CN108875386A - A kind of multicenter finite field block catenary system framework with block issue mechanism and application demand issue mechanism - Google Patents

A kind of multicenter finite field block catenary system framework with block issue mechanism and application demand issue mechanism Download PDF

Info

Publication number
CN108875386A
CN108875386A CN201810462760.2A CN201810462760A CN108875386A CN 108875386 A CN108875386 A CN 108875386A CN 201810462760 A CN201810462760 A CN 201810462760A CN 108875386 A CN108875386 A CN 108875386A
Authority
CN
China
Prior art keywords
block
issue mechanism
multicenter
authentication
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810462760.2A
Other languages
Chinese (zh)
Inventor
江峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Publication of CN108875386A publication Critical patent/CN108875386A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
    • G06K17/0022Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device
    • G06K17/0029Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device the arrangement being specially adapted for wireless interrogation of grouped or bundled articles tagged with wireless record carriers
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Business, Economics & Management (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Marketing (AREA)
  • Finance (AREA)
  • Economics (AREA)
  • Strategic Management (AREA)
  • Development Economics (AREA)
  • General Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Computer And Data Communications (AREA)

Abstract

The present invention discloses a kind of multicenter finite field block catenary system framework with block issue mechanism and application demand issue mechanism., in the prior art, the server for accessing internet breaks through rewriting, the insecure problem of bring authentication information by hacker for it.A kind of decentralization is disclosed, the technical solution that information can not distort.So that various have authentication event effectively to be recorded, ultimately forms multiple center equalitys and participate in, the collaborative block catenary system of " All for one and one for all " mutually recorded.

