CN109034833A - A kind of product back-tracing information management system and method based on block chain - Google Patents

A kind of product back-tracing information management system and method based on block chain Download PDF

Info

Publication number
CN109034833A
CN109034833A CN201810623432.6A CN201810623432A CN109034833A CN 109034833 A CN109034833 A CN 109034833A CN 201810623432 A CN201810623432 A CN 201810623432A CN 109034833 A CN109034833 A CN 109034833A
Authority
CN
China
Prior art keywords
chain
information
subsystem
data
under
Prior art date
Application number
CN201810623432.6A
Other languages
Chinese (zh)
Inventor
林琪钧
王俊宇
Original Assignee
复旦大学
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 复旦大学 filed Critical 复旦大学
Priority to CN201810623432.6A priority Critical patent/CN109034833A/en
Publication of CN109034833A publication Critical patent/CN109034833A/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce, e.g. shopping or e-commerce
    • G06Q30/01Customer relationship, e.g. warranty
    • G06Q30/018Business or product certification or verification
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity

Abstract

The invention belongs to internet of things field, specially a kind of product back-tracing information management system and method.Present system is using " under chain cochain " synergistic mechanism come whole supply chain information: product supply chain manufacturer by " subsystem under chain " acquisition, save and management product information or the product generated event information in supply chain process, and information deposited into card, information position, authentication evidence etc. upload to " subsystem on chain " based on block chain with the crucial tracing information of tamper-proof requirement and save and manage;Each link guarantees the safety of whole process by the functional module discovery of subsystem, the data verified and share subsystem under each link chain of supply chain on chain in same supply chain.The present invention solve the problems, such as that traditional traceability system faces it is unauthorized distort and transitive trust problem, improve the credibility of product back-tracing system, and ensure that the flexibility and scalability of system.

Description

A kind of product back-tracing information management system and method based on block chain

Technical field

The invention belongs to internet of things field, and in particular to a kind of product back-tracing information management system and method.

Background technique

In recent years, product safety problem occurs again and again, and product safety problem increasingly becomes focus concerned by people, this is right Each enterprise proposes accurate monitoring and record product in plantation (cultivation), processing, packaging, detection, transport in product supply chain Etc. the information of key links requirement, using Internet technology realization the storage and management of these key messages is had become The Disciplinary Frontiers of people's common concern.There is following 3 aspects: 1) product electronics in existing product electronic tracing system The integrality protection problem of tracing information, the i.e. anti-tamper problem of product back-tracing information;2) transitive trust problem, i.e. supply chain When node initiates tracing information request to other supply chain nodes for not having direct trade link, requested supply chain node It can not judge whether requesting node is in its product supply chain, this will affect the information exchange between system.3) product supply The sensitive information leakage problem of chain manufacturer.Used in previous work electronic record based on digital signature chain solve it is anti-tamper and Transitive trust problem, but the enterprise in the program in supply chain downstream can obtain chasing after for supply chain nodes all before It traces back information, wherein this will result in enterprise's sensitive information leakage problem comprising business sensitives information such as enterprise identities.

Block chain is gone as one kind for becoming increasingly popular and gradually rising of the digital encryptions currency such as bit coin is completely new Heart architecture and distributed computing normal form, have caused government department, financial institution, science-and-technology enterprise and capital market at present Great attention and extensive concern.Block chain technology has decentralization, time series data, collective's maintenance, programmable and safety can The features such as letter, is particularly suitable for the programmable money-system of building, financial system or even macro society system.Block chain it is above-mentioned Characteristic makes the technology have huge application prospect in product electronic tracing field, but directlys adopt existing block chain frame Structure, which carries out the design of product electronic tracing system, can have data volume explosion issues.Each distributed section in existing block chain framework That point saves is all block chain data complete or collected works, if being directly used in the extensive use of product back-tracing domain variability, will lead to data volume mistake Greatly, cause data volume explosion issues.

Summary of the invention

The purpose of the present invention is to provide a kind of high product back-tracing information management systems based on block chain of information security System and method.

