of block chain technology.Using the inventive method, employee can upload to electronics physical examination information on Factom block chains;The electronics physical examination information that the notary such as hospital, employee employer's organization director where during employee's physical examination afterwards uploads to employee carries out signature authentication, and authentication information and public key are uploaded on Factom block chains;Before new employer employs employee, inquiry is stored in the electronics physical examination information of the employee on Factom block chains and corresponding authentication information, and then trusts the physical examination result of the employee.The method of the present invention provides block chain underlying services using Factom, the speed of service faster, write-in cost it is smaller, and block chain will not be caused to expand, cause that the electronics physical examination information truth of employee is credible and can not distort simultaneously, employee is to avoid repeating physical examination when new employer services, and saves time and fund.

Description

A kind of employee's physical examination information authentication method based on block chain technology
Technical field
The invention belongs to the application and development field of block chain technology, more particularly, to a kind of based on block chain technology Employee's physical examination information authentication method.
Background technology
For narrow sense, block chain be it is a kind of sequentially in time by data block by sequentially be connected in a manner of be combined into one Kind of linked data structure, and safeguard that one can not distort, can not forge, disclosed goes central distribution formula account in a manner of cryptography This.Broadly, block chain technology is to be known together using block linked data structure to verify with data storage, using distributed node Algorithm ensures the safety of data transfer and access to generate and update the data, using the mode of cryptography, using by automation pin This code composition intelligent contract come program and a kind of brand-new distributed basis framework of operation data with calculate normal form.Block Chain is the new application pattern of the computer technologies such as Distributed Storage, point-to-point transmission, common recognition mechanism, AES, altogether Knowledge mechanism is foundation trust, one public account book of identical of maintenance of reaching common understanding between all accounting nodes, and this is both to assert Means, and prevent the means distorted.Block chain is broadly divided into three major types, and they are respectively publicly-owned chain, alliance's chain, privately owned Chain.Publicly-owned chain refer to the complete decentralization as bit coin block chain, not by the block chain of any mechanism controls, the world Upper any individual or group can send transaction, and transaction can obtain effective confirmation of the block chain.Alliance's chain refers to The node for participating in block chain chooses in advance, has been likely to good network connection between node, on such block chain Other common recognition algorithms that inoperative amount proves can be used.Privately owned chain refers to the block chain that certain centralization control be present, ginseng With node there was only user oneself, the access of data and using there is strict rights management.Block chain Technology origin is in P2P networks Technology, rivest, shamir, adelman, database technology, digital cash.Block chain technology be considered as after large scale computer, PC, Computation schema overturns formula innovation after internet, it is likely that causes a new technological innovation and industry to become in the world Leather.
At present, the application of block chain extended to identification management, transaction flow management, decentralization payment system, Insurance claim, supply chain management, medical treatment & health record management, land property right registration, energy management and source prove management etc. Multiple fields.Block chain makes database security be employed first without the solution of the credit of administrative organization as a kind of In bit coin, in fact, block chain technology is from the technology derived from bit coin this application out, the middle clever bit released Coin block chain revolutionizes the mode of transaction record, never exists before this permanent, scattered and need not trusting Account book.Current most successful block chain is exactly the block chain of bit coin, due to bit coin block chain it is natural can not tamper with And outstanding security, naturally, it is desirable to carry out application and development on bit coin block chain, however, due to bit Some initial design trade-offs of coin, also there is the problem of following main in it:
1) speed.Bit coin uses the common recognition method of proof of work (Proof of Work), and workload difficulty can be adjusted It is whole to arrive to keep every about one block of generation in 10 minutes.Application for intentionally getting bigger security, multiple confirmations can Can be required.One common requirement is to wait the confirmation of 6 blocks, and it is small more than one that this may result in the stand-by period When.
2) cost.The transaction cost of bit coin acquiescence is about 0.01mBTC.The transaction value of bit coin is not being stopped always Ground fluctuates, if the price of bit coin goes up, transaction cost will also go up therewith.This is to needing to manage a large amount of transaction It is a serious cost burden for the application program of data.In addition, also have some factors, such as the limit to block size System and absence from work without reason reward halve, and can result in tranaction costs increase.
3) block chain expands.Limitation is 1MB to bit coin block size at present, the transaction count that can so cause system to handle The upper limit be 7 per second.Any application program wants to write using block chain and storage information will all increase flow.This is asked Topic has caused people to seek to solve by increasing block size.
At this stage, before employer reaches an agreement with employee, employer often may require that employee's physical and mental health, and now employee have to The physical examination mechanism trusted to employer checks UP.If employee had done body in nearest a period of time in regular medical institutions Inspection, then the problem of may result in repetition physical examination, repetition physical examination not only waste the fund of employee but also may be to the bodies of employee Body causes unnecessary injury, such as, the Chest X-rays in some physical examination projects may bring certain radiohazard.
The content of the invention
For the disadvantages described above or Improvement requirement of prior art, the invention provides a kind of employee based on block chain technology Physical examination information authentication method, recognized its object is to notary by block chain technology come the physical examination data recent to employee Card, new employer are seen on block chain after the related physical examination information of healthy employee with regard to the trusted employee.Thus solves existing shape The problem of employee more changes jobs repeat body inspection expense under state, and efficiency is low, fund of losing time and excessive imaging cause actual bodily harm.
To achieve the above object, according to the invention provides a kind of employee's physical examination authentification of message side based on block chain technology Method, it the described method comprises the following steps:
(1) the electronics physical examination information of employee is uploaded on Factom block chains;
(2) private key signature certification is carried out to the electronics physical examination information of upload, and authentication information and public key is uploaded to On Factom block chains;
(3) inquiry is stored in the electronics physical examination information of the employee on Factom block chains, and uses public key verifications electron The authentication information of information is examined, obtains real authentication result.
Further, the step (1) includes following sub-step:
(11) judge whether there is the chain for solely belonging to the employee operations in Factom, integrated if spending the entry of setting without if Create chain;
(12) employee's electronics physical examination information is write in the chain of the employee in the form of entry, often writes an entry and spend The entry integration of setting.
Further, the step (2) includes following sub-step:
(21) entry for having employee's electronics physical examination information is read from the chain of only category employee by Factom, from entry Obtain employee's electronics physical examination information;
(22) employee's physical examination information is authenticated, and authentication information is generated according to authentication result, authentication information also includes The ChainID of employee and the entry cryptographic Hash of electronics physical examination information;
(23) authentication information is signed using private key, and the authentication information after signature is converted into entry and is written to public affairs In the chain of witness;
(24) authentication information after signature and notarial public key are converted into the employee's that entry and being written to is certified In chain.
Further, the step (3) includes following sub-step:
(31) all entries write by notary are read from the chain of employee;
(32) signature authentication information is decrypted with notarial public key with the authenticity of authentication verification information, extracts institute The entry cryptographic Hash of electronics physical examination information in true authentication information, and the entry cryptographic Hash of the electronics physical examination information of employee's offer are provided Contrast, finds out entry cryptographic Hash identical authentication information;
(33) query steps (32) obtain the notarial identity information corresponding to authentication information, are employed it follows that inquiring about Which notary is the electronics physical examination information of member have did certification and authentication result.
Further, the employee or notary, which write information into, specifically includes following steps in Factom:
(51) entry is translated the information into, entry cryptographic Hash is stored in chain;
(52) entry corresponding to entry cryptographic Hash is uploaded in Factom distributed hashtable;
(53) all entry cryptographic Hash received in an interior chain per minute generate an item, and the composition of item is ChainID and entry cryptographic Hash;
(54) at the end of per minute, all chains in the minute are generated into directory block, the composition of directory block for ChainID and is somebody's turn to do The Merkle roots of item in ChainID;
(55) at the end of every 10 minutes, Merkle roots corresponding to 10 directory blocks will being generated in this 10 minutes anchor to ratio On special coin block chain, confirmation is sent afterwards and represents that information has been successfully written in Factom.
Further, notary is applied to become in the step (2) includes following sub-step:
(61) client registers identity information, client are that applicant generates a pair of private keys and public key, and by applicant's During public key and identity information are uploaded onto the server;
(62) server is audited to obtain auditing result to the identity information of applicant, if examination & verification passes through, will can apply The binding of the public key and identity information of people is simultaneously stored in server;
(63) auditing result is fed back into applicant.
The identity of applicant includes employer's organization director where preceding employer, physical examination hospital or the employee of employee.
Further, the authentication result includes the judgement to physical examination information authenticity, if thinking that physical examination information is wrong Point out mistake place in physical examination information.
Further, the electronics physical examination packet includes physical examination time, the medical institutions of physical examination and physical examination project.
In general, by the contemplated above technical scheme of the present invention compared with prior art, have following technology special Sign and beneficial effect:
(1) the inventive method provides block chain underlying services using Factom, and Factom agreements make the operation of application program Speed faster, write-in cost it is smaller, and will not cause block chain expand.
(2) the inventive method is applied, notary to the employee's electronics physical examination information being stored on Factom by signing Name certification so that the electronics physical examination information truth of employee is credible and can not distort, and so, employee is that new employer can avoid when servicing Physical examination is repeated, saves time and fund.
Brief description of the drawings
Fig. 1 is the flow chart that Factom nodes obtain entry integration in the inventive method;
Fig. 2 is the flow chart that Factom is arrived in the storage of employee's electronics physical examination information in the inventive method;
Fig. 3 is that notarial flow chart is applied to become in the inventive method;