Description

A kind of multicenter finite field area with block issue mechanism and application demand issue mechanism Block catenary system framework
Technical field
The present invention relates to data authentication fields.
Background technique
With the development of mobile communication technology, special mobile Internet and the infiltration of Internet of Things forward direction people's lives field, There is the demand of various authentication services Internet-based.Such as commodity true and false certification, Transaction Information, collectibles information, virtual Account information, virtual assets, individual/enterprise identity information, reference information, justice information etc..
In the prior art, the server for needing to build an access internet, then accesses server by external node, To inquire above- mentioned information.
However, breaking through system server by hacker's means is the thing being difficult to avoid that.Hacker stores often through rewriting In the information in server, reach illegal objective.
With the lasting research and application of bit coin and block chain technology, the block chain certification of decentralization, common recognition Mechanism and intelligent contract are increasingly rely by extensive concern, but in block chain technology the digging mine mechanism and workload of driving and popularization Proof mechanism is but difficult to introduce in alliance's chain that broader non-bit coin class is applied and the application of privately owned chain, it is more difficult to directly draw Enter be a large amount of non-bit coin class application alliance's chain and privately owned chain application scenarios in be difficult to send out using the block of block chain Cloth mechanism.Bit coin tradition block chain uses the full node verification logging mode of all participants simultaneously, in many application scenarios, It is not preferred plan yet.
In a large amount of non-bit coin class application scenarios, it would be desirable to borrow or retain block chain block structure form and Block chain account book and block chain multinode authentication mode, and to remove and most basic in block chain framework depend on for existence and drive Dig mine mechanism and proof of work mechanism.Therefore, we must construct a kind of completely new block issue mechanism, and construct and be based on The completely new multicenter block chain mutual assistance Verification System framework with block issue mechanism of " All for one and one for all ", uses base It is saved entirely in the collaborative block chain certification of " All for one and one for all " of the finite field of server level instead of traditional infinite field Digging mine mechanism and proof of work mechanism in the block chain of point certification.So-called finite field multicenter block chain Verification System frame Structure, when polycentric centric quantity is enough, the certification demand issuing function at these centers is different, but in finite field block chain The authentication function at these centers is convergent in authentication function, and essence is still the certification shape of a kind of decentralization or portion centers Formula.The typical case of this Verification System framework will be the item authentication application of various manufacturers and trade company and various have Need authentication event certification publication demand certification class application, therefore, we can will be this with block issue mechanism, be based on The collaborative multicenter distributed authentication system framework of " All for one and one for all " is known as the small town identown (Ai Den).It is non- Bit coin class application scenarios are numerous and numerous and complicated, this completely new more flexible block chain Verification System framework will have extensively General application value.
Summary of the invention
The purpose of the present invention is being directed to the problems of the prior art, disclose a kind of band block issue mechanism and application demand is sent out The multicenter finite field block catenary system framework of cloth mechanism, it is characterised in that:
Verification System (identown) is made of several authentication centers.Each authentication center needs to add by agreement Enter Verification System (identown).
Each authentication center includes at least basic database, descriptive entry authentication information system and the certification book keeping operation of block chain System.
The basic database stores authentication information.When operating the basic database, event authentication information is recorded in generation.
In one block record release cycle, descriptive entry authentication information system broadcasts record event authentication information.
Each authentication center includes that a block chain authenticates accounting system.Institute's accounting module records the bibliographical particulars being broadcasted Mesh authentication information.
If some authentication center receives block publication instruction, which becomes block publisher node.The block publication section Point generates the block data with timestamp according to the bibliographic information generated in Verification System in a period of time (identblock) to entire Verification System broadcast distribution.
The block data includes block Head Section (identhead) and block body area (identbody).It collects in block body area The descriptive entry authentication information being broadcasted in a period of time, these descriptive entry authentication informations are processed to as calculating parameter Radical evidence.The radical is processed to authentication data according to as calculating parameter.The authentication data is recorded in block Head Section.
The block data being published is certified the reception of other authentication centers in system.When a block data is tested by system After card confirmation, it is connected to behind previous block, is stored in block chain as a newest block.System enters next area Block records release cycle.
Further, operating the basic database includes:It reads, write-in, update, modify and/or delete data.
Further, each authentication center can generate basic bibliographic information.The basis bibliographic information is every In one block record release cycle, it is broadcast in entire Verification System.
Further, when the basic database is written into, basic bibliographic information is generated.
Further, the basic bibliographic information includes:Self checking parameter, health value and participation.
The rule that the health parameters value is formed is as follows:
If a) authentication center's publication block data is not over verifying, then authentication center's health parameters value drops It is low.
And/or b) authentication center carries out self-test to the data in basic database.The unhealthful ginseng of the result of self-test Numerical value.
If and/or c) authentication center does not issue basic bibliographic information in block record release cycle, Health value can reduce.
The rule that the participation numerical value is formed is as follows:
If a) authentication center participates in publication block data, then participation numerical value increases.
If and/or b) authentication center's refusal participates in publication block data, then participation numerical value reduction.
Further, if some authentication center receives block publication instruction, become block publisher node, do not receive block hair The authentication center of cloth instruction is non-published node.When issuing block data each time, publisher node is randomly assigned.
Further, an intelligent protocol rule is arranged in the Verification System.By the rule, it is randomly assigned whole or portion Divide authentication center as block publisher node.
Further, the authentication center for being designated publication block data is block publisher node, other authentication centers are non-area Block publisher node.
The block data of all block publisher node publications is certified central authentication.Whole authentication centers are according to setting Verification rule, determine which block data is stored in block chain as newest formal effective block.
Further, the verification rule is majority principle.
Further, it when Verification System (identown) is added by agreement in authentication center, needs whether to verify authentication center It is the server for storing verification information.
Further, when Verification System (identown) is added by agreement in authentication center, manual examination and verification are needed.
Further, each authentication center is with a basic descriptive entry authentication information.The basis descriptive entry is recognized Card information is broadcast in entire Verification System in each block record release cycle.The basis descriptive entry certification letter Breath includes:Self checking parameter, health value and participation.
The rule that the health parameters value is formed is as follows:
If a) authentication center's publication block data is not over verifying, then authentication center's health parameters value drops It is low.
And/or b) authentication center carries out self-test to the data in basic database.The unhealthful ginseng of the result of self-test Numerical value.
If and/or c) authentication center does not issue basic descriptive entry certification letter in block record release cycle Breath, health value can reduce.
The rule that the participation numerical value is formed is as follows:
If a) authentication center participates in publication block data, then participation numerical value increases.If and/or b) one recognize Card center refusal participates in publication block data, then participation numerical value reduces.
Further, the descriptive entry authentication information being broadcasted in a period of time is collected as cryptographic Hash by block body area Calculating parameter.
Further, each authentication center includes that a descriptive entry authentication information records pond.If a descriptive entry Authentication information is not recorded by a block data.Then the descriptive entry authentication information is stranded in descriptive entry authentication information note It records in pond, before generating block data to next time, is preferentially recorded in next block.