Product back-tracing information management system proposed by the present invention based on block chain including at least product back-tracing system and disappears The person's of expense client.Wherein, product back-tracing system is made of subsystem under subsystem on chain and chain: subsystem responsible is respectively supplied under chain In chain node with the acquisition of product back-tracing related data, manage and maintain and the maintenance of block chain network, the part are at least wrapped It includes: subsystem database, uplink communications extraction module, interaction authority management module under trace to the source information scratching module, chain;Wherein, Information scratching module of tracing to the source is mainly responsible for the details that acquisition product generates during production, storage, circulation etc., has certainly Dynamic information collection and two functions of manual information typing;Subsystem database is mainly responsible for preservation and manages through acquisition mould under chain All product event informations of block acquisition;Uplink communications extraction module, which is mainly responsible for, will need the information extraction of cochain in database Out, data preparation is done for crucial tracing information cochain;Interaction authority management module is mainly responsible for two functions: with block chain number According to interaction and block chain network operation;

Subsystem on the chain, wherein data include four kinds of information: under chain under subsystem data cryptographic Hash, chain subsystem access into Mouth, supply chain manufacturer public key cryptographic Hash and crucial tracing information.Wherein, subsystem data cryptographic Hash is supply chain link under chain The digital digest of information under chain is generated, using HASH function for use as the data verification function under chain when information sharing;It is sub under chain System access entrance is the data storage and access position of subsystem under each chain of the product supply chain, such as the address IP/URL;For Answering chain manufacturer public key cryptographic Hash is product supply chain manufacturer using the public key value in the public private key pair of asymmetric cryptographic algorithm generation By the digital digest that HASH operation generates, for permission judgement and verifying of the subsystem data under chain when shared;Key retrospect Information is the trace back data with tamper-proof requirement that product generates in supply chain circulation;

Subsystem on the chain, including four judgement of INFORMATION DISCOVERY, permission, Information Authentication and information management basic function modules; When supply chain node initiates request of data under chain to certain product, it is somebody's turn to do by the INFORMATION DISCOVERY functional module of subsystem on chain Subsystem access entrance under the chain of each node of product supply chain;Requested supply chain node is identified by permission arbitration functions module Whether the identity of requesting node is in the product supply chain;Link supply chain node is requested to obtain under chain after subsystem data, Whether the integrality that obtained information is judged by Information Authentication functional module, i.e., be tampered;Subsystem is logical under each link chain Block chain will be uploaded to uplink communications by crossing information management function module.

The consumer client, including block chain interactive module and user interface, are mainly responsible for and mention for consumer-user For tracing query service.

In the present invention, the data acquisition of subsystem includes two ways under chain: manually inputting and combine radio frequency identification The automatic collection of technology (RFID).

In the present invention, the data that subsystem acquires under chain should be comprising the product information for producing node and product in each supply The information such as the event information, including production, processing, storage, packaging, transaction that chain link generates.

In the present invention, the preserving type of subsystem data can be remembered respectively using intelligent contract or each supply chain node on chain " chain transaction " form of product back-tracing and Transaction Information is recorded, guarantee can provide INFORMATION DISCOVERY, permission judgement, Information Authentication and letter Breath four basic functions of management.

In the present invention, the permission arbitration functions, comprising: when the supply chain node of certain link requests certain to other nodes Under the chain of product when subsystem data, subsidiary submission is needed to use the private key of oneself to the digital signature and public key of clear data, Requested node first determines whether identity experimental evidence corresponds on the public key and chain, if passing through, recycles the public key to number Signature carries out sign test, judges whether requesting node has corresponding private key.

In the present invention, product identification is identified by product back-tracing code, product back-tracing code there should be uniqueness.

In the present invention, product back-tracing code or intelligent contract address is may be selected in the clear data.

In the present invention, enterprise customer can select to save full of entire block chain data or only protect according to self-demand Block head chain is deposited, the operation and maintenance of block chain network is participated in.

In the present invention, consumer client should run the light node of block chain, i.e., only save the block head data of block chain, use Make data verification.

In present system, using " under chain cochain " coordination management system whole supply chain information, product supply chain manufacturer By enterprise's traceability system (" subsystem under chain ") acquisition, save simultaneously management product information or the product institute in supply chain process The event information of generation, and information is deposited into the crucial retrospect letter with tamper-proof requirement such as card, information position, authentication evidence Breath uploads to " subsystem on chain " based on block chain and saves and manage;Each link can pass through subsystem on chain in same supply chain Functional module (INFORMATION DISCOVERY, Information Authentication, permission judgement and information management) discovery of system is verified and shares each link of supply chain The data of subsystem under chain, and guarantee the safety of whole process.