Fig. 4 is the flow that the electronics physical examination information of the employee to being stored on Factom in the inventive method is authenticated Figure;
Fig. 5 is the flow chart that employee's electronics physical examination information and authentication result are inquired about in the inventive method.
Embodiment
In order to make the purpose , technical scheme and advantage of the present invention be clearer, it is right below in conjunction with drawings and Examples The present invention is further elaborated.It should be appreciated that specific embodiment described herein is only to explain the present invention, not For limiting the present invention.As long as in addition, technical characteristic involved in each embodiment of invention described below that Conflict can is not formed between this to be mutually combined.
Just the technical term of the present invention is explained and illustrated first below:
FCT:The abbreviation of token in Factom;
Client:Application program based on Factom agreements;
Entry:The one group of data submitted for user, entry can be arbitrary datas, but size is no more than 10KB, for Bigger data, client can be split into it some 10KB size entries, then upload to respectively in Factom;
ChainID:Entry is stored on chain, and ChainID is the cryptographic Hash of Factom chain names;
Entry integrates:It is to be exchanged by FCT, entry integrates uses licensing just as Factom systems, once production It is born with and is bound on some entry integration address of user;
Item:The cryptographic Hash for all entries that a chain receives in the past period generates an entry in Factom Block;
Directory block:The list being made up of ChainID and item Merkle roots this two item datas, directory block can include upper one The cryptographic Hash of individual directory block, and a chain structure is formed, directory block sorts according to ChainID;
Federal server:Factom server is safeguarded, the entry that it handles user is merchandised with FCT;
Centralization oracle server:FCT is exchanged into the server of entry integration in Factom;
DHT:Distributed hashtable.
The present invention will be further described for flow chart with reference to embodiments:
In Fig. 1, when user wants to obtain entry integration, client can first check whether the FCT of user is enough, if user FCT deficiency, then user should to possess FCT node pay the bill purchase, after the node for possessing FCT receives payment information, just to The FCT of corresponding value is produced in family FCT public keys address, and user can exchange bar after possessing FCT to centralization oracle server Mesh integrates.
In fig. 2, for the electronics physical examination information of client upload employee into Factom, client first compresses the electronics physical examination Information, if the electronics physical examination information of compressed version is still excessive, some entries are just converted it to, to each entry, client Apply writing entry cryptographic Hash into Factom user's chain, Factom networks judge whether the entry integration of user is enough, if bar Mesh integration is insufficient, and then Factom refuses the write-in of entry cryptographic Hash, and otherwise, Factom sends confirmation to client,
Then client uploads entry corresponding to cryptographic Hash into Factom DHT,
1 minute or so, the Merkle roots assembling of the newly-built item of all chains was generated directory block by Factom,
Every 10 minutes, Factom anchored to Merkle roots corresponding to 10 directory blocks on bit coin block chain,
Client receive anchoring information be written to after bit coin block chain confirmation then represent user profile by into In work(write-in Factom.
The process of notary's public key address and identity information is bound to apps server, as shown in figure 3, notary is first By its identity information of client registers, client and then a pair of private keys and public key are generated for notary, client is by notary Public key and identity information request upload in apps server, apps server is carried out to the identity information of user Examination & verification, if examination & verification passes through, the binding result of notarial public key and identity information can be stored in server, and examination & verification is passed through Result feed back to client;If the result that examination & verification does not pass through by not fed back to client by examination & verification.
In Fig. 4, the process that notary is authenticated to the electronics physical examination information of employee is illustrated, client is from employee's The entry for including employee's electronics physical examination information is read in Factom chains, the electronics physical examination that compressed version is generated by these entries is believed Breath, after decompression, client comes out the electronics physical examination presentation of information of employee, and notary is recognized the electronics physical examination information Card, if certification do not pass through if notary can write not by the reason for, client according to notarial authentication result generation certification Information, client are signed with notarial private key to the authentication information, and the authentication information of signature is stored in into notary On Factom chains, and the authentication information of signature is pushed on employee's Factom chains.
In Figure 5, client reads all signature authentication data entries pushed by notary from employee's Factom chains, The signature authentication information of compressed version is generated by these entries, all signature authentication information is obtained after decompression, uses notary Public key these signature authentication information are verified, to determine that authentication information is really sent by notary, it can thus be concluded that all true Real authentication information, found out by the comparison of cryptographic Hash all with employee part compressed version electronics physical examination data entries cryptographic Hash phase Same true authentication information, they are useful and real authentication informations, then to application server query public key address Corresponding notarial identity information, and then notary information and the authentication result of certain part of electronics physical examination information can be obtained.
Above content as it will be easily appreciated by one skilled in the art that the foregoing is merely illustrative of the preferred embodiments of the present invention, It is not intended to limit the invention, all any modification, equivalent and improvement made within the spirit and principles of the invention etc., It should be included in the scope of the protection.

Claims (8)

1. a kind of employee's physical examination information authentication method based on block chain technology, it is characterised in that methods described includes:
(1) the electronics physical examination information of employee is uploaded on Factom block chains;
(2) private key signature certification is carried out to the electronics physical examination information of upload, and authentication information and public key is uploaded into Factom areas On block chain;
(3) inquiry is stored in the electronics physical examination information of the employee on Factom block chains, and using public key verifications electronics physical examination letter The authentication information of breath, obtain real authentication result.
2. a kind of employee's physical examination information authentication method according to claim 1, it is characterised in that the step (1) includes Following sub-step:
(11) judge whether there is the chain for solely belonging to the employee operations in Factom, created if spending the entry of setting to integrate without if Chain;
(12) employee's electronics physical examination information is write in the chain of the employee in the form of entry, often writes an entry and spend setting Entry integration.
3. a kind of employee's physical examination information authentication method according to claim 1, it is characterised in that the step (2) includes Following sub-step:
(21) entry for having employee's electronics physical examination information is read from the chain of only category employee by Factom, obtained from entry Employee's electronics physical examination information;
(22) employee's physical examination information is authenticated, and authentication information is generated according to authentication result, authentication information also includes employee ChainID and electronics physical examination information entry cryptographic Hash;
(23) authentication information is signed using private key, and the authentication information after signature is converted into entry and is written to notary Chain in;
(24) authentication information after signature and notarial public key are converted into entry and are written in the chain for the employee being certified.
4. a kind of employee's physical examination information authentication method according to claim 1, it is characterised in that the step (3) includes Following sub-step:
(31) all entries write by notary are read from the chain of employee;
(32) signature authentication information is decrypted with notarial public key with the authenticity of authentication verification information, extracted all true The entry cryptographic Hash of electronics physical examination information in real authentication information, and the entry cryptographic Hash pair of the electronics physical examination information of employee's offer Than finding out entry cryptographic Hash identical authentication information;
(33) query steps (32) obtain the notarial identity information corresponding to authentication information, it follows that inquired about employee Which notary is electronics physical examination information have did certification and authentication result.
5. a kind of employee's physical examination information authentication method according to claim 1,2 or 3, it is characterised in that described by information Following steps are specifically included in write-in Factom:
(51) entry is translated the information into, entry cryptographic Hash is stored in chain;
(52) entry corresponding to entry cryptographic Hash is uploaded in Factom distributed hashtable;
(53) all entry cryptographic Hash received in an interior chain per minute generate an item, and the composition of item is ChainID and entry cryptographic Hash;
(54) at the end of per minute, all chains in the minute are generated into directory block, the composition of directory block for ChainID and is somebody's turn to do The Merkle roots of item in ChainID;
(55) at the end of every 10 minutes, Merkle roots corresponding to 10 directory blocks will being generated in this 10 minutes anchor to bit coin On block chain, confirmation is sent afterwards and represents that information has been successfully written in Factom.
A kind of 6. employee's physical examination information authentication method according to claim 1, it is characterised in that Shen in the step (2) Please turn into notary includes following sub-step:
(61) client registers identity information, client are that applicant generates a pair of private keys and public key, and by the public key of applicant In being uploaded onto the server with identity information;
(62) server is audited to obtain auditing result to the identity information of applicant, can be by applicant if examination & verification passes through The binding of public key and identity information is simultaneously stored in server;
(63) auditing result is fed back into applicant.
7. a kind of employee's physical examination information authentication method according to claim 3, it is characterised in that the authentication result includes Judgement to physical examination information authenticity, mistake place in physical examination information is pointed out if thinking that physical examination information is wrong.
A kind of 8. employee's physical examination information authentication method according to claim 1, it is characterised in that the electronics physical examination information Including physical examination time, the medical institutions of physical examination and physical examination project.
CN201710806764.3A 2017-09-08 2017-09-08 A kind of employee's physical examination information authentication method based on block chain technology Pending CN107425969A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710806764.3A CN107425969A (en) 2017-09-08 2017-09-08 A kind of employee's physical examination information authentication method based on block chain technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710806764.3A CN107425969A (en) 2017-09-08 2017-09-08 A kind of employee's physical examination information authentication method based on block chain technology

Publications (1)

Publication Number Publication Date
CN107425969A true CN107425969A (en) 2017-12-01

Family

ID=60431982

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710806764.3A Pending CN107425969A (en) 2017-09-08 2017-09-08 A kind of employee's physical examination information authentication method based on block chain technology

Country Status (1)

Country Link
CN (1) CN107425969A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108696511A (en) * 2018-04-24 2018-10-23 深圳市元征科技股份有限公司 A kind of public notification of information method, apparatus and relevant device based on block chain
CN108922585A (en) * 2018-04-27 2018-11-30 长春市万易科技有限公司 A kind of intelligent health bracelet date storage method and system based on block chain
CN109472595A (en) * 2018-10-16 2019-03-15 沈阳炳恒科技有限公司 Catering industry staff health based on block chain supervises implementation method
CN109583912A (en) * 2018-11-14 2019-04-05 阿里巴巴集团控股有限公司 Trade company's authentication method and device based on block chain
CN110276693A (en) * 2018-06-07 2019-09-24 腾讯科技(深圳)有限公司 Settlement of insurance claim method and system
CN113626793A (en) * 2021-07-15 2021-11-09 中国信息通信研究院 Health authentication method, system, device, equipment and readable storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150332283A1 (en) * 2014-05-13 2015-11-19 Nant Holdings Ip, Llc Healthcare transaction validation via blockchain proof-of-work, systems and methods
CN105761143A (en) * 2016-02-01 2016-07-13 上海凭安网络科技有限公司 Multi-party co-construction credit record method based on block chains
CN106384236A (en) * 2016-08-31 2017-02-08 江苏通付盾科技有限公司 Blockchain based CA (Certificate Authority) management method, device and system
CN106682884A (en) * 2017-01-05 2017-05-17 天津米游科技有限公司 Computing power transaction system and method based on blockchain
US20170206532A1 (en) * 2007-12-03 2017-07-20 Yu Yung Choi System and method for streamlined registration and management of products over a communication network related thereto

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170206532A1 (en) * 2007-12-03 2017-07-20 Yu Yung Choi System and method for streamlined registration and management of products over a communication network related thereto
US20150332283A1 (en) * 2014-05-13 2015-11-19 Nant Holdings Ip, Llc Healthcare transaction validation via blockchain proof-of-work, systems and methods
CN105761143A (en) * 2016-02-01 2016-07-13 上海凭安网络科技有限公司 Multi-party co-construction credit record method based on block chains
CN106384236A (en) * 2016-08-31 2017-02-08 江苏通付盾科技有限公司 Blockchain based CA (Certificate Authority) management method, device and system
CN106682884A (en) * 2017-01-05 2017-05-17 天津米游科技有限公司 Computing power transaction system and method based on blockchain

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
PAUL SNOW等: "Factom:Business Processes Secured by Immutable Audit Trails on the Blockchain", 《GITHUB》 *
保罗·斯诺等: ""公证通Factom白皮书1.0版:在区块链上建立不可更改的审计公证业务流程"", 《巴比特》 *

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108696511A (en) * 2018-04-24 2018-10-23 深圳市元征科技股份有限公司 A kind of public notification of information method, apparatus and relevant device based on block chain
CN108922585A (en) * 2018-04-27 2018-11-30 长春市万易科技有限公司 A kind of intelligent health bracelet date storage method and system based on block chain
CN110276693A (en) * 2018-06-07 2019-09-24 腾讯科技(深圳)有限公司 Settlement of insurance claim method and system
CN110276693B (en) * 2018-06-07 2021-05-07 腾讯科技(深圳)有限公司 Insurance claim settlement method and system
CN109472595A (en) * 2018-10-16 2019-03-15 沈阳炳恒科技有限公司 Catering industry staff health based on block chain supervises implementation method
CN109583912A (en) * 2018-11-14 2019-04-05 阿里巴巴集团控股有限公司 Trade company's authentication method and device based on block chain
CN113626793A (en) * 2021-07-15 2021-11-09 中国信息通信研究院 Health authentication method, system, device, equipment and readable storage medium

Similar Documents

Publication Publication Date Title
CN108292401B (en) Secure digital data manipulation
CN107425969A (en) A kind of employee's physical examination information authentication method based on block chain technology
EP3596653B1 (en) Issuing virtual documents in a block chain
CN108848063B (en) Block chain-based data processing method, system and computer-readable storage medium
CN110383752B (en) Compact recording protocol
CN103370688B (en) A kind of system and method being generated multifactor personalization server strong encryption keys by ease of user password
CN109544331A (en) Supply chain financial application method, apparatus and terminal device based on block chain
CN102959559B (en) For the method producing certificate
CN110335149A (en) A kind of assets based on block chain really weigh transaction realization method and system
CN107660293A (en) Property rights electronic certificate(EDT)Distribution management method and its system
CN109906443A (en) The system and method for being used to form general record
CN110383757A (en) System and method for safe handling electronic identity
CN111369730B (en) Voting processing method and device based on block chain
CN112037068A (en) Resource transfer method, system, device, computer equipment and storage medium
CN112991045B (en) Medical health consumption financing method, device, equipment and medium based on blockchain
CN115619404B (en) Block chain-based enterprise associated transaction business cooperative processing method
CN115427959A (en) Method for directly transmitting electronic coin data sets between a terminal, a payment system, a currency system and a monitoring unit
Hsu et al. Design of an e-diploma system based on consortium blockchain and facial recognition
CN108881121A (en) A kind of P2P credit based on mobile Internet mutually sees system and method
Vidal et al. Blockchain application in higher education diploma management and results analysis
KR20220008064A (en) System and method for credit exchange using block-chain technology
US20050076218A1 (en) Cryptographic electronic gift certificate cross-reference to related applications
US20230039214A1 (en) Systems and methods for compliance checks
Thilagavathi Blockchain-based framework for online entrance examination and score card verification system
More et al. Blockchain based Tamper Proof Certificates

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20171201

RJ01 Rejection of invention patent application after publication