Further, the basic database records access, the visit by the stationary nodes initiation outside the Verification System Ask that record forms descriptive entry authentication information.Stationary nodes outside the Verification System include fixed physical node or specific void Quasi- node.The fixed physical node includes RFID tag, mobile terminal of specific identification code etc..The specific dummy node packet Include specific virtual account.
Further, basic database has the verification information of commodity.The external fixture reason node or virtual account are logical Cross the true and false of access basic database verifying commodity.Verification result forms descriptive entry authentication information.
Further, the mode of the true and false of commodity is verified as the certification of the digital identity certificate to external node.To outside segments The certification of the digital identity certificate of point is demonstrate,proved using a results of closed loop certification.I.e. after closed loop verifying each time, start one A new closed loop identifying procedure generates the new random number digital certificate new as the external node by system, generates A new digital certificate store in the basic database, while updating the digital identity certificate of the external node, When the commodity need to verify, i.e., the digital identity certificate of the described external node needs to verify, and at this moment system fetches the outside The digital certificate of node returns to progress certificate comparison in the basic database, completes a complete one time one card closed loop and recognizes After demonstrate,proving process, system generates new random number digital certificate new as the external node again, and system enters next A closed loop identifying procedure, wait external node records checking request next time.
Further, in the closed loop identifying procedure, the external node, which is saved or updated, saves the digital certificate, institute It states and the cryptographic Hash for saving the digital certificate is saved or updated in basic database.The digital identity certificate of the external node needs When verifying, after system fetches the digital certificate of the external node and carries out Hash operation, then in the basic database Judgement is compared in the certificate cryptographic Hash of preservation.New digital certificate is broadcasted outward not as descriptive entry authentication information. The digital certificate being verified is broadcasted outward as a part of descriptive entry authentication information.
Further, the mode for verifying the true and false of commodity is a results card.After verifying each time, one is generated newly The cryptographic Hash of digital certificate be stored in basic database.Basic database retains two digital certificates being verified Cryptographic Hash, form the queue of a multielement.Second digital certificate is outside as descriptive entry authentication information in queue It is broadcasted.Earliest digital certificate and the digital certificate being newly generated are authenticated not as this descriptive entry for recording certification Information is broadcasted outward.
Further, the mode of the true and false of commodity or virtual account is verified as one-time pad verifying.After verifying each time, more The newly key to commodity sign encryption or the signature key of update virtual account.New key is not as descriptive entry authentication information It is broadcasted outward.Used key is broadcasted outward as descriptive entry authentication information.
Further, in the block, including a block chain type code;The block chain type code records item class Not;The project category includes disappear fastly product, durable goods, collectibles and/or industry code;The disparity items classification generates different The block chain of functional requirement forms multi-tiling chain;
Further, the content of the block chain of the different function demand as needed can from the block chain of a function to Another block chain carries out turning chain.
Further, the commodity are the product that disappear fastly.The information that commodity are activated carries out outward as descriptive entry authentication information Broadcast.
Further, the commodity are the product that disappear fastly;Commodity cross the information of shelf-life as descriptive entry authentication information outward into Row broadcast.
Further, the commodity are the product that disappear fastly;The information that commodity are activated carries out outward as descriptive entry authentication information After broadcast, the basic database of the corresponding authentication center for storing the commodity initial authentication information is buried in oblivion according to rule or deletes or mark Remember the initial authentication data entries of the commodity;The information that it's the shelf-life past commodity is broadcasted outward as descriptive entry authentication information Afterwards, the basic database of the corresponding authentication center for storing the commodity initial authentication information is buried in oblivion according to rule or deletes or mark and is somebody's turn to do The initial authentication data entries of commodity.
Further, the commodity are the product that disappear fastly;The corresponding product block chain that disappears fastly records verifying commodity according in the block chain The middle time quality guarantee period longest time, after the time coefficient of agreement, disappeared product block chain fastly as this as time radix Life cycle, the historical data more than the block chain of the life cycle will be automatically left out and bury in oblivion.
Further, user's information of the commodity can be anonymous or be used as bibliographical particulars publicly according to the requirement of user Mesh authentication information is broadcasted outward.
The solution have the advantages that unquestionable, the characteristics such as the decentralization that has, information can not distort, so that It is various to there is authentication event effectively to be recorded, ultimately form multiple center equalitys and participate in, mutually record " all for one, I is Everybody " collaborative system.
Detailed description of the invention
Fig. 1 is Verification System (identown) structural schematic diagram of the invention.
Fig. 2 is block data structures figure.
Specific embodiment
Below with reference to embodiment, the invention will be further described, but should not be construed the above-mentioned subject area of the present invention only It is limited to following embodiments.Without departing from the idea case in the present invention described above, according to ordinary skill knowledge and used With means, various replacements and change are made, should all include within the scope of the present invention.
Embodiment 1:
A kind of multicenter finite field block catenary system framework with block issue mechanism and application demand issue mechanism, it is special Sign is:
Referring to Fig. 1, Verification System (identown) is made of several authentication centers.Each authentication center needs to pass through association Verification System (identown) could be added in view.It is worth noting that relative to traditional block chain (bit coin etc.), this patent Authentication center need by agreement be added Verification System (identown).For example, it is desired to verify whether authentication center is commodity Information authentication service device, to meet the objective of component this Verification System (identown).Further, authentication center passes through agreement When Verification System (identown) is added, manual examination and verification are needed, to guarantee that each authentication center is believable when being added.
Each authentication center includes at least basic database, descriptive entry authentication information system and the certification book keeping operation of block chain System.
The basic database stores authentication information.When operating the basic database, event authentication information is recorded in generation. In embodiment, when accessing basic database by external node, the descriptive entry authentication information system generates one section of bibliographical particulars Mesh authentication information.
In one block record release cycle, descriptive entry authentication information system broadcasts record event authentication information.
Each authentication center includes that a block chain authenticates accounting system.Institute's accounting module records the bibliographical particulars being broadcasted Mesh authentication information.
If some authentication center receives block publication instruction, which becomes block publisher node.The block publication section Point generates the block data with timestamp according to the bibliographic information generated in Verification System in a period of time (identblock) to entire Verification System broadcast distribution.
It is worth noting that relative to traditional block chain (bit coin etc.), this patent has been abandoned digging mine mechanism, has each been recognized Card center drives the development of block chain in such a way that serve the people and be served by the people.
The block data includes block Head Section (identhead) and block body area (identbody).It collects in block body area The descriptive entry authentication information being broadcasted in a period of time, these descriptive entry authentication informations are processed to as calculating parameter Radical evidence.The radical is processed to authentication data according to as calculating parameter.The authentication data is recorded in block Head Section. Normally, block head includes the authentication data of previous block, timestamp, the authentication data of block chain type code and this block.
The block data being published is certified the reception of other authentication centers in system.When a block data is tested by system After card confirmation, it is connected to behind previous block, is stored in block chain as a newest block.System enters next area Block records release cycle.It is worth noting that first block that system generates becomes the first of block chain as original block A block.Block chain is stored in the block chain certification accounting module.
Embodiment 2
The present embodiment main feature is with embodiment 1, and further, operating the basic database includes:Read, be written, Update, modify and/or delete data.
For example, external node is by accessing some authentication center, it is " just that some commodity is had matched from basic database The information of product ".The access information or authentication result are considered as recording event, and then generate and record event authentication information.
Embodiment 3
The present embodiment main feature is with embodiment 1, and further, each authentication center can generate basic descriptive entry letter Breath.The basis bibliographic information is broadcast in entire Verification System in each block record release cycle.
For example, generating basic bibliographic information when the basic database is written into commodity verification information.
Embodiment 3
The present embodiment main feature is with embodiment 2, and further, the basis bibliographic information includes:Self checking ginseng Number, health value and participation.
The rule that the health parameters value is formed is as follows:
If a) authentication center's publication block data is not over verifying, then authentication center's health parameters value drops It is low.
B) authentication center carries out self-test to the data in basic database.The unhealthful parameter value of the result of self-test.
If c) authentication center does not issue basic bibliographic information, health value in block record release cycle It can reduce.
The rule that the participation numerical value is formed is as follows:
If a) authentication center participates in publication block data, then participation numerical value increases.
If b) authentication center's refusal participates in publication block data, then participation numerical value reduces.
Embodiment 4
The present embodiment main feature is with embodiment 3, further, if some authentication center receives block publication instruction, As block publisher node, the authentication center for not receiving block publication instruction is non-published node.Block data is issued each time When, publisher node is randomly assigned.
A kind of method that can be used is that an intelligent protocol rule is arranged in the Verification System.By the rule, at random Specify all or part of authentication center as block publisher node in ground.
Embodiment 5
The present embodiment main feature is with embodiment 3, and further, the authentication center for being designated publication block data is block Publisher node, other authentication centers are non-block publisher node.
The block data of all block publisher node publications is certified central authentication.Whole authentication centers are according to setting Verification rule, determine which block data is stored in block chain as newest formal effective block.
The verification rule can be majority principle, for example, same block data has been issued there are five node, although this The difference of a block data and the publication of another node, but still approve the block data of this five nodes publication.
Embodiment 6
The present embodiment main feature is with embodiment 1, further, what block body area was broadcasted in collection a period of time Calculating parameter of the descriptive entry authentication information as cryptographic Hash., according to the rule of Michael (Merkle) credible tree, it is processed to Michael radical evidence.
Each authentication center includes that a descriptive entry authentication information records pond.If a descriptive entry authentication information Do not recorded by a block data.Then the descriptive entry authentication information is stranded in descriptive entry authentication information record pond, Before generating block data to next time, preferentially recorded in next block.
The basic database records access by the stationary nodes initiation outside the Verification System, and the access records shape At descriptive entry authentication information.Stationary nodes outside the Verification System include fixed physical node or specific dummy node. The fixed physical node includes RFID tag, mobile terminal of specific identification code etc..The specific dummy node includes specific Virtual account.
Embodiment 7
The present embodiment main feature is with embodiment 1, and further, basic database has the verification information of commodity.It is described External fixture manages the true and false that node or virtual account verify commodity by access basic database.Verification result forms bibliographical particulars Mesh authentication information.
Embodiment 8
The present embodiment main feature is with embodiment 7, and further, the mode for verifying the true and false of commodity is to external node The certification of digital identity certificate.The certification of the digital identity certificate of external node is demonstrate,proved using a results of closed loop certification. I.e. after closed loop verifying each time, start a new closed loop identifying procedure, a new random number is generated as institute by system The new digital certificate of external node is stated, a new digital certificate store of generation updates simultaneously in the basic database The digital identity certificate of the external node, when the commodity need to verify, i.e., the digital identity certificate of the described external node needs It verifies, at this moment system fetches the digital certificate of the external node, returns to progress certificate comparison in the basic database, complete After a complete one time one card closed loop identifying procedure, system generates a new random number as the external node again New digital certificate, system enter next closed loop identifying procedure, and wait external node records checking request next time.
Embodiment 9
The present embodiment main feature is with embodiment 7, further, in the closed loop identifying procedure, the external node It saves or updates and save the digital certificate, the Hash for saving the digital certificate is saved or updated in the basic database Value.When the digital identity certificate of the external node needs to verify, system fetches the digital certificate of the external node and progress After Hash operation, then with the certificate cryptographic Hash saved in the basic database judgement is compared.New digital certificate is not made It is broadcasted outward for descriptive entry authentication information.The digital certificate being verified as descriptive entry authentication information one It is broadcasted outward part.
Embodiment 10
The present embodiment main feature is with embodiment 7, and further, the mode for verifying the true and false of commodity is a results Card.After verifying each time, the cryptographic Hash for generating a new digital certificate is stored in basic database.Basic database The cryptographic Hash for retaining multiple (can the be two) digital certificates being verified, forms the queue of a multielement.Queue In second digital certificate broadcasted outward as descriptive entry authentication information.It earliest digital certificate and is newly generated Digital certificate broadcasted outward not as this descriptive entry authentication information for recording certification.
Embodiment 11
The present embodiment main feature is with embodiment 7, and further, the mode for verifying the true and false of commodity or virtual account is one A secondary close verifying.After verifying each time, the signature key to the commodity sign key encrypted or update virtual account is updated.Newly Key broadcasted outward not as descriptive entry authentication information.Used key is as descriptive entry authentication information It is broadcasted outward.
Embodiment 12
The present embodiment main feature is with embodiment 7, further, in the block, including a block chain type code. The block chain type code records project category.The project category includes disappear fastly product, durable goods, collectibles and/or industry Code.The disparity items classification generates the block chain of different function demand, forms multi-tiling chain;The different function demand The content of block chain can carry out turning chain from the block chain of a function to another block chain as needed.
For example, the commodity are the product that disappear fastly.The information that commodity are activated carries out extensively outward as descriptive entry authentication information It broadcasts.The information that is activated while the respective stored recording areas in the relevant rudimentary database being notified to mark or delete relevant rudimentary Description information.
Since the product that disappear fastly are with the shelf-life.The information that it's the shelf-life past commodity carries out extensively outward as descriptive entry authentication information It broadcasts.The respective stored recording areas in the relevant rudimentary database is notified to mark or delete relevant rudimentary description information simultaneously.
The product that disappear fastly are according to user demand, it may be necessary to long-term collection, at this moment can apply turning from the product chain that disappears fastly chain to Collectibles chain, so that examination can be recorded for a long time.Such as one bottle of wine, when purchase in the product chain that disappears fastly, user needs long-term collection, just It can apply being transferred to collectibles chain.
For another example, the corresponding art work, famous person sign souvenir etc., author, collector, user identity information can constitute quotient A part of product value:User's information of the commodity can be anonymous or be used as bibliographical particulars publicly according to the requirement of user Mesh authentication information is broadcasted outward.

Claims (27)

1. a kind of multicenter finite field block catenary system framework with block issue mechanism and application demand issue mechanism, feature It is:
Verification System (identown) is made of several authentication centers;Each authentication center, which needs to be added by agreement, to be recognized Card system (identown);
Each authentication center includes at least basic database, descriptive entry authentication information system and block chain certification book keeping operation system System;
The basic database stores authentication information;When operating the basic database, event authentication information is recorded in generation;
In one block record release cycle, descriptive entry authentication information system broadcasts record event authentication information;
Each authentication center includes that a block chain authenticates accounting system;The descriptive entry that institute's accounting module record is broadcasted is recognized Demonstrate,prove information;
If some authentication center receives block publication instruction, which becomes block publisher node;The block publisher node root According to the bibliographic information generated in Verification System in a period of time, generate the block data (identblock) with timestamp to Entire Verification System broadcast distribution;
The block data includes block Head Section (identhead) and block body area (identbody);Collect one section in block body area The descriptive entry authentication information being broadcasted in time, these descriptive entry authentication informations are processed to radical as calculating parameter According to;The radical is processed to authentication data according to as calculating parameter;The authentication data is recorded in block Head Section;
The block data being published is certified the reception of other authentication centers in system;When a block data is verified really by system After recognizing, it is connected to behind previous block, is stored in block chain as a newest block;System is remembered into next block Record release cycle.
2. a kind of multicenter finite field area with block issue mechanism and application demand issue mechanism according to claim 1 Block catenary system framework, it is characterised in that:Operating the basic database includes:It reads, write-in, update, modify and/or delete number According to.
3. a kind of multicenter finite field area with block issue mechanism and application demand issue mechanism according to claim 2 Block catenary system framework, it is characterised in that:Each authentication center can generate basic bibliographic information;The basis descriptive entry Information is broadcast in entire Verification System in each block record release cycle.
4. a kind of multicenter finite field area with block issue mechanism and application demand issue mechanism according to claim 2 Block catenary system framework, it is characterised in that:When the basic database is written into, basic bibliographic information is generated.
5. a kind of multicenter finite field area with block issue mechanism and application demand issue mechanism according to claim 2 Block catenary system framework, it is characterised in that:It is described basis bibliographic information include:Self checking parameter, health value and participation.
The rule that the health parameters value is formed is as follows:
If a) authentication center's publication block data is not over verifying, then authentication center's health parameters value reduces.
And/or b) authentication center carries out self-test to the data in basic database;The unhealthful parameter value of the result of self-test.
If and/or c) authentication center does not issue basic bibliographic information, health in block record release cycle Value can reduce.
The rule that the participation numerical value is formed is as follows:
If a) authentication center participates in publication block data, then participation numerical value increases;
If and/or b) authentication center's refusal participates in publication block data, then participation numerical value reduction.
6. a kind of multicenter finite field area with block issue mechanism and application demand issue mechanism according to claim 1 Block catenary system framework, it is characterised in that:If some authentication center receives block publication instruction, become block publisher node, not The authentication center for receiving block publication instruction is non-published node;When issuing block data each time, publisher node is by randomly It is specified.
7. a kind of multicenter finite field area with block issue mechanism and application demand issue mechanism according to claim 1 Block catenary system framework, it is characterised in that:An intelligent protocol rule is arranged in the Verification System;By the rule, randomly refer to Fixed all or part authentication center is as block publisher node.
8. a kind of multicenter finite field area with block issue mechanism and application demand issue mechanism according to claim 7 Block catenary system framework, it is characterised in that:The authentication center for being designated publication block data is block publisher node, in other certifications The heart is non-block publisher node;
The block data of all block publisher node publications is certified central authentication;Whole authentication centers is according to the school of setting Rule is tested, determines which block data is stored in block chain as newest formal effective block.
9. a kind of multicenter finite field area with block issue mechanism and application demand issue mechanism according to claim 8 Block catenary system framework, it is characterised in that:The verification rule is majority principle.
10. a kind of multicenter finite field with block issue mechanism and application demand issue mechanism according to claim 1 Block catenary system framework, it is characterised in that:When Verification System (identown) is added by agreement in authentication center, needs to verify and recognize Whether card center is the server for storing verification information.
11. a kind of multicenter finite field with block issue mechanism and application demand issue mechanism according to claim 1 Block catenary system framework, it is characterised in that:When Verification System (identown) is added by agreement in authentication center, need manually to examine Core.
12. a kind of multicenter finite field with block issue mechanism and application demand issue mechanism according to claim 1 Block catenary system framework, it is characterised in that:Collect the descriptive entry authentication information being broadcasted in a period of time in block body area Calculating parameter as cryptographic Hash.
13. a kind of multicenter finite field with block issue mechanism and application demand issue mechanism according to claim 1 Block catenary system framework, it is characterised in that:Each authentication center includes that a descriptive entry authentication information records pond;If one Item descriptive entry authentication information is not recorded by a block data;Then the descriptive entry authentication information is stranded in descriptive entry Authentication information records in pond, before generating block data to next time, is preferentially recorded in next block.
14. a kind of multicenter finite field with block issue mechanism and application demand issue mechanism according to claim 1 Block catenary system framework, it is characterised in that:The basic database is recorded by the stationary nodes initiation outside the Verification System Access, the access record form descriptive entry authentication information;Stationary nodes outside the Verification System include fixed physical Node or specific dummy node;The fixed physical node includes RFID tag, mobile terminal of specific identification code etc.;The spy Determining dummy node includes specific virtual account.
15. a kind of multicenter finite field with block issue mechanism and application demand issue mechanism according to claim 1 Block catenary system framework, it is characterised in that:Basic database has the verification information of commodity;External fixture reason node or Virtual account verifies the true and false of commodity by access basic database;Verification result forms descriptive entry authentication information.
16. a kind of multicenter finite field with block issue mechanism and application demand issue mechanism according to claim 1 Block catenary system framework, it is characterised in that:The mode for verifying the true and false of commodity is recognizing to the digital identity certificate of external node Card.
17. a kind of multicenter finite field with block issue mechanism and application demand issue mechanism according to claim 1 Block catenary system framework, it is characterised in that:One time one that the certification of the digital identity certificate of external node is authenticated using closed loop Results card;I.e. after closed loop verifying each time, start a new closed loop identifying procedure, a new random number is generated by system The digital certificate new as the external node, a new digital certificate store of generation is in the basic database, together The digital identity certificate of external node described in Shi Gengxin, when the commodity need to verify, i.e., the digital identity of the described external node Certificate needs to verify, and at this moment system fetches the digital certificate of the external node, returns to and carries out certificate in the basic database It compares, after completing a complete one time one card closed loop identifying procedure, system is generated again described in a new random number conduct The new digital certificate of external node, system enter next closed loop identifying procedure, and wait external node records verifying next time Request.
18. a kind of multicenter finite field with block issue mechanism and application demand issue mechanism according to claim 17 Block catenary system framework, it is characterised in that:In the closed loop identifying procedure, the external node is saved or is updated described in preservation Digital certificate saves or updates the cryptographic Hash for saving the digital certificate in the basic database;The number of the external node When word letter of identity needs to verify, after system fetches the digital certificate of the external node and carries out Hash operation, then with it is described Judgement is compared in the certificate cryptographic Hash saved in basic database;New digital certificate not as descriptive entry authentication information to It is outer to be broadcasted;The digital certificate being verified is broadcasted outward as a part of descriptive entry authentication information.
19. a kind of multicenter finite field with block issue mechanism and application demand issue mechanism according to claim 16 Block catenary system framework, it is characterised in that:The mode for verifying the true and false of commodity is a results card;After verifying each time, The cryptographic Hash for generating a new digital certificate is stored in basic database;Basic database reservation had been verified The cryptographic Hash of multiple digital certificates forms the queue of a multielement;Second digital certificate is as descriptive entry in queue Authentication information is broadcasted outward;Earliest digital certificate and the digital certificate being newly generated record certification not as this Descriptive entry authentication information is broadcasted outward.
20. a kind of multicenter finite field with block issue mechanism and application demand issue mechanism according to claim 16 Block catenary system framework, it is characterised in that:The mode of the true and false of commodity or virtual account is verified as one-time pad verifying;It is i.e. each After secondary verifying, the signature key to the commodity sign key encrypted or update virtual account is updated;New key is not as recording Project Authorization information is broadcasted outward;Used key is broadcasted outward as descriptive entry authentication information.
21. according to claim 1, a kind of multicenter with block issue mechanism and application demand issue mechanism described in 14 is limited Domain block catenary system framework, it is characterised in that:In the block, including a block chain type code;The block chain type Code records project category;The project category includes disappear fastly product, durable goods and/or industry code;The disparity items classification The block chain of different function demand is generated, multi-tiling catenary system is formed.
22. a kind of multicenter finite field with block issue mechanism and application demand issue mechanism according to claim 21 Block catenary system framework, it is characterised in that:The content of the block chain of the different function demand as needed can be from a function The block chain of energy carries out turning chain to another block chain.
23. a kind of multicenter finite field with block issue mechanism and application demand issue mechanism according to claim 21 Block catenary system framework, it is characterised in that:The commodity are the product that disappear fastly;The information that commodity are activated is authenticated as descriptive entry to be believed Breath is broadcasted outward.
24. a kind of multicenter finite field with block issue mechanism and application demand issue mechanism according to claim 21 Block catenary system framework, it is characterised in that:The commodity are the product that disappear fastly;The information that it's the shelf-life past commodity is authenticated as descriptive entry Information is broadcasted outward.
25. a kind of multicenter finite field with block issue mechanism and application demand issue mechanism according to claim 21 Block catenary system framework, it is characterised in that:The commodity are the product that disappear fastly;The information that commodity are activated is authenticated as descriptive entry to be believed After breath is broadcasted outward, the basic database of the corresponding authentication center for storing the commodity initial authentication information is buried in oblivion according to rule Or delete or mark the initial authentication data entries of the commodity;Commodity cross the information of shelf-life as descriptive entry authentication information to It is outer broadcasted after, the basic database of the corresponding authentication center for storing the commodity initial authentication information is buried in oblivion or is deleted according to rule Remove or mark the initial authentication data entries of the commodity.
26. a kind of multicenter finite field with block issue mechanism and application demand issue mechanism according to claim 21 Block catenary system framework, it is characterised in that:The commodity are the product that disappear fastly;The corresponding product block chain that disappears fastly writes according in the block chain Record verifying commodity in the time quality guarantee period longest time as time radix, after the extension time coefficient of agreement, as this Disappear the life cycle of product block chain fastly, and the historical data more than the block chain of the life cycle will be automatically left out and bury in oblivion.
27. a kind of multicenter finite field with block issue mechanism and application demand issue mechanism according to claim 21 Block catenary system framework, it is characterised in that:User's information of the commodity can be anonymous or publicly according to the requirement of user It is broadcasted outward as descriptive entry authentication information.
CN201810462760.2A 2017-05-16 2018-05-15 A kind of multicenter finite field block catenary system framework with block issue mechanism and application demand issue mechanism Pending CN108875386A (en)

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
CN201710344383 2017-05-16
CN2017103443838 2017-05-16
CN2017105349474 2017-07-04
CN201710534947 2017-07-04

Publications (1)

Publication Number Publication Date
CN108875386A true CN108875386A (en) 2018-11-23

Family

ID=64333909

Family Applications (12)

Application Number Title Priority Date Filing Date
CN201810462760.2A Pending CN108875386A (en) 2017-05-16 2018-05-15 A kind of multicenter finite field block catenary system framework with block issue mechanism and application demand issue mechanism
CN201810463897.XA Active CN108881167B (en) 2017-05-16 2018-05-15 Intelligent contract of finite field block chain system
CN201810464384.0A Active CN108921692B (en) 2017-05-16 2018-05-15 Multi-chain block chain system with block issuing mechanism
CN201810462740.5A Active CN108881163B (en) 2017-05-16 2018-05-15 Multi-center block chain system with block issuing mechanism
CN201810462747.7A Active CN108876364B (en) 2017-05-16 2018-05-15 Block chain system with annihilation mechanism
CN201810463335.5A Active CN108881166B (en) 2017-05-16 2018-05-15 Virtual account block chain verification system with external fixed physical node
CN201810462739.2A Active CN108874890B (en) 2017-05-16 2018-05-15 Block chain system with public bibliographic mechanism
CN202110237010.7A Pending CN113037738A (en) 2017-05-16 2018-05-15 Virtual account block chain verification system with external fixed physical node
CN202110235074.3A Pending CN112929383A (en) 2017-05-16 2018-05-15 Multi-center authentication system with block issuing mechanism
CN201810464400.6A Active CN108876399B (en) 2017-05-16 2018-05-15 Finite field block chain system with closed-loop authentication system
CN201810463885.7A Active CN108876365B (en) 2017-05-16 2018-05-15 Intelligent contract for generating block release mechanism
CN201810462757.0A Active CN108881165B (en) 2017-05-16 2018-05-15 Multi-center authentication system with block issuing mechanism

Family Applications After (11)

Application Number Title Priority Date Filing Date
CN201810463897.XA Active CN108881167B (en) 2017-05-16 2018-05-15 Intelligent contract of finite field block chain system
CN201810464384.0A Active CN108921692B (en) 2017-05-16 2018-05-15 Multi-chain block chain system with block issuing mechanism
CN201810462740.5A Active CN108881163B (en) 2017-05-16 2018-05-15 Multi-center block chain system with block issuing mechanism
CN201810462747.7A Active CN108876364B (en) 2017-05-16 2018-05-15 Block chain system with annihilation mechanism
CN201810463335.5A Active CN108881166B (en) 2017-05-16 2018-05-15 Virtual account block chain verification system with external fixed physical node
CN201810462739.2A Active CN108874890B (en) 2017-05-16 2018-05-15 Block chain system with public bibliographic mechanism
CN202110237010.7A Pending CN113037738A (en) 2017-05-16 2018-05-15 Virtual account block chain verification system with external fixed physical node
CN202110235074.3A Pending CN112929383A (en) 2017-05-16 2018-05-15 Multi-center authentication system with block issuing mechanism
CN201810464400.6A Active CN108876399B (en) 2017-05-16 2018-05-15 Finite field block chain system with closed-loop authentication system
CN201810463885.7A Active CN108876365B (en) 2017-05-16 2018-05-15 Intelligent contract for generating block release mechanism
CN201810462757.0A Active CN108881165B (en) 2017-05-16 2018-05-15 Multi-center authentication system with block issuing mechanism

Country Status (1)

Country Link
CN (12) CN108875386A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110597911A (en) * 2019-09-12 2019-12-20 腾讯科技(深圳)有限公司 Certificate processing method and device for block chain network, electronic equipment and storage medium
CN113162889A (en) * 2020-01-22 2021-07-23 北京车和家信息技术有限公司 Authentication method and device for route updating information

Families Citing this family (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109583896A (en) * 2018-11-30 2019-04-05 元灵通智能科技(深圳)有限公司 Transaction verification method, block chain node and storage medium
CN109726201B (en) * 2018-12-12 2020-05-05 杭州基尔区块链科技有限公司 Chip research and development transaction data storage method and system based on intelligent contract
CN109831483A (en) * 2018-12-28 2019-05-31 山东康威通信技术股份有限公司 Distributed block chain control system and method applied to the underground space
CN109656177A (en) * 2018-12-28 2019-04-19 成都易慧家科技有限公司 A kind of intelligent door and window communication system
CN109885258B (en) * 2019-02-01 2023-02-21 立旃(上海)科技有限公司 Data deleting device and method based on block chain
CN110062041B (en) * 2019-04-12 2023-04-07 深圳前海微众银行股份有限公司 Method and device for changing IOT (input/output) equipment based on block chain
CN111931245A (en) * 2019-05-13 2020-11-13 阿里巴巴集团控股有限公司 Information processing method and device
CN110135194B (en) * 2019-05-20 2020-10-30 北京邮电大学 Block chain-based industrial internet digital object management method
CN110535967B (en) * 2019-09-06 2022-08-23 江苏物联网研究发展中心 Vehicle transportation data judgment system
CN110780847B (en) * 2019-10-15 2022-02-25 腾讯科技(深圳)有限公司 Random number generation method, random number generation device and electronic equipment
CN112115116B (en) * 2020-08-05 2024-04-16 西安电子科技大学 Construction method of high-performance tamper-proof database based on blockchain
CN113516487B (en) * 2021-05-19 2022-10-14 广西科技大学 Agricultural product traceability system based on block chain
CN115695055B (en) * 2023-01-05 2023-03-14 中国电子科技集团公司第三十研究所 High-reliability high-concurrency security authentication system and method based on memory database
CN117709947B (en) * 2024-02-05 2024-04-19 广东通莞科技股份有限公司 POS machine settlement authority management method based on blockchain

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160358253A1 (en) * 2015-06-05 2016-12-08 DiQi, Inc Electronic currency management method and electronic currency system
CN106504091A (en) * 2016-10-27 2017-03-15 上海亿账通区块链科技有限公司 The method and device that concludes the business on block chain
CN106534160A (en) * 2016-12-02 2017-03-22 江苏通付盾科技有限公司 Identity authentication method and system based on block chain

Family Cites Families (49)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CA2291430A1 (en) * 1999-01-28 2000-07-28 Tao Lu Internet transaction security system
US8582777B2 (en) * 2006-05-03 2013-11-12 Samsung Electronics Co., Ltd. Method and system for lightweight key distribution in a wireless network
CN101535845B (en) * 2006-09-08 2014-07-09 塞尔蒂卡姆公司 Authenticated radio frequency identification and key distribution system therefor
CN103971250B (en) * 2014-04-09 2017-04-05 四川谦泰仁投资管理有限公司 A kind of one time one card anti-fake traceability system based on mobile terminal and RFID
US20160098730A1 (en) * 2014-10-01 2016-04-07 The Filing Cabinet, LLC System and Method for Block-Chain Verification of Goods
CN104392354B (en) * 2014-11-05 2017-10-03 中国科学院合肥物质科学研究院 A kind of public key address is associated and search method and its system with user account
CN105844472A (en) * 2015-01-13 2016-08-10 四川谦泰仁投资管理有限公司 RFID merchandise anti-counterfeiting tracing system compatible with two-dimensional code counterfeiting prevention
WO2017027484A1 (en) * 2015-08-09 2017-02-16 Ramasamy Celambarasan System and method for microshare based content funding and distribution
US10402792B2 (en) * 2015-08-13 2019-09-03 The Toronto-Dominion Bank Systems and method for tracking enterprise events using hybrid public-private blockchain ledgers
US10504178B2 (en) * 2015-11-04 2019-12-10 Chicago Mercantile Exchange Inc. System for physically delivering virtual currencies
US20170132626A1 (en) * 2015-11-05 2017-05-11 Mastercard International Incorporated Method and system for processing of a blockchain transaction in a transaction processing network
CN105488675B (en) * 2015-11-25 2019-12-24 布比(北京)网络技术有限公司 Block chain distributed shared general ledger construction method
CN105719172A (en) * 2016-01-19 2016-06-29 布比(北京)网络技术有限公司 Information issuing method and device
CN112950381A (en) * 2016-01-24 2021-06-11 杭州复杂美科技有限公司 Block chain matching exchange
CN105610578B (en) * 2016-01-25 2019-05-03 杭州复杂美科技有限公司 Block chain information deposits card and method for secret protection
CN105809062B (en) * 2016-03-01 2019-01-25 布比(北京)网络技术有限公司 A kind of building of contract executes method and device
CN105893042A (en) * 2016-03-31 2016-08-24 北京航空航天大学 Intelligent contract implementation method based on block chain
CN105912618B (en) * 2016-04-07 2019-04-23 浙江万马新能源有限公司 The charging pile charging transaction means of communication and device based on block chain
CN105956923B (en) * 2016-04-20 2022-04-29 上海如鸽投资有限公司 Asset transaction system and digital authentication and transaction method of assets
KR101701131B1 (en) * 2016-04-28 2017-02-13 주식회사 라피 Data recording and validation methods and systems using the connecting of blockchain between different type
CN105976231A (en) * 2016-06-24 2016-09-28 深圳前海微众银行股份有限公司 Asset management method based on intelligent block chain contracts and nodes
CN106209877A (en) * 2016-07-19 2016-12-07 井创(北京)科技有限公司 A kind of be certification core with block chain backstage false-proof authentication system
CN106339880A (en) * 2016-08-23 2017-01-18 白大文 Product production method and system for users to trace and examine filling process easily
CN106339939B (en) * 2016-08-26 2020-05-15 南京喜玛拉云信息技术有限公司 Non-tamper-able distributed bill system based on secure hardware and transaction processing method
CN106385315B (en) * 2016-08-30 2019-05-17 北京三未信安科技发展有限公司 A kind of digital certificate management method and system
CN106375317A (en) * 2016-08-31 2017-02-01 北京明朝万达科技股份有限公司 Block chain-based big data security authentication method and system
CN106384236B (en) * 2016-08-31 2019-07-16 江苏通付盾科技有限公司 Based on the ca authentication management method of block chain, apparatus and system
CN106503574B (en) * 2016-09-13 2019-11-05 中国电子科技集团公司第三十二研究所 Block chain safe storage method
CN106372533B (en) * 2016-09-14 2020-04-21 中国银联股份有限公司 Content storage method based on block chain technology
US10157295B2 (en) * 2016-10-07 2018-12-18 Acronis International Gmbh System and method for file authenticity certification using blockchain network
CN106548091A (en) * 2016-10-14 2017-03-29 北京爱接力科技发展有限公司 A kind of data deposit card, the method and device of checking
CN106534097B (en) * 2016-10-27 2018-05-18 上海亿账通区块链科技有限公司 Permission method of control and system based on the transaction of block chain
CN106570710A (en) * 2016-10-27 2017-04-19 纸飞机(北京)科技有限公司 Commodity anti-counterfeiting method and device
CN106528775B (en) * 2016-10-28 2020-01-03 济南大学 Private block chain operation support system supporting logic multi-chain and working method thereof
CN106447309A (en) * 2016-11-13 2017-02-22 杭州复杂美科技有限公司 Across-chain transaction of source chain and lateral chain
CN106453636A (en) * 2016-11-22 2017-02-22 深圳银链科技有限公司 Credible block generation method and system
CN106559211B (en) * 2016-11-22 2019-12-13 中国电子科技集团公司第三十研究所 Privacy protection intelligent contract method in block chain
CN106453407B (en) * 2016-11-23 2019-10-15 江苏通付盾科技有限公司 Identity authentication method based on block chain, authentication server and user terminal
CN106651303B (en) * 2016-12-02 2020-05-26 北京轻信科技有限公司 Intelligent contract processing method and system based on template
CN106600252A (en) * 2016-12-15 2017-04-26 咪咕文化科技有限公司 Payment method and payment system based on block chain
CN106530088B (en) * 2016-12-19 2023-11-17 杜伯仁 Method for trading certificate products based on blockchain security nodes
CN106656509B (en) * 2016-12-29 2019-11-29 深圳市检验检疫科学研究院 A kind of RFID alliance chain collaboration authentication method for the monitoring of defeated port food
CN106651332B (en) * 2016-12-29 2020-11-06 成都质数斯达克科技有限公司 Method for generating new block in block chain and block chain
CN106656798B (en) * 2016-12-30 2020-03-27 质数链网科技成都有限公司 Method for calculating decision path and distributed node
CN107122477A (en) * 2017-05-02 2017-09-01 成都中远信电子科技有限公司 A kind of block chain storage system
CN107273760A (en) * 2017-06-09 2017-10-20 济南浪潮高新科技投资发展有限公司 One kind is based on many CA application authentication methods of block chain
CN107358438A (en) * 2017-06-27 2017-11-17 上海霸贤网络科技有限公司 Supply chain dynamic multicenter collaboration authentication model and its implementation based on block chain
CN107249009B (en) * 2017-08-02 2020-02-21 广东工业大学 Data verification method and system based on block chain
CN107995197A (en) * 2017-12-04 2018-05-04 中国电子科技集团公司第三十研究所 A kind of method for realizing across management domain identity and authority information is shared

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160358253A1 (en) * 2015-06-05 2016-12-08 DiQi, Inc Electronic currency management method and electronic currency system
CN106504091A (en) * 2016-10-27 2017-03-15 上海亿账通区块链科技有限公司 The method and device that concludes the business on block chain
CN106534160A (en) * 2016-12-02 2017-03-22 江苏通付盾科技有限公司 Identity authentication method and system based on block chain

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110597911A (en) * 2019-09-12 2019-12-20 腾讯科技(深圳)有限公司 Certificate processing method and device for block chain network, electronic equipment and storage medium
CN113162889A (en) * 2020-01-22 2021-07-23 北京车和家信息技术有限公司 Authentication method and device for route updating information

Also Published As

Publication number Publication date
CN108874890B (en) 2020-10-23
CN108881166B (en) 2021-03-26
CN108876365B (en) 2023-08-29
CN108876364B (en) 2021-11-09
CN108876399A (en) 2018-11-23
CN108921692B (en) 2022-01-18
CN108881165A (en) 2018-11-23
CN108881163A (en) 2018-11-23
CN108881165B (en) 2021-03-26
CN113037738A (en) 2021-06-25
CN108876365A (en) 2018-11-23
CN108921692A (en) 2018-11-30
CN108881167B (en) 2021-06-22
CN108881163B (en) 2021-05-14
CN108881166A (en) 2018-11-23
CN108876364A (en) 2018-11-23
CN112929383A (en) 2021-06-08
CN108874890A (en) 2018-11-23
CN108881167A (en) 2018-11-23
CN108876399B (en) 2022-04-29

Similar Documents

Publication Publication Date Title
CN108875386A (en) A kind of multicenter finite field block catenary system framework with block issue mechanism and application demand issue mechanism
CN108985100B (en) Block chain-based element security certification method, device, equipment and medium
CN105975868A (en) Block chain-based evidence preservation method and apparatus
TW548592B (en) System and method for single login of application program
CN104919775B (en) The system and method synchronous for key chain
CN108696358B (en) Digital certificate management method and device, readable storage medium and service terminal
CN107360001A (en) A kind of digital certificate management method, device and system
CN108960825A (en) Electric endorsement method and device, electronic equipment based on block chain
CN108111314A (en) The generation of digital certificate and method of calibration and equipment
US20160241532A1 (en) Authentication of web content
CN106664208A (en) System and method for establishing trust using secure transmission protocols
CN110383752A (en) Compact recording agreement
WO2016128569A1 (en) Digital identity system
CN109768983A (en) Dynamic and Multi dimensional personal identification method, apparatus and system based on block chain
JP5038807B2 (en) Verification apparatus and program
CN111369730B (en) Voting processing method and device based on block chain
CN108140152A (en) Computer implemented tracking mechanism and data management
US11663595B1 (en) Blockchain transactional identity verification
CN110417790A (en) Block chain system of real name queuing system and method
WO2020000777A1 (en) Method and apparatus for acquiring individual credit information on the basis of block chain, and computer device
CN109034987A (en) A kind of tax administration method and system based on block chain
KR102014647B1 (en) Electronic voting method based on blockchain
CN108769033A (en) Punch card system based on block chain and facility information processing method of checking card
CN108540447A (en) A kind of certification authentication method and system based on block chain
Ghafourian et al. Combining blockchain and biometrics: A survey on technical aspects and a first legal analysis

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20181123