Therefore, the product back-tracing approaches to IM based on above system, comprising the following steps:

Step 1, product supply chain information collection: when product passes through each link of supply chain, " the subsystem under chain of the link System " is responsible for acquisition, saves and manage detailed supply chain data;

Step 2, the information that " subsystem under chain " of each link extracts product, which deposits card, information position, authentication evidence etc., to be had The crucial tracing information of tamper-proof requirement, and upload to " subsystem on chain " based on block chain and save and manage;

Step 3, in product trading, recipient can obtain the supply of product to be received by the functional module of subsystem on chain Chain historical information/list of locations, and complete supply chain details are obtained, realize information sharing.The function of subsystem on chain Module ensure that the safety of information sharing under chain, prevent the sensitive information leakage of supply chain manufacturer;

Step 4, consumer can obtain the tracing information of product to be purchased by the system.In the present invention, subsystem under chain Data acquisition includes two ways: manually inputting and combine the automatic collection of Radio Frequency Identification Technology (RFID).

In the present invention, product identification is identified by product back-tracing code, product back-tracing code there should be uniqueness.

In the present invention, the data that subsystem acquires under chain should be comprising the product information for producing node and product in each supply The information such as the event information, including production, processing, storage, packaging, transaction that chain link generates.

In the present invention, the information deposits card, can be generated using Merkel tree (Merkel Tree) form, leaf node For the cryptographic Hash of subsystem data under different chains, and Merkel's tree root value (Merkel Tree Root) is deposited as information Card.

Product back-tracing information management is carried out using coordinated management mode under the chain cochain based on block chain to have the advantage that

(1) block chain itself has anti-tamper and decentralization characteristic, can both guarantee that the true of subsystem data could on chain Letter, and the risk of third party's node modification data can be evaded, user is promoted to the trust of system.

(2) by coordination management system under chain cochain, it can alleviate and block chain is applied into the number faced in trace field According to explosion issues, most of data are placed under chain and save, only by key message cochain.

(3) enterprise identity is verified using Cryptography Principles, in system design process, business sensitive information is placed under chain and protects It deposits, and utilizes Asymmetric Cryptography Proof-Of Principle identity in information sharing procedure.The true identity of enterprise is in this process There is no exposures, greatly ensure that business sensitive information security.

In short, the present invention program unauthorized distorting and transitive trust is asked of solving the problems, such as that traditional traceability system faces Topic, improves the credibility of product back-tracing system, while solving block chain skill by " under chain cochain " coordinated management mode Art applies the data volume explosion issues faced in product back-tracing system, and ensure that the flexibility and scalability of system.

Detailed description of the invention

Fig. 1 is the total architecture diagram of present system.

Fig. 2 is data flow diagram of the product in the supply chain process of circulation.

Fig. 3 is the data flow diagram that enterprise shares under chain during subsystem data in same supply chain.

Fig. 4 is that subsystem permission judges process on chain.

Specific embodiment

The embodiment of the present invention is described below in detail, the example of the embodiment is shown in the accompanying drawings.Below with reference to The embodiment of attached drawing description is exemplary, it is intended to is used to explain the present invention, and is not considered as limiting the invention.It gives Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other Embodiment shall fall within the protection scope of the present invention.

In the product electronic tracing system of the invention based on block chain, including product back-tracing system and consumer client End, as shown in Figure 1.Wherein, product back-tracing system is responsible for the acquisition of subsystem data under chain, is managed and maintained and block link network The maintenance of network, the part include at least subsystem database, uplink communications extraction module, block chain under information acquisition module, chain Module and interaction authority management module, wherein tracing information handling module is mainly responsible for acquisition product in production, storage, circulation etc. The details generated in the process have the function of Enterprise model and manual information typing two;Subsystem database under chain It is mainly responsible for preservation and manages all product event informations acquired by acquisition module;Information extraction modules are mainly responsible for number According to needing the information of cochain to extract in library, data preparation is done for crucial tracing information cochain.Block chain interactive module is main It is responsible for two functions, one and the interaction of block chain data and the operation of block chain network.

Firstly, as shown in Fig. 2, subsystem data preservation management mode uses intelligence on chain as a kind of non-limiting example Energy forms of contract is illustrated, it is assumed that certain product supply chain is made of manufacturer, dealer, retailer.Below by the example Chain process in information is illustrated.

For manufacturer:

(1) the intelligent contract of oneself, information on the chain for managing its all product are established on block chain first, and is difference Food single-item or batch distribute unique identification, are realized by tracing information handling module in product back-tracing system to production mistake Information collection in journey;

(2) above-mentioned collected information is saved using local data base or cloud storage technology;

(3) when generating a certain food single-piece or batch generates transaction event, information extraction modules are extracted and are packaged uplink data Collection, including the dealer as counterparty side public key digital abstract (abbreviation Address), using oneself private key to the product All passes with tamper-proof requirement that the digital signature and public key, the product of intelligent contract address encryption generate at processing industry Information deposits card and local data base IP or URL under key tracing information, chain;

(4) block chain module is by the data set cochain;

(5) intelligent contract is triggered, intelligent contract extracts digital signature and public key in the data set, sentences by Authority Verification function It is disconnected whether to there is cochain permission, if passing through, the other information in data set is added in data Layer by information management function; After manufacturer confirms cochain success, product is delivered to dealer.

For dealer, retail quotient, step (6) are executed respectively and arrive step (10), step (11) arrives step (15);And step (6) step (10) are arrived, step (11) to step (15) is all the process for repeating step (1) and arriving step (5), finally in block chain It is formed on a complete chain and is recorded.

Transitive trust when how this method solves the problems, such as information exchange under chain is described below, as shown in Figure 3, it is assumed that zero It sells quotient and goes for information under chain at certain product producer:

(1) traceability code of the product and the product producer intelligence contract address are submitted to block chain interactive module by retailer;

(2) block chain interactive module initiates INFORMATION DISCOVERY request to intelligent contract is formulated, and intelligent contract respond request returns to production Quotient's IP address;

(3) retailer's product back-tracing system passes through interaction authority management module to the corresponding manufacturer's subsystem of manufacturer's IP address Initiate chain under information request, and submit the product back-tracing code, using private key to the digital signature of the product back-tracing code, public key and intelligence It can contract address;

(4) manufacturer's product back-tracing system calls block chain interactive module, initiates permission judgement request to specified intelligent contract;

(5) permission judges process as shown in figure 4, the intelligence contract transfers each node Address list of the supply of commodities chain first; Intelligent contract recurrence judges that Supplicant Address whether there is in Address list, and if it exists, then continues to judge what requesting party submitted Whether public key is corresponding with Address;If the two is corresponding, then carries out sign test, if being verified, Authority Verification to digital signature Pass through, returns to confirmation message;

(7) after manufacturer's node receives above-mentioned confirmation message, in local data library searching related data;

(8) data are returned to by interaction authority management module;

(9) after retailer receives returned data, information authenticity verifying is initiated, the Hash of data under chain is requested to intelligent contract Value, and compare its consistency with returned data.If consistent, returned data is believable.

Claims (10)

1. a kind of product back-tracing information management system based on block chain, which is characterized in that including product back-tracing system and consumption Person's client;Product back-tracing system is made of subsystem under subsystem on chain and chain:
Subsystem under the chain, be responsible in each supply chain node with the acquisition of product back-tracing related data, manage and maintain and The maintenance of block chain network, the part include: subsystem database under tracing to the source information scratching module, chain, uplink communications extraction mould Block, interaction authority management module;Wherein, information scratching module of tracing to the source is mainly responsible for acquisition product in production, storage, the process of circulation The details of middle generation;Subsystem database is mainly responsible for preservation and manages all products acquired by acquisition module under chain Event information;Uplink communications extraction module, which is mainly responsible for, will need the information of cochain to extract in database, for crucial retrospect Information cochain does data preparation;Interaction authority management module is mainly responsible for two functions: interaction and block with block chain data The operation of chain network;
Subsystem on the chain is mainly responsible for preservation and manages data on block chain;Wherein data include four kinds of information: sub under chain Subsystem access entrance, supply chain manufacturer public key cryptographic Hash and crucial tracing information under system data cryptographic Hash, chain;Wherein, chain Lower subsystem data cryptographic Hash is the digital digest that supply chain link generates information under chain using HASH function, for use as under chain Data verification function when information sharing;Subsystem access entrance is the data of subsystem under each chain of the product supply chain under chain Store and access position;Supply chain manufacturer public key cryptographic Hash is the public affairs that product supply chain manufacturer uses asymmetric cryptographic algorithm to generate The public key value of private key pair passes through the digital digest that HASH operation generates, for permission judgement of the subsystem data under chain when shared With verifying;Crucial tracing information is the trace back data with tamper-proof requirement that product generates in supply chain circulation;
Subsystem on the chain, including four judgement of INFORMATION DISCOVERY, permission, Information Authentication and information management basic function modules; When supply chain node initiates request of data under chain to certain product, it is somebody's turn to do by the INFORMATION DISCOVERY functional module of subsystem on chain Subsystem access entrance under the chain of each node of product supply chain;Requested supply chain node is identified by permission arbitration functions module Whether the identity of requesting node is in the product supply chain;Link supply chain node is requested to obtain under chain after subsystem data, Whether the integrality that obtained information is judged by Information Authentication functional module, i.e., be tampered;Subsystem is logical under each link chain Block chain will be uploaded to uplink communications by crossing information management function module;
The consumer client, including block chain interactive module and user interface, are mainly responsible for provide for consumer-user and chase after It traces back query service.
2. system according to claim 1, which is characterized in that the data acquisition of subsystem includes two ways: people under chain Work be manually entered and in conjunction with Radio Frequency Identification Technology automatic collection;The data that subsystem acquires under chain include the product of production node The event information that information and product are generated in each supply chain link, including production, processing, storage, packaging, Transaction Information.
3. system according to claim 1, which is characterized in that the preserving type of subsystem data is using intelligent contract on chain Or each supply chain node difference record product traces and " chain transaction " form of Transaction Information, to ensure to provide INFORMATION DISCOVERY, power Four limit judgement, Information Authentication and information management basic functions.
4. system according to claim 1, which is characterized in that the permission arbitration functions, comprising: when the confession of certain link When chain node being answered to request subsystem data under the chain of certain product to other nodes, subsidiary submit using the private key of oneself to bright is needed The digital signature and public key of literary data, requested node first determine whether identity experimental evidence corresponds on the public key and chain, if Pass through, recycles the public key to carry out sign test to digital signature, judge whether requesting node has corresponding private key.
5. system according to claim 1, which is characterized in that clear data, with selecting product back-tracing code or intelligent contract Location.
6. system according to claim 1, which is characterized in that identify product identification, product back-tracing by product back-tracing code Code has uniqueness.
7. system according to claim 1, which is characterized in that enterprise customer saves entire area according to self-demand, selection Full of block chain data or only conservation zone build chain, participate in the operation and maintenance of block chain network.
8. system according to claim 1, which is characterized in that the consumer client runs the light node of block chain, The block head data for only saving block chain, are used as data verification.
9. the product back-tracing approaches to IM based on system described in one of claim 1-8, which is characterized in that including following Step:
Step 1, product supply chain information collection: when product passes through each link of supply chain, " the subsystem under chain of the link System " is responsible for acquisition, saves and manage detailed supply chain data;
Step 2, the information that " subsystem under chain " of each link extracts product, which deposits card, information position, authentication evidence etc., to be had The crucial tracing information of tamper-proof requirement, and upload to " subsystem on chain " based on block chain and save and manage;
Step 3, in product trading, recipient is gone through by the supply chain that the functional module of subsystem on chain obtains product to be received History information/list of locations, and complete supply chain details are obtained, realize information sharing;The functional module of subsystem on chain The safety for guaranteeing information sharing under chain, prevents the sensitive information leakage of supply chain manufacturer;
Step 4, consumer obtains the tracing information of product to be purchased by the system.
10. according to the method described in claim 9, it is characterized in that, the information deposits card using the tree-like formula generation of Merkel, leaf Node is the cryptographic Hash of subsystem data under different chains, and deposits card for Merkel's tree root value as information.
CN201810623432.6A 2018-06-16 2018-06-16 A kind of product back-tracing information management system and method based on block chain CN109034833A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810623432.6A CN109034833A (en) 2018-06-16 2018-06-16 A kind of product back-tracing information management system and method based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810623432.6A CN109034833A (en) 2018-06-16 2018-06-16 A kind of product back-tracing information management system and method based on block chain

Publications (1)

Publication Number Publication Date
CN109034833A true CN109034833A (en) 2018-12-18

Family

ID=64609945

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810623432.6A CN109034833A (en) 2018-06-16 2018-06-16 A kind of product back-tracing information management system and method based on block chain

Country Status (1)

Country Link
CN (1) CN109034833A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109831529A (en) * 2019-03-15 2019-05-31 北京世纪诚链科技有限公司 A kind of integrated architecture of cloud chain number
CN110289963A (en) * 2019-05-08 2019-09-27 重庆八戒电子商务有限公司 Merging under high concurrent is packaged the method that block chain and its verifying is recorded
CN110457875A (en) * 2019-07-31 2019-11-15 阿里巴巴集团控股有限公司 Data grant method and device based on block chain
CN110473096A (en) * 2019-07-31 2019-11-19 阿里巴巴集团控股有限公司 Data grant method and device based on intelligent contract
CN110473094A (en) * 2019-07-31 2019-11-19 阿里巴巴集团控股有限公司 Data grant method and device based on block chain
WO2019170174A3 (en) * 2019-06-27 2020-04-23 Alibaba Group Holding Limited Implementing blockchain-based workflow

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109831529A (en) * 2019-03-15 2019-05-31 北京世纪诚链科技有限公司 A kind of integrated architecture of cloud chain number
CN109831529B (en) * 2019-03-15 2020-05-12 北京世纪诚链科技有限公司 Cloud chain number integrated system structure
CN110289963A (en) * 2019-05-08 2019-09-27 重庆八戒电子商务有限公司 Merging under high concurrent is packaged the method that block chain and its verifying is recorded
WO2019170174A3 (en) * 2019-06-27 2020-04-23 Alibaba Group Holding Limited Implementing blockchain-based workflow
US10698738B1 (en) 2019-06-27 2020-06-30 Alibaba Group Holding Limited Implementing a blockchain-based workflow
CN110457875A (en) * 2019-07-31 2019-11-15 阿里巴巴集团控股有限公司 Data grant method and device based on block chain
CN110473096A (en) * 2019-07-31 2019-11-19 阿里巴巴集团控股有限公司 Data grant method and device based on intelligent contract
CN110473094A (en) * 2019-07-31 2019-11-19 阿里巴巴集团控股有限公司 Data grant method and device based on block chain

Similar Documents

Publication Publication Date Title
US9785369B1 (en) Multiple-link blockchain
US20170262864A1 (en) Methods and Systems for Making, Tracking and Authentication of Products
CN108701145B (en) System and method for digital identity management and admissions control in distributed network node
Banafa IoT and blockchain convergence: benefits and challenges
CN105103488B (en) By the policy Enforcement of associated data
Lustig et al. Algorithmic authority: The case of Bitcoin
JP2018186550A (en) Delay data access
BE1019683A3 (en) Method and system for authenticating entities using mobile devices.
WO2018032369A1 (en) Distributed photovoltaic power transaction platform based on block chain technology
CN102609846B (en) Anti-false verification method and system based on communication network
DE69932512T2 (en) Device and method for electronic shipping, storage and recovery of authenticated documents
WO2019010063A1 (en) Blockchain object interface
US20160203448A1 (en) Cryptocurrency verification system
US20160164884A1 (en) Cryptographic verification of provenance in a supply chain
CA2941280A1 (en) System and method for maintaining a segregated database in a multiple distributed ledger system
CN107330694A (en) Copyright trading system and method for commerce based on block chain
ES2224799B1 (en) Mutual safe authentication system.
CN101375284B (en) Secure data parser method and system
Ruffing et al. Liar, liar, coins on fire! Penalizing equivocation by loss of bitcoins
CN107690798A (en) The invalid participant of automatic identification in secure synchronization system
CN107369008A (en) For improving management method, the apparatus and system of bill business security
Hasan et al. Proof of delivery of digital assets using blockchain and smart contracts
CN102932136B (en) Systems and methods for managing cryptographic keys
Hamida et al. Blockchain for enterprise: overview, opportunities and challenges
US20160162897A1 (en) System and method for user authentication using crypto-currency transactions as access tokens

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination