CN108876364A - A kind of band buries in oblivion the block catenary system of mechanism - Google Patents

A kind of band buries in oblivion the block catenary system of mechanism Download PDF

Info

Publication number
CN108876364A
CN108876364A CN201810462747.7A CN201810462747A CN108876364A CN 108876364 A CN108876364 A CN 108876364A CN 201810462747 A CN201810462747 A CN 201810462747A CN 108876364 A CN108876364 A CN 108876364A
Authority
CN
China
Prior art keywords
block
commodity
information
block chain
life
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810462747.7A
Other languages
Chinese (zh)
Other versions
CN108876364B (en
Inventor
江峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Publication of CN108876364A publication Critical patent/CN108876364A/en
Application granted granted Critical
Publication of CN108876364B publication Critical patent/CN108876364B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
    • G06K17/0022Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device
    • G06K17/0029Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device the arrangement being specially adapted for wireless interrogation of grouped or bundled articles tagged with wireless record carriers
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Business, Economics & Management (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Marketing (AREA)
  • Finance (AREA)
  • Economics (AREA)
  • Strategic Management (AREA)
  • Development Economics (AREA)
  • General Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Computer And Data Communications (AREA)

Abstract

The invention discloses the block catenary systems that a kind of band buries in oblivion mechanism, mainly include n block chain.Every block chain has unique block chain type sequence number.It mainly include m authentication center in every block chain.Each authentication center reads data from basic database.The event information of recording is commodity essential information.The commodity essential information mainly includes date of manufacture, manufacturer, quality inspection verification of conformity, product specification and safe-use period.Each authentication center verifies the commodity RFID tag that external node uploads using basic database, and verification information is fed back into the multichain block catenary system that the external node present invention constructs and is classified to data, the master data of one block chain storage class I goods, while saving resource, the efficiency of information extraction is also improved.Meanwhile the block issue mechanism of multichain block catenary system can guarantee data correctness and can not tamper.

Description

A kind of band buries in oblivion the block catenary system of mechanism
Technical field
The present invention relates to data authentication field, specifically a kind of band buries in oblivion the block catenary system of mechanism.
Background technique
With the development of mobile communication technology, special mobile Internet and the infiltration of Internet of Things forward direction people's lives field, There is the demand of various authentication services Internet-based.Such as commodity true and false certification, Transaction Information, collectibles information, virtual Account information, virtual assets, individual/enterprise identity information, reference information, justice information etc..
In the prior art, the server for needing to build an access internet, then accesses server by external node, To inquire above- mentioned information.
However, breaking through system server by hacker's means is the thing being difficult to avoid that.Hacker stores often through rewriting In the information in server, reach illegal objective.Therefore, existing Verification System Internet-based needs to be improved.
Summary of the invention
Present invention aim to address problems of the prior art.
To realize the present invention purpose and the technical solution adopted is that such, a kind of band buries in oblivion the block catenary system of mechanism, It mainly include K block chain.Every block chain has unique block chain type sequence number.It mainly include m in every block chain A authentication center.The block chain type sequence number is mainly made of sequence number subregion I and sequence number subregion II.Sequence number subregion I is industry code, and sequence number subregion II is disappear fastly product code or durable goods code.The authentication center is primary server.M institute It is identical to state authentication center's permission.
The affiliated merchandise classification of storing data is determined by the block chain type sequence number in every block chain.
Any central node reads data from basic database.The basic database is to bury in oblivion mechanism with band The server with data storage function of block catenary system progress data interaction.The basic database mainly stores and records thing Part information.
The event information of recording is commodity essential information.The commodity essential information mainly includes date of manufacture, production Quotient, quality inspection verification of conformity, product specification and safe-use period.
Each authentication center verifies the commodity RFID tag that external node uploads using basic database, and will test Card information feeds back to external node.The external node is the intelligence for connecting multicenter Verification System and having radio frequency recognition function Terminal.
The key step that the basic database verifies commodity RFID tag is as follows:
1) the block release cycle T of the multicenter Verification System with block issue mechanism is set.
2) in block release cycle T, external node is scanned the RFID tag of commodity to be measured, obtains commodity digital body Part authentication information.
External node passes to commodity digital authentication information in multichain block catenary system, and with the block chain type Sequence number is matched, and block chain P belonging to the commodity RFID tag is found.The block chain P generates merchandise classification to be measured Information.The merchandise classification information to be measured mainly includes the affiliated trade information of commodity and the category information/durable goods category information that disappears fastly.
3) in the block chain P, select any n authentication center for block publisher node in a random way.Remaining M-n authentication center is non-block publisher node.
4) commodity digital authentication information and merchandise classification information to be measured are transferred to the area by multichain block catenary system Block publisher node.
If commodity to be measured are the product that disappear fastly, the block data further includes that commodity cross shelf-life information or do not cross shelf-life letter Breath.
Judge that the step of whether commodity spend the shelf-life is mainly as follows:
A) time that external node uploads commodity digital authentication information is broadcast to and each recognizes by multichain block catenary system Card center.
B) each authentication center finds in basic database corresponding with commodity digital authentication information records event Information, and commodity shelf-life and commodity production date in event information are recorded described in reading.
Each authentication center uploads commodity number to the commodity shelf-life, the commodity production date and the external node The time of word authentication information is handled, i.e., the time that the described external node uploads commodity digital authentication information subtracts The commodity production date, obtain life-span of goods.Each authentication center carries out the life-span of goods and the commodity shelf-life Multilevel iudge.
If the life-span of goods is greater than or equal to the commodity shelf-life, it's the shelf-life past commodity to be measured.Authentication center will Commodity are crossed shelf-life information and are broadcast in multichain block catenary system.Authentication center will record event information and connect in basic database The block data received is buried in oblivion.
When the commodity are to disappear product fastly, the information conduct that commodity are activated records event authentication information and buries in oblivion mechanism in band Block catenary system in broadcast after, the basic database is buried in oblivion according to rule or that deletes or mark the commodity records event Information;Commodity cross the information of shelf-life as recording after event authentication information broadcasts in the block catenary system that band buries in oblivion mechanism, The basic database is buried in oblivion according to rule or that deletes or mark the commodity records event information.
If the life-span of goods is less than the commodity shelf-life, commodity to be measured do not spend the shelf-life.Authentication center is by commodity It does not cross in shelf-life information broadcast multichain block catenary system.
C) according to verification rule, multichain block catenary system judges whether commodity spend the shelf-life, and commodity digital identity is recognized Card information and commodity cross shelf-life information or commodity, and shelf-life information excessively passes to the block publisher node.
5) the block publisher node handles the commodity digital authentication information, in the basic database In find that the commodity digital authentication information is corresponding to record event information.The block publisher node is according in the t time Record event information generate block data.
The block data mainly include it is described record event information, commodity to be measured are activated information and merchandise classification to be measured Information.
The block publisher node broadcasts the block data in the block chain P.
6) m-n non-block publisher nodes receive the block data of broadcast.
7) m authentication center judge respectively in the block data record event information whether in basic database It is consistent to record event information, and by judging result broadcast in multichain block catenary system.M authentication center is respectively by the block Commodity in data enable in the basic database that information is stored in.
8) multichain block catenary system obtains final judging result according to the verification rule of setting.The verification rule is Majority principle.
If final judging result is recording in event information and authentication center's basic database in the block data It is inconsistent to record event information, then return step 3, reselect block publisher node, until final judging result is the area Block number in record event information in authentication center's basic database to record event information consistent.
If final judging result is recording in event information and authentication center's basic database in the block data It is consistent to record event information, then the block data is fed back to the external node by multichain block catenary system.In each certification The heart buries in oblivion the block data received.
9) external node obtains the essential information of commodity to be measured.
The solution have the advantages that unquestionable.The multichain block catenary system that the present invention constructs divides data The master data of class, a block chain storage class I goods also improves the efficiency of information extraction while saving resource. Meanwhile the block issue mechanism of multichain block catenary system can guarantee data correctness and can not tamper.Present invention building The completely new mutual assistance system architecture with block issue mechanism based on " All for one and one for all ", with " all for one, I is Everybody " collaborative replace digging mine mechanism and proof of work mechanism in traditional block chain.To construct a kind of completely new area The issuing function of block issue mechanism and multicenter distributed authentication system framework, these centers is different.Present invention could apply to Distributed computing system highly fault tolerant makes it possible to mix consistency.The present invention is in the application scenarios of non-virtual currency, such as body Part certification, the key areas such as note issuance with sovereign right are with a wide range of applications.
Detailed description of the invention
Fig. 1 is authentication center's structure chart;
Fig. 2 is data Stored Procedure figure.
Specific embodiment
Below with reference to embodiment, the invention will be further described, but should not be construed the above-mentioned subject area of the present invention only It is limited to following embodiments.Without departing from the idea case in the present invention described above, according to ordinary skill knowledge and used With means, various replacements and change are made, should all include within the scope of the present invention.
Embodiment 1:
Referring to Fig. 1 and Fig. 2, a kind of band buries in oblivion the block catenary system of mechanism, mainly includes K block chain.Every block chain With unique block chain type sequence number.It mainly include m authentication center in every block chain.The block chain type sequence It number is mainly made of sequence number subregion I and sequence number subregion II.Sequence number subregion I is industry code, and sequence number subregion II is fast Disappear product code or durable goods code.The product code that disappears fastly is 1, and durable goods code is 0.The industry code is the English of industry, such as The code of the communications industry is communication, and the code of medical industries is iatrology, and the code of Information technology industry is information technology.One industry has two block chains, and a storage line disappears in the industry product information fastly, and another is deposited Store up durable goods information in industry.
As shown in Figure 1, common user area is the external network connected into block chain, external network can be computer or movement Terminal.There is m authentication center, each authentication center all can serve as publisher node, to entire block catenary system in block chain Release information.
The authentication center is primary server.M authentication center's permissions are identical.
Further, the number of every block Lian Zhong authentication center may be the same or different, and authentication center's quantity is main Merchandise classification, quantity in economic specific gravity and industry is accounted for by affiliated industry to determine.
The affiliated merchandise classification of storing data is determined by the block chain type sequence number in every block chain.
For example, the block chain type sequence number is information technology0, then corresponding block chain is deposited Store up the essential information of resistance to goods for use in Information technology industry.
Any central node reads data from basic database.The basic database is to bury in oblivion mechanism with band The server with data storage function of block catenary system progress data interaction.The basic database mainly stores and records thing Part information.
The event information of recording is commodity essential information.If commodity are the product that disappear fastly, the commodity essential information is main Including date of manufacture, manufacturer, quality inspection verification of conformity, product specification and safe-use period, i.e. shelf-life.If commodity are resistance to Articles, then the commodity essential information mainly includes date of manufacture, manufacturer, quality inspection verification of conformity and product specification.
Each authentication center verifies the commodity RFID tag that external node uploads using basic database, and will test Card information feeds back to external node.The external node is the intelligence for connecting multicenter Verification System and having radio frequency recognition function Terminal.
The key step that the basic database verifies commodity RFID tag is as follows:
1) the block release cycle T of the multicenter Verification System with block issue mechanism is set.
2) in block release cycle T, external node is scanned the RFID tag of commodity to be measured, obtains commodity digital body Part authentication information.
External node passes to commodity digital authentication information in multichain block catenary system, and with the block chain type Sequence number is matched, and block chain P belonging to the commodity RFID tag is found.The block chain P generates merchandise classification to be measured Information.The merchandise classification information to be measured mainly includes the affiliated trade information of commodity and the category information/durable goods category information that disappears fastly.
3) in the block chain P, select any n authentication center for block publisher node in a random way.Remaining M-n authentication center is non-block publisher node.
4) commodity digital authentication information and merchandise classification information to be measured are transferred to the area by multichain block catenary system Block publisher node.
If commodity to be measured are the product that disappear fastly, the block data further includes that commodity cross shelf-life information or do not cross shelf-life letter Breath.
Judge that the step of whether commodity spend the shelf-life is mainly as follows:
A) time that external node uploads commodity digital authentication information is broadcast to and each recognizes by multichain block catenary system Card center.
B) each authentication center finds in basic database corresponding with commodity digital authentication information records event Information, and commodity shelf-life and commodity production date in event information are recorded described in reading.
Each authentication center uploads commodity number to the commodity shelf-life, the commodity production date and the external node The time of word authentication information is handled, i.e., the time that the described external node uploads commodity digital authentication information subtracts The commodity production date, obtain life-span of goods.Each authentication center carries out the life-span of goods and the commodity shelf-life Multilevel iudge.
If the life-span of goods is greater than or equal to the commodity shelf-life, it's the shelf-life past commodity to be measured.Authentication center will Commodity are crossed shelf-life information and are broadcast in multichain block catenary system.Authentication center will record event information and reception in database To the block data bury in oblivion.When the commodity are to disappear product fastly, the information that commodity are activated is believed as event authentication is recorded After breath is broadcasted in the block catenary system that band buries in oblivion mechanism, the basic database is according to being buried in oblivion rule or deletes or marks Commodity record event information;Commodity cross the information of shelf-life as the block chain for recording event authentication information in band and burying in oblivion mechanism After broadcasting in system, the basic database is buried in oblivion according to rule or that deletes or mark the commodity records event information.
If the life-span of goods is less than the commodity shelf-life, it's the shelf-life past commodity to be measured.Authentication center by commodity not It crosses in shelf-life information broadcast multichain block catenary system.
C) according to verification rule, multichain block catenary system judges whether commodity spend the shelf-life, and commodity digital identity is recognized Card information and commodity cross shelf-life information or commodity, and shelf-life information excessively passes to the block publisher node.
5) the block publisher node handles the commodity digital authentication information, in the basic database In find that the commodity digital authentication information is corresponding to record event information.The block publisher node is according in the t time Record event information generate block data.The t time can be a block release cycle T, when being also possible to other of setting Between the period.Time t is mainly determined by the formation speed for recording event authentication information with how many.
The block data mainly include it is described record event information, commodity to be measured are activated information and merchandise classification to be measured Information.
The block publisher node broadcasts the block data in the block chain P.
6) m-n non-block publisher nodes receive the block data of broadcast.
7) m authentication center judge respectively in the block data record event information whether in basic database It is consistent to record event information, and by judging result broadcast in multichain block catenary system.M authentication center is respectively by the block Commodity in data enable in the basic database that information is stored in.
8) multichain block catenary system obtains final judging result according to the verification rule of setting.The verification rule is Majority principle.
If final judging result is recording in event information and authentication center's basic database in the block data It is inconsistent to record event information, then return step 3, reselect block publisher node, until final judging result is the area Block number in record event information in authentication center's basic database to record event information consistent.
If final judging result is recording in event information and authentication center's basic database in the block data It is consistent to record event information, then the block data is fed back to the external node by multichain block catenary system.In each certification The block data that the heart receives basic database is buried in oblivion.
9) external node obtains the essential information of commodity to be measured.
The small amount payment chain in disappear fastly product chain and financial currency in anti-fake certificate, all includes mass data.Disappear fastly The longest shelf-life of commodity adds an extender as the life cycle for the product chain that disappears fastly using in chain in product chain, more than this period Block chain is annihilated.Small amount payment chain also sets similar life cycle, such as 3 years life cycles.
Embodiment 2:
This implementation constructs the block catenary system that a kind of band buries in oblivion mechanism, mainly includes 22 block chains.Every block chain tool There is unique block chain type sequence number.It wherein mainly include 17 authentication centers, the 8-15 articles block in the 1-7 articles block chain Mainly include 9 authentication centers in chain, mainly includes 39 authentication centers in the 16-22 articles block chain.
The block chain type sequence number is mainly made of sequence number subregion I and sequence number subregion II.Sequence number subregion I is Industry code, sequence number subregion II are disappear fastly product code or durable goods code.The product code that disappears fastly is 1, and durable goods code is 0.Institute The English that industry code is industry is stated, if the code of the communications industry is communication, the code of medical industries is Iatrology, the code of Information technology industry are information technology.One industry has two block chains, and one Storage line disappears in the industry product information fastly, another storage line durable goods information in the industry.
The authentication center is primary server.Authentication center's permission in every block chain is identical.Different blocks interchain The permission of authentication center may be the same or different.
The affiliated merchandise classification of storing data is determined by the block chain type sequence number in every block chain.
Each authentication center has basic database.The basic database mainly stores and records event information.
The event information of recording is commodity essential information.If commodity are the product that disappear fastly, the commodity essential information is main Including date of manufacture, manufacturer, quality inspection verification of conformity, product specification and safe-use period, i.e. shelf-life.If commodity are resistance to Articles, then the commodity essential information mainly includes date of manufacture, manufacturer, quality inspection verification of conformity and product specification.
Each authentication center verifies the commodity RFID tag that external node uploads using basic database, and will test Card information feeds back to external node.The external node is the intelligence for connecting multicenter Verification System and having radio frequency recognition function Terminal.
The key step that the basic database verifies commodity RFID tag is as follows:
1) the block release cycle T of the multicenter Verification System with block issue mechanism is set.
2) in block release cycle T, external node is scanned the RFID tag of commodity to be measured, obtains commodity digital body Part authentication information.Commodity to be measured are flower cake in the present embodiment.
External node passes to commodity digital authentication information in multichain block catenary system, and with the block chain type Sequence number is matched, and block chain P belonging to the commodity RFID tag is found.Matching obtained block chain type sequence number is food1.The block chain P stores the based food essential information that disappears fastly.The block chain P is the 18th article of block chain, there is 39 certifications Center.
The block chain P generates merchandise classification information to be measured.The merchandise classification information to be measured mainly includes commodity to be measured Belong to food service industry and commodity to be measured are the product that disappear fastly.
3) in the block chain P, select any one authentication center for block publisher node in a random way.Remaining 38 authentication centers are non-block publisher node.
4) commodity digital authentication information and merchandise classification information to be measured are transferred to the area by multichain block catenary system Block publisher node.
Since commodity to be measured are the product that disappear fastly, the block data further includes that commodity cross shelf-life information or do not cross shelf-life letter Breath.
Judge that the step of whether commodity to be measured spend the shelf-life is mainly as follows:
A) time that external node uploads commodity digital authentication information is broadcast to and each recognizes by multichain block catenary system Card center.External node uploads the time of commodity digital authentication information as 20 days 14 March in 2019 in the present embodiment:30: 05:020。
B) each authentication center finds in basic database corresponding with commodity digital authentication information records event Information, and commodity shelf-life and commodity production date in event information are recorded described in reading.The guarantor of flower cake in the present embodiment The matter phase is 45 days, and the date of manufacture is on 2 20th, 2019.
Each authentication center uploads commodity number to the commodity shelf-life, the commodity production date and the external node The time of word authentication information is handled, i.e., the time that the described external node uploads commodity digital authentication information subtracts The commodity production date, obtain life-span of goods.Each authentication center carries out the life-span of goods and the commodity shelf-life Multilevel iudge.In the present embodiment, the life-span of goods is 30 days, is less than the commodity shelf-life, then commodity to be measured are not crossed and guaranteed the quality Phase.Each authentication center is not crossed commodity in shelf-life information broadcast multichain block catenary system, and commodity are not crossed to shelf-life letter Breath is stored in the recording in event information of basic database.
C) according to verification rule, i.e., according to majority principle, judge whether 39 commodity cross the message of shelf-life, it is more Chain block catenary system finally judges that commodity do not spend the shelf-life, and commodity digital authentication information and commodity are not crossed to shelf-life letter Breath passes to the block publisher node.The block publisher node is according to commodity digital authentication information, by the non-mistake of commodity Shelf-life information preservation is recorded in event information corresponding.
At this point, the event information of recording mainly includes date of manufacture, manufacturer, quality inspection verification of conformity, product rule Lattice, safe-use period, i.e. shelf-life and commodity do not cross guarantee period information.
5) the block publisher node generates block data.
The block data mainly include it is described record event information, commodity to be measured are activated information and merchandise classification to be measured Information.
The block publisher node broadcasts the block data in the block chain P.
6) described 38 non-block publisher nodes receive the block data of broadcast.
7) 39 authentication centers judge respectively in the block data record event information whether in basic database To record event information consistent, and by judging result broadcast in multichain block catenary system.39 authentication centers respectively will be described Commodity in block data enable in the basic database that information is stored in.
8) multichain block catenary system obtains final judging result according to the verification rule of setting.The verification rule is Majority principle.Wherein, 33 authentication centers judge to record event information and authentication center's basic data in the block data Event information is consistent for recording in library, and 6 authentication centers judge to record event information and authentication center in the block data Event information is inconsistent for recording in basic database, therefore final judging result is to record event letter in the block data Event information is consistent, and multichain block catenary system feeds back to the block data with recording in authentication center's basic database for breath The external node.
9) external node obtains the essential information of commodity to be measured.
Embodiment 3:
This implementation constructs the block catenary system that a kind of band buries in oblivion mechanism, mainly includes 22 block chains.Every block chain tool There is unique block chain type sequence number.It wherein mainly include 17 authentication centers, the 8-15 articles block in the 1-7 articles block chain Mainly include 9 authentication centers in chain, mainly includes 39 authentication centers in the 16-22 articles block chain.
The block chain type sequence number is mainly made of sequence number subregion I and sequence number subregion II.Sequence number subregion I is Industry code, sequence number subregion II are disappear fastly product code or durable goods code.The product code that disappears fastly is 1, and durable goods code is 0.Institute The English that industry code is industry is stated, if the code of the communications industry is communication, the code of medical industries is Iatrology, the code of Information technology industry are information technology.One industry has two block chains, and one Storage line disappears in the industry product information fastly, another storage line durable goods information in the industry.
The authentication center is primary server.Authentication center's permission in every block chain is identical.Different blocks interchain The permission of authentication center may be the same or different.
The affiliated merchandise classification of storing data is determined by the block chain type sequence number in every block chain.
Each authentication center has basic database.The basic database mainly stores and records event information.
The event information of recording is commodity essential information.If commodity are the product that disappear fastly, the commodity essential information is main Including date of manufacture, manufacturer, quality inspection verification of conformity, product specification and safe-use period, i.e. shelf-life.If commodity are resistance to Articles, then the commodity essential information mainly includes date of manufacture, manufacturer, quality inspection verification of conformity and product specification.
Each authentication center verifies the commodity RFID tag that external node uploads using basic database, and will test Card information feeds back to external node.The external node is the intelligence for connecting multicenter Verification System and having radio frequency recognition function Terminal.
The key step that the basic database verifies commodity RFID tag is as follows:
1) the block release cycle T of the multicenter Verification System with block issue mechanism is set.
2) in block release cycle T, external node is scanned the RFID tag of commodity to be measured, obtains commodity digital body Part authentication information.Commodity to be measured are flower cake in the present embodiment.
External node passes to commodity digital authentication information in multichain block catenary system, and with the block chain type Sequence number is matched, and block chain P belonging to the commodity RFID tag is found.Matching obtained block chain type sequence number is food1.The block chain P stores the based food essential information that disappears fastly.The block chain P is the 18th article of block chain, there is 39 certifications Center.
The block chain P generates merchandise classification information to be measured.The merchandise classification information to be measured mainly includes commodity to be measured Belong to food service industry and commodity to be measured are the product that disappear fastly.
3) in the block chain P, select any one authentication center for block publisher node in a random way.Remaining 38 authentication centers are non-block publisher node.
4) commodity digital authentication information and merchandise classification information to be measured are transferred to the area by multichain block catenary system Block publisher node.
Since commodity to be measured are the product that disappear fastly, the block data further includes that commodity cross shelf-life information or do not cross shelf-life letter Breath.
Judge that the step of whether commodity to be measured spend the shelf-life is mainly as follows:
A) time that external node uploads commodity digital authentication information is broadcast to and each recognizes by multichain block catenary system Card center.External node uploads the time of commodity digital authentication information as 20 days 14 March in 2019 in the present embodiment:30: 05:020。
B) each authentication center finds in basic database corresponding with commodity digital authentication information records event Information, and commodity shelf-life and commodity production date in event information are recorded described in reading.The guarantor of flower cake in the present embodiment The matter phase is 45 days, and the date of manufacture is on January 15th, 2019.
Each authentication center uploads commodity number to the commodity shelf-life, the commodity production date and the external node The time of word authentication information is handled, i.e., the time that the described external node uploads commodity digital authentication information subtracts The commodity production date, obtain life-span of goods.Each authentication center carries out the life-span of goods and the commodity shelf-life Multilevel iudge.In the present embodiment, the life-span of goods is 65 days, is greater than the commodity shelf-life, then commodity to be measured, which are already expired, guarantees the quality Phase.Each authentication center is not crossed commodity in shelf-life information broadcast multichain block catenary system, and commodity are crossed shelf-life information It is stored in recording in event information for basic database.
C) according to verification rule, i.e., according to majority principle, judge whether 39 commodity cross the message of shelf-life, it is more Chain block catenary system finally judges that commodity do not spend the shelf-life, and commodity digital authentication information and commodity are not crossed to shelf-life letter Breath passes to the block publisher node.The block publisher node crosses guarantor according to commodity digital authentication information, by commodity Matter phase information preservation is recorded in event information corresponding.Since the shelf-life is already expired in commodity, store the information of the part commodity without Meaning, to save resource as far as possible, the corresponding event information of recording of the commodity is buried in oblivion by each authentication center.
At this point, the event information of recording mainly includes date of manufacture, manufacturer, quality inspection verification of conformity, product rule Lattice, safe-use period, i.e. shelf-life and commodity cross guarantee period information.
5) the block publisher node generates block data.
The block data mainly include it is described record event information, commodity to be measured are activated information and merchandise classification to be measured Information.
The block publisher node broadcasts the block data in the block chain P.
6) described 38 non-block publisher nodes receive the block data of broadcast.
7) 39 authentication centers judge respectively in the block data record event information whether in basic database To record event information consistent, and by judging result broadcast in multichain block catenary system.39 authentication centers respectively will be described Commodity in block data enable in the basic database that information is stored in.
8) multichain block catenary system obtains final judging result according to the verification rule of setting.The verification rule is Majority principle.Wherein, 33 authentication centers judge to record event information and authentication center's basic data in the block data Event information is consistent for recording in library, and 6 authentication centers judge to record event information and authentication center in the block data Event information is inconsistent for recording in basic database, therefore final judging result is to record event letter in the block data Cease in authentication center's basic database to record event information consistent.
If final judging result is recording in event information and authentication center's basic database in the block data It is consistent to record event information, then the block data is fed back to the external node by multichain block catenary system.
9) external node obtains the essential information of commodity to be measured.
Embodiment 4:
This implementation constructs the block catenary system that a kind of band buries in oblivion mechanism, mainly includes 22 block chains.Every block chain tool There is unique block chain type sequence number.It wherein mainly include 17 authentication centers, the 8-15 articles block in the 1-7 articles block chain Mainly include 9 authentication centers in chain, mainly includes 39 authentication centers in the 16-22 articles block chain.
The block chain type sequence number is project category.The project category is broadly divided into transaction, penny ante, security Transaction, non financial transaction and/or industry code.When project category is industry code, the block chain type sequence number is also wrapped Include the product code/durable goods code that disappears fastly.The product code that disappears fastly is 1, and durable goods code is 0.The industry code is the English of industry, If the code of the communications industry is communication, the code of medical industries is iatrology, the code of Information technology industry For information technology.One industry has two block chains, and a storage line disappears in the industry product information fastly, and another Storage line durable goods information in the industry.
In the present embodiment, project category is penny ante, corresponding penny ante block chain.The account information is corresponding to be generated Each penny ante be recorded in penny ante block chain.The account information corresponding each period designated time generates Penny ante revenue and expenditure accumulative total be recorded in transaction block chain in.The penny ante chain arranges life cycle, and being more than should The historical data of the penny ante block chain of life cycle, which is automatically left out, to be buried in oblivion.The life cycle is unlimited or limited Time cycle.
The life cycle of the penny ante block chain is set as 3 years, sets period designated time as one month.
Process of exchange is mainly as follows:
1) external network A initiates money transfer transactions by the multichain block catenary system external network B with block issue mechanism, Transaction amount is 100 yuan.The transaction record is to record event information.
2) block publishing center node is selected.Block publishing center node is in the multichain block linkwork with block issue mechanism Event information is recorded described in broadcast in system.
3) each authentication center authenticates the event information of recording.
4) authentication result:The event information of recording is newest and effective data, transaction success.
5) penny ante block chain accumulates the transaction amount in one month, calculates revenue and expenditure, and be recorded in basic database In, after 3 years, Transaction Information is buried in oblivion automatically.
Embodiment 5:
This implementation constructs the block catenary system that a kind of band buries in oblivion mechanism, mainly includes 22 block chains.Every block chain tool There is unique block chain type sequence number.It wherein mainly include 17 authentication centers, the 8-15 articles block in the 1-7 articles block chain Mainly include 9 authentication centers in chain, mainly includes 39 authentication centers in the 16-22 articles block chain.
The block chain type sequence number is project category.The project category is broadly divided into transaction, penny ante, security Transaction, non financial transaction and/or industry code.When project category is industry code, the block chain type sequence number is also wrapped Include the product code/durable goods code that disappears fastly.The product code that disappears fastly is 1, and durable goods code is 0.The industry code is the English of industry, If the code of the communications industry is communication, the code of medical industries is iatrology, the code of Information technology industry For information technology.One industry has two block chains, and a storage line disappears in the industry product information fastly, and another Storage line durable goods information in the industry.
In the present embodiment, project category is food service industry.The block chain stores the related data with series-produced food, if Determining life cycle is shelf-life+extended period, and the present embodiment is set as+10 days 45 days, i.e., life cycle is 55 days.
It since food belongs to the conduct industry that disappears fastly, is verified when to commodity, and determines the life cycle of its place block chain More than 55 days, then the block chain is buried in oblivion.

Claims (9)

1. the block catenary system that a kind of band buries in oblivion mechanism, which is characterized in that mainly include m authentication center;
Each authentication center mainly includes basic database, records event authentication information system and block chain certification accounting system;
According to different functional requirements, block chain certification accounting system mainly includes the mutually independent block chain of K item, and every Block chain has unique block chain type sequence number;
The block chain type sequence number is project category;The project category is broadly divided into transaction, penny ante, security friendship Easily, non financial transaction and/or industry code;Project category can also be the product that disappear fastly, durable goods, collectibles and/or industry code;
When the project category is penny ante, corresponding penny ante block chain;The corresponding each pen generated of the account information Penny ante is recorded in penny ante block chain;The small amount that the account information corresponding each period designated time generates is handed over Easy revenue and expenditure accumulative total is recorded in transaction block chain;The penny ante chain arranges life cycle, is more than the life cycle The historical data of the penny ante block chain be automatically left out and bury in oblivion;The life cycle is unlimited or finite time week Phase;
The basic database mainly stores basic authentication data and records event authentication information;
The basic authentication data are provided by the certification demand of the authentication center;
The event authentication information of recording records event authentication information system according to the certification demand to basic data for described in The operation note information in library;
The operation that event authentication information system is recorded according to different certification demands to basic database, recognizes according to block chain The respective classes that the call format generation different function demand of card accounting system generates record Transaction Information;It is described to record event Transaction Information is recorded in the broadcast in block record release cycle T of authentication information system;
In the block chain certification accounting system block chained record corresponding function of different functional requirements be broadcasted record Transaction Information;
Described block chain certification each block chain of accounting system is established rules based on accordingly recording Transaction Information by what is received by one It then generates and saves block data.
The key step that described block chain certification each block chain of accounting system generates book keeping operation block chain is as follows:
1) setting the release cycle of each block chain of the multichain block catenary system with block issue mechanism is respectively TK
2) in the block release cycle TKInterior, event authentication information system is recorded according to corresponding function need by the authentication center It asks based on the basic authentication data, authentication algorithm operation is carried out to certification request according to certification rule;It will accordingly generate Record event authentication information preservation in basic database;Authentication center's generation corresponding function records Transaction Information simultaneously Transaction Information broadcast will be recorded to be uploaded in the block chain certification accounting system of each authentication center, and by corresponding the L articles block Chain receives;L≤K;
3) in a block release cycle TKInterior, multichain block catenary system selects any n in a random waykA central node is Block publisher node;Remaining m-nKA central node is non-block publisher node;
4) nkA block publisher node is according to TKWhat is received in Verification System in the section time records Transaction Information, generates band The block data of timestamp is to entire Verification System broadcast distribution;
The block data includes block Head Section and block body area;Collect T in block body areaKWhat is be broadcasted in the section time records transaction Information;The TKWhat is be broadcasted in the section time records Transaction Information as calculating parameter, is processed to radical evidence;The radical evidence As calculating parameter, it is processed to authentication data;The authentication data is recorded in the block Head Section of the L articles block chain;
5) the block chain certification accounting system of the block publisher node carries out the block data of the L articles block chain wide It broadcasts;
6) the K articles block chain of the block chain certification accounting system of each central node of the multichain block catenary system is corresponding receives The block data being broadcasted;
When the commodity are to disappear product fastly, information that commodity are activated buries in oblivion the area of mechanism as event authentication information is recorded in band After broadcasting in block catenary system, the basic database is buried in oblivion according to rule or deletes or mark the event of recording of the commodity to believe Breath;Commodity cross the information of shelf-life as recording after event authentication information broadcasts in the block catenary system that band buries in oblivion mechanism, institute State that basic database is buried in oblivion according to rule or that deletes or mark the commodity records event information.
7) m authentication center determines the block data for the K articles new block chain being finally identified according to the verification rule of setting;
8) after a block data is verified by system to be confirmed, the newest block as the L articles block chain is connected to previous Behind block, it is stored in block chain;System enters next block and records release cycle.
2. a kind of multichain block catenary system with block issue mechanism according to claim 1, it is characterised in that:The base The operation note of plinth database mainly includes reading record, write-in record, more new record, modification record and/or deletion record.
3. a kind of multichain block catenary system with block issue mechanism, it is characterised in that:The block chain of different function demand it is interior Appearance carries out turning chain as needed.
4. a kind of multichain block catenary system with block issue mechanism according to claim 1, it is characterised in that:Different function Energy demand, corresponding disparity items classification.
5. a kind of multichain block catenary system with block issue mechanism according to claim 1, it is characterised in that:It is described to recognize Card center is primary server;M authentication center's permissions are identical.
6. a kind of multichain block catenary system with block issue mechanism according to claim 1, it is characterised in that:It is described outer Portion's network is the intelligent terminal for connecting multicenter Verification System and having radio frequency recognition function.
7. a kind of multichain block catenary system with block issue mechanism according to claim 1, it is characterised in that:The school Testing rule is majority principle.
8. a kind of multichain block catenary system with block issue mechanism according to claim 1, it is characterised in that:If to be measured Commodity are the product that disappear fastly, and the block data further includes that commodity cross shelf-life information or do not cross shelf-life information.
9. a kind of multichain block catenary system with block issue mechanism according to claim 7, it is characterised in that:Judge quotient The step of whether product spend the shelf-life is mainly as follows:
1) time that external network uploads commodity digital authentication information is broadcast in each certification by multichain block catenary system The heart;
2) each authentication center found in basic database it is corresponding with commodity digital authentication information record event information, And commodity shelf-life and commodity production date in event information are recorded described in reading;
Each authentication center uploads commodity digital body to the commodity shelf-life, the commodity production date and the external network The time of part authentication information is handled, i.e., the time that the described external network uploads commodity digital authentication information subtracts described On the commodity production date, obtain life-span of goods;Each authentication center is compared the life-span of goods and the commodity shelf-life Judgement;
If the life-span of goods is greater than the commodity shelf-life, it's the shelf-life past commodity to be measured;Commodity are crossed and are guaranteed the quality by authentication center Phase information is broadcast in multichain block catenary system;
If the life-span of goods is less than or equal to the commodity shelf-life, it's the shelf-life past commodity to be measured;Authentication center is by commodity It does not cross in shelf-life information broadcast multichain block catenary system;
3) according to verification rule, multichain block catenary system judges whether commodity spend the shelf-life, and commodity digital authentication is believed Breath and commodity cross shelf-life information or commodity, and shelf-life information excessively passes to the block publisher node.
CN201810462747.7A 2017-05-16 2018-05-15 Block chain system with annihilation mechanism Active CN108876364B (en)

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
CN2017103443838 2017-05-16
CN201710344383 2017-05-16
CN201710534947 2017-07-04
CN2017105349474 2017-07-04

Publications (2)

Publication Number Publication Date
CN108876364A true CN108876364A (en) 2018-11-23
CN108876364B CN108876364B (en) 2021-11-09

Family

ID=64333909

Family Applications (12)

Application Number Title Priority Date Filing Date
CN202110237010.7A Pending CN113037738A (en) 2017-05-16 2018-05-15 Virtual account block chain verification system with external fixed physical node
CN201810462740.5A Active CN108881163B (en) 2017-05-16 2018-05-15 Multi-center block chain system with block issuing mechanism
CN201810462739.2A Active CN108874890B (en) 2017-05-16 2018-05-15 Block chain system with public bibliographic mechanism
CN201810463897.XA Active CN108881167B (en) 2017-05-16 2018-05-15 Intelligent contract of finite field block chain system
CN201810463335.5A Active CN108881166B (en) 2017-05-16 2018-05-15 Virtual account block chain verification system with external fixed physical node
CN201810464400.6A Active CN108876399B (en) 2017-05-16 2018-05-15 Finite field block chain system with closed-loop authentication system
CN201810462747.7A Active CN108876364B (en) 2017-05-16 2018-05-15 Block chain system with annihilation mechanism
CN201810462760.2A Pending CN108875386A (en) 2017-05-16 2018-05-15 A kind of multicenter finite field block catenary system framework with block issue mechanism and application demand issue mechanism
CN202110235074.3A Pending CN112929383A (en) 2017-05-16 2018-05-15 Multi-center authentication system with block issuing mechanism
CN201810464384.0A Active CN108921692B (en) 2017-05-16 2018-05-15 Multi-chain block chain system with block issuing mechanism
CN201810462757.0A Active CN108881165B (en) 2017-05-16 2018-05-15 Multi-center authentication system with block issuing mechanism
CN201810463885.7A Active CN108876365B (en) 2017-05-16 2018-05-15 Intelligent contract for generating block release mechanism

Family Applications Before (6)

Application Number Title Priority Date Filing Date
CN202110237010.7A Pending CN113037738A (en) 2017-05-16 2018-05-15 Virtual account block chain verification system with external fixed physical node
CN201810462740.5A Active CN108881163B (en) 2017-05-16 2018-05-15 Multi-center block chain system with block issuing mechanism
CN201810462739.2A Active CN108874890B (en) 2017-05-16 2018-05-15 Block chain system with public bibliographic mechanism
CN201810463897.XA Active CN108881167B (en) 2017-05-16 2018-05-15 Intelligent contract of finite field block chain system
CN201810463335.5A Active CN108881166B (en) 2017-05-16 2018-05-15 Virtual account block chain verification system with external fixed physical node
CN201810464400.6A Active CN108876399B (en) 2017-05-16 2018-05-15 Finite field block chain system with closed-loop authentication system

Family Applications After (5)

Application Number Title Priority Date Filing Date
CN201810462760.2A Pending CN108875386A (en) 2017-05-16 2018-05-15 A kind of multicenter finite field block catenary system framework with block issue mechanism and application demand issue mechanism
CN202110235074.3A Pending CN112929383A (en) 2017-05-16 2018-05-15 Multi-center authentication system with block issuing mechanism
CN201810464384.0A Active CN108921692B (en) 2017-05-16 2018-05-15 Multi-chain block chain system with block issuing mechanism
CN201810462757.0A Active CN108881165B (en) 2017-05-16 2018-05-15 Multi-center authentication system with block issuing mechanism
CN201810463885.7A Active CN108876365B (en) 2017-05-16 2018-05-15 Intelligent contract for generating block release mechanism

Country Status (1)

Country Link
CN (12) CN113037738A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109885258A (en) * 2019-02-01 2019-06-14 立旃(上海)科技有限公司 Data deletion apparatus and method based on block chain
CN110535967A (en) * 2019-09-06 2019-12-03 江苏物联网研究发展中心 A kind of vehicle transport data judge system

Families Citing this family (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109583896A (en) * 2018-11-30 2019-04-05 元灵通智能科技(深圳)有限公司 Transaction verification method, block chain node and storage medium
CN109726201B (en) * 2018-12-12 2020-05-05 杭州基尔区块链科技有限公司 Chip research and development transaction data storage method and system based on intelligent contract
CN109656177A (en) * 2018-12-28 2019-04-19 成都易慧家科技有限公司 A kind of intelligent door and window communication system
CN109831483A (en) * 2018-12-28 2019-05-31 山东康威通信技术股份有限公司 Distributed block chain control system and method applied to the underground space
CN110062041B (en) * 2019-04-12 2023-04-07 深圳前海微众银行股份有限公司 Method and device for changing IOT (input/output) equipment based on block chain
CN111931245A (en) * 2019-05-13 2020-11-13 阿里巴巴集团控股有限公司 Information processing method and device
CN110135194B (en) * 2019-05-20 2020-10-30 北京邮电大学 Block chain-based industrial internet digital object management method
CN110597911B (en) * 2019-09-12 2021-08-17 腾讯科技(深圳)有限公司 Certificate processing method and device for block chain network, electronic equipment and storage medium
CN110780847B (en) * 2019-10-15 2022-02-25 腾讯科技(深圳)有限公司 Random number generation method, random number generation device and electronic equipment
CN113162889B (en) * 2020-01-22 2023-02-17 北京车和家信息技术有限公司 Authentication method and device for route updating information
CN112115116B (en) * 2020-08-05 2024-04-16 西安电子科技大学 Construction method of high-performance tamper-proof database based on blockchain
CN113516487B (en) * 2021-05-19 2022-10-14 广西科技大学 Agricultural product traceability system based on block chain
CN115695055B (en) * 2023-01-05 2023-03-14 中国电子科技集团公司第三十研究所 High-reliability high-concurrency security authentication system and method based on memory database
CN117709947B (en) * 2024-02-05 2024-04-19 广东通莞科技股份有限公司 POS machine settlement authority management method based on blockchain

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106375317A (en) * 2016-08-31 2017-02-01 北京明朝万达科技股份有限公司 Block chain-based big data security authentication method and system
US20170132626A1 (en) * 2015-11-05 2017-05-11 Mastercard International Incorporated Method and system for processing of a blockchain transaction in a transaction processing network

Family Cites Families (50)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CA2291430A1 (en) * 1999-01-28 2000-07-28 Tao Lu Internet transaction security system
US8582777B2 (en) * 2006-05-03 2013-11-12 Samsung Electronics Co., Ltd. Method and system for lightweight key distribution in a wireless network
WO2008028291A1 (en) * 2006-09-08 2008-03-13 Certicom Corp. Authenticated radio frequency identification and key distribution system therefor
CN103971250B (en) * 2014-04-09 2017-04-05 四川谦泰仁投资管理有限公司 A kind of one time one card anti-fake traceability system based on mobile terminal and RFID
US20160098730A1 (en) * 2014-10-01 2016-04-07 The Filing Cabinet, LLC System and Method for Block-Chain Verification of Goods
CN104392354B (en) * 2014-11-05 2017-10-03 中国科学院合肥物质科学研究院 A kind of public key address is associated and search method and its system with user account
CN105844472A (en) * 2015-01-13 2016-08-10 四川谦泰仁投资管理有限公司 RFID merchandise anti-counterfeiting tracing system compatible with two-dimensional code counterfeiting prevention
CN106296184A (en) * 2015-06-05 2017-01-04 地气股份有限公司 Electronic money management method and electronic-monetary system
WO2017027484A1 (en) * 2015-08-09 2017-02-16 Ramasamy Celambarasan System and method for microshare based content funding and distribution
US10402792B2 (en) * 2015-08-13 2019-09-03 The Toronto-Dominion Bank Systems and method for tracking enterprise events using hybrid public-private blockchain ledgers
US10504178B2 (en) * 2015-11-04 2019-12-10 Chicago Mercantile Exchange Inc. System for physically delivering virtual currencies
CN105488675B (en) * 2015-11-25 2019-12-24 布比(北京)网络技术有限公司 Block chain distributed shared general ledger construction method
CN105719172A (en) * 2016-01-19 2016-06-29 布比(北京)网络技术有限公司 Information issuing method and device
CN105761146B (en) * 2016-01-24 2021-06-01 杭州复杂美科技有限公司 Block chain matching exchange
CN105610578B (en) * 2016-01-25 2019-05-03 杭州复杂美科技有限公司 Block chain information deposits card and method for secret protection
CN105809062B (en) * 2016-03-01 2019-01-25 布比(北京)网络技术有限公司 A kind of building of contract executes method and device
CN105893042A (en) * 2016-03-31 2016-08-24 北京航空航天大学 Intelligent contract implementation method based on block chain
CN105912618B (en) * 2016-04-07 2019-04-23 浙江万马新能源有限公司 The charging pile charging transaction means of communication and device based on block chain
CN105956923B (en) * 2016-04-20 2022-04-29 上海如鸽投资有限公司 Asset transaction system and digital authentication and transaction method of assets
KR101701131B1 (en) * 2016-04-28 2017-02-13 주식회사 라피 Data recording and validation methods and systems using the connecting of blockchain between different type
CN105976231A (en) * 2016-06-24 2016-09-28 深圳前海微众银行股份有限公司 Asset management method based on intelligent block chain contracts and nodes
CN106209877A (en) * 2016-07-19 2016-12-07 井创(北京)科技有限公司 A kind of be certification core with block chain backstage false-proof authentication system
CN106339880A (en) * 2016-08-23 2017-01-18 白大文 Product production method and system for users to trace and examine filling process easily
CN106339939B (en) * 2016-08-26 2020-05-15 南京喜玛拉云信息技术有限公司 Non-tamper-able distributed bill system based on secure hardware and transaction processing method
CN106385315B (en) * 2016-08-30 2019-05-17 北京三未信安科技发展有限公司 A kind of digital certificate management method and system
CN106384236B (en) * 2016-08-31 2019-07-16 江苏通付盾科技有限公司 Based on the ca authentication management method of block chain, apparatus and system
CN106503574B (en) * 2016-09-13 2019-11-05 中国电子科技集团公司第三十二研究所 Block chain safe storage method
CN106372533B (en) * 2016-09-14 2020-04-21 中国银联股份有限公司 Content storage method based on block chain technology
US10157295B2 (en) * 2016-10-07 2018-12-18 Acronis International Gmbh System and method for file authenticity certification using blockchain network
CN106548091A (en) * 2016-10-14 2017-03-29 北京爱接力科技发展有限公司 A kind of data deposit card, the method and device of checking
CN106570710A (en) * 2016-10-27 2017-04-19 纸飞机(北京)科技有限公司 Commodity anti-counterfeiting method and device
CN106534097B (en) * 2016-10-27 2018-05-18 上海亿账通区块链科技有限公司 Permission method of control and system based on the transaction of block chain
CN106504091B (en) * 2016-10-27 2018-06-29 深圳壹账通智能科技有限公司 The method and device merchandised on block chain
CN106528775B (en) * 2016-10-28 2020-01-03 济南大学 Private block chain operation support system supporting logic multi-chain and working method thereof
CN106447309A (en) * 2016-11-13 2017-02-22 杭州复杂美科技有限公司 Across-chain transaction of source chain and lateral chain
CN106559211B (en) * 2016-11-22 2019-12-13 中国电子科技集团公司第三十研究所 Privacy protection intelligent contract method in block chain
CN106453636A (en) * 2016-11-22 2017-02-22 深圳银链科技有限公司 Credible block generation method and system
CN106453407B (en) * 2016-11-23 2019-10-15 江苏通付盾科技有限公司 Identity authentication method based on block chain, authentication server and user terminal
CN106651303B (en) * 2016-12-02 2020-05-26 北京轻信科技有限公司 Intelligent contract processing method and system based on template
CN106534160B (en) * 2016-12-02 2020-02-21 江苏通付盾科技有限公司 Identity authentication method and system based on block chain
CN106600252A (en) * 2016-12-15 2017-04-26 咪咕文化科技有限公司 Payment method and system based on block chain
CN106530088B (en) * 2016-12-19 2023-11-17 杜伯仁 Method for trading certificate products based on blockchain security nodes
CN106651332B (en) * 2016-12-29 2020-11-06 成都质数斯达克科技有限公司 Method for generating new block in block chain and block chain
CN106656509B (en) * 2016-12-29 2019-11-29 深圳市检验检疫科学研究院 A kind of RFID alliance chain collaboration authentication method for the monitoring of defeated port food
CN106656798B (en) * 2016-12-30 2020-03-27 质数链网科技成都有限公司 Method for calculating decision path and distributed node
CN107122477A (en) * 2017-05-02 2017-09-01 成都中远信电子科技有限公司 A kind of block chain storage system
CN107273760A (en) * 2017-06-09 2017-10-20 济南浪潮高新科技投资发展有限公司 One kind is based on many CA application authentication methods of block chain
CN107358438A (en) * 2017-06-27 2017-11-17 上海霸贤网络科技有限公司 Supply chain dynamic multicenter collaboration authentication model and its implementation based on block chain
CN107249009B (en) * 2017-08-02 2020-02-21 广东工业大学 Data verification method and system based on block chain
CN107995197A (en) * 2017-12-04 2018-05-04 中国电子科技集团公司第三十研究所 A kind of method for realizing across management domain identity and authority information is shared

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170132626A1 (en) * 2015-11-05 2017-05-11 Mastercard International Incorporated Method and system for processing of a blockchain transaction in a transaction processing network
CN106375317A (en) * 2016-08-31 2017-02-01 北京明朝万达科技股份有限公司 Block chain-based big data security authentication method and system

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
MATTHIAS METTLER 等: "Blockchain technology in healthcare: The revolution starts here", 《2016 IEEE 18TH INTERNATIONAL CONFERENCE ON E-HEALTH NETWORKING, APPLICATIONS AND SERVICES (HEALTHCOM)》 *
周清杰: "信息不对称、区块链与食品安全社会共治", 《中国市场监管研究》 *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109885258A (en) * 2019-02-01 2019-06-14 立旃(上海)科技有限公司 Data deletion apparatus and method based on block chain
CN109885258B (en) * 2019-02-01 2023-02-21 立旃(上海)科技有限公司 Data deleting device and method based on block chain
CN110535967A (en) * 2019-09-06 2019-12-03 江苏物联网研究发展中心 A kind of vehicle transport data judge system
CN110535967B (en) * 2019-09-06 2022-08-23 江苏物联网研究发展中心 Vehicle transportation data judgment system

Also Published As

Publication number Publication date
CN108876365B (en) 2023-08-29
CN113037738A (en) 2021-06-25
CN108881165A (en) 2018-11-23
CN108881165B (en) 2021-03-26
CN108876399A (en) 2018-11-23
CN108921692A (en) 2018-11-30
CN108876364B (en) 2021-11-09
CN108875386A (en) 2018-11-23
CN112929383A (en) 2021-06-08
CN108881166A (en) 2018-11-23
CN108881163A (en) 2018-11-23
CN108876365A (en) 2018-11-23
CN108874890B (en) 2020-10-23
CN108921692B (en) 2022-01-18
CN108881166B (en) 2021-03-26
CN108876399B (en) 2022-04-29
CN108881167B (en) 2021-06-22
CN108874890A (en) 2018-11-23
CN108881167A (en) 2018-11-23
CN108881163B (en) 2021-05-14

Similar Documents

Publication Publication Date Title
CN108876364A (en) A kind of band buries in oblivion the block catenary system of mechanism
Banerjee Blockchain technology: supply chain insights from ERP
CN108764877B (en) Digital asset right-confirming trading method based on block chain technology
EP3262785B1 (en) Tracking unitization occurring in a supply chain
CN110163753A (en) Houseclearing based on block chain deposits card, application method and device
CN109829726B (en) Block chain-based drug information management method and system
KR20180115768A (en) Encryption method and system for secure extraction of data from a block chain
CN106600403A (en) Asset management method, device and system
CN109325812A (en) About the data processing method of electronic bill, device, storage medium and equipment
EP3540662A1 (en) Computer implemented method for supply chain management and provenance in a data processing network
CN110046999A (en) Block chain method of commerce and device
CN105956923A (en) Asset transaction platform and digital certification and transaction method for assets
CN108876538B (en) A kind of order information processing method
CN109325785A (en) A kind of multi-model source tracing method based on alliance's chain
CN110046841A (en) Logistics information source tracing method and device and electronic equipment based on block chain
CN110032882A (en) Card method and apparatus are deposited based on block chain
CN110222529A (en) Assets management method, electronic equipment and computer storage medium based on alliance's chain
CN108854077B (en) Cross-game item circulation method based on block chain technology
CN110599107B (en) Logistics data processing method and device based on block chain
Koirala et al. Supply chain using smart contract: A blockchain enabled model with traceability and ownership management
CN109508998A (en) A kind of tobacco based on block chain is traced to the source method for anti-counterfeit and system
CN109858904A (en) Data processing method and device based on block chain
CN112037057A (en) Correction method and device for block chain data
CN109241762A (en) Assets information acquisition methods, device and computer equipment based on block chain technology
CN114358947A (en) Block chain based pricing method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant