CN109146524A - A kind of agricultural product using block chain technology are traced to the source information security solution - Google Patents

A kind of agricultural product using block chain technology are traced to the source information security solution Download PDF

Info

Publication number
CN109146524A
CN109146524A CN201810960917.4A CN201810960917A CN109146524A CN 109146524 A CN109146524 A CN 109146524A CN 201810960917 A CN201810960917 A CN 201810960917A CN 109146524 A CN109146524 A CN 109146524A
Authority
CN
China
Prior art keywords
block
source
entity terminal
agricultural product
common recognition
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810960917.4A
Other languages
Chinese (zh)
Inventor
乔蕊
宋桂成
秦泽华
崔春英
秦杰
李宏利
刘了
刘了一
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhoukou Normal University
Original Assignee
Zhoukou Normal University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhoukou Normal University filed Critical Zhoukou Normal University
Priority to CN201810960917.4A priority Critical patent/CN109146524A/en
Publication of CN109146524A publication Critical patent/CN109146524A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
    • G06Q50/02Agriculture; Fishing; Mining
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/126Applying verification of the received information the source of the received data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3242Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Abstract

Field of information security technology is traced to the source the present invention relates to agricultural product more particularly to a kind of agricultural product using block chain technology are traced to the source information security solution.The described method includes: improving common recognition mechanism, obtain improved common recognition mechanism, the improved common recognition mechanism are as follows: when all entity terminals all hold the block of verifying to be committed, in order to allow itself Income Maximum, any entity terminal can not all change the verification result that itself is packaged the block generated to other entity terminals;Multistage is carried out to trace to the source Information Authentication;It accesses permission control with more private key rules;Information Authentication is traced to the source by improved common recognition mechanism, multistage and more private key rules access permission control, realizes distributed book keeping operation.The present invention solves the problems, such as data storage security present in agricultural product traceability system.

Description

A kind of agricultural product using block chain technology are traced to the source information security solution
Technical field
It traces to the source field of information security technology the present invention relates to agricultural product, more particularly to a kind of is applied to agricultural product traceability system The agricultural product using block chain technology trace to the source information security solution.
Background technique
The construction of agricultural product traceability system is the important means for managing and controlling agricultural product security problem, this kind of system frequently with RFID, two dimensional code have low cost, the advantage of fast reading and writing, but face many threats, including come from object as label of tracing to the source Manage environment, hardware and software failure, maloperation or operation error, management absence, malicious code and virus, rights management loophole, hacker Attack technology, inside such as are divulged a secret, illegally distort and deny at many aspects.These threaten to trace to the source to agricultural product and trace to the source in service system The integrality of information, reliabilty and availability etc. cause huge damage.Therefore, the trace to the source safety of information of agricultural product can chase after Trace back, information anti-fake of tracing to the source makes, it is anti-tamper be key problem urgently to be resolved in agricultural product traceability system.
Existing tracing technology is primarily upon front end and traces to the source, product information central database it is centrally stored and processing, exist A possibility that chip content is replicated or database is broken, and may further cause other safe prestige by Single Point of Faliure The side of body.
Currently, part researcher introduces safety measure in traceability system, generally use central database and access control, The security means that the traditional cryptographies methods such as access authentication, information encryption, digital watermarking combine.For example, document (Liu Jia, Xu Dan Rather, Shi Yuqiang, waits animal product traceability system Research of Authentication Techniques [J] the guangdong agricultural science of based on RFID, and 2014,41 (14): 179-182. the animal product based on RFID technique) is had studied to trace to the source the access authentication technique of scheme, devise one it is suitable For the high efficient and reliable RFID certificate scheme that inexpensive animal product is traced to the source, the privacy of tag identity ensure that, to a certain extent The forgery of label is prevented, but does not consider that the back-end data base verification process of centralization still has the possibility distorted by attacker Property.(Long Chenfeng, Lei Jian, Yang Xin wait to study the Hunan [J] based on digital watermarking-two-dimension code label yellow tea traceability system to document Agriculture university's journal: natural science edition, 2015,41 (5): 565-568.) two-dimension code label is directed to as unique anti-fake load of tracing to the source The problem of recognition of decoding standard recognizer can not be opened after body encryption, proposes the watermark insertion based on Arnold scramble and DCT Production information can be written in plain text while realizing anti-fake for algorithm.But this method is unable to satisfy product stream and traces to the source the dynamic of information Variation, furthermore fake producer can realize anti-counterfeiting information recycling by recycling Brand packaging easily.Block chain technology is by going Centralization and the mode for going trust realize data information security reliable transmission, can be very good to solve to ask existing for above-mentioned document Topic, block chain schematic diagram are as shown in Figure 1.
Summary of the invention
In view of the above-mentioned problems, the present invention proposes a kind of solution of agricultural product traceability system safety problem based on block chain technology Certainly method can effectively solve the problems, such as the data storage security of the agricultural product traceability system based on block chain technology.
To achieve the goals above, the invention adopts the following technical scheme:
A kind of agricultural product using block chain technology are traced to the source information security solution, comprising:
Improve common recognition mechanism, obtain improved common recognition mechanism, the improved common recognition mechanism are as follows: when all entity terminals all Hold the block of verifying to be committed, in order to allow itself Income Maximum, any entity terminal can not all change itself to other realities Body terminal is packaged the verification result of the block generated;
Multistage is carried out to trace to the source Information Authentication;
It accesses permission control with more private key rules;
Information Authentication is traced to the source by improved common recognition mechanism, multistage and more private key rules access permission control, is realized Distribution book keeping operation.
Further, before improving common recognition mechanism, further includes: model to obtain problem model by problem;
Described problem model are as follows:
u1∨u2∨...∨un=1, (ui∈U) (7)
PL(t1,t2, k) and=P { SL(t1,t2)=k }, (0≤t1<t2, k=0,1,2 ...) and (8)
Wherein, λ is the average value for the unit time reaching attack, and μ is parameter, and U is traceability system middle peasant product traceability coding Set, U={ u1,u2,…un, ui.state the state of coding of tracing to the source, u are indicatedi.state { -1,0,1 } ∈, i ∈ [1, n], ui.state three kinds of values respectively correspond trace to the source coding distort, it is unchanged and forgery three kinds of situations;L is traceability system peace Full service condition, SL(t1,t2) description system [t in the case where meeting safe operating conditions L1,t2] in time range by various attacks Infringement degree, PL(t1,t2, k) and it is traceability system [t in the case where meeting safe operating conditions L1,t2] coding of tracing to the source in time range The probability distorted or forged by k times, RB(S) risks and assumptions run at security algorithm B for system, pn(t) it indicates in t Carve the probability that traceability system has been attacked by n attacker.
Further, the improvement common recognition mechanism includes:
If epicycle, which calculates the time, not yet to be terminated, for the A occurred earliesti∈ A, and make ui(Si1,…Sij,…,Sin)=n, Then choose AiThe block generated is packaged as epicycle common recognition block;
If epicycle, which calculates the time, have been terminated,So that n > ui(Si1,…Sij,…,Sin)>uj(Sj1,… Sji,…,Sjn), then choose AiThe block generated is packaged as epicycle common recognition block;
If epicycle, which calculates the time, have been terminated,Aj,So that n > ui(Si1,…Sij,…,Sin)=uj(Sj1,… Sji,…,Sjn)>uk(Sk1,…Skj,…,Skn), then from Ai、AjIt is packaged to choose in the block generated and reaches u earliestiThe area of current value Block is as epicycle common recognition block;
Wherein, Ai、AjFor entity terminal, and AjFor authentication entity terminal, A={ A1,A2,...,AnIt is entity in system The set of terminal, (Sj1,…Sji,…,Sjn) it is by AiEach entity terminal authentication combination for the block composition being packaged, SijFor AjTo AiSubmit the verification result of block;
The SijMeet:
Further, progress multistage Information Authentication of tracing to the source includes:
Following multistage is arranged for each input of transaction to trace to the source Information Authentication rule:
Whether the agricultural product that sale is attempted in verifying belong to the agricultural product of current state S, if otherwise entering error status;
It verifies to whether the signature of this transaction is the agricultural product owner, if otherwise entering error status;
Verify whether the agricultural product quantity possessed is less than the agricultural product quantity for attempting sale, if then entering error status; If otherwise entering new state S', and the owning amount of agricultural product is that former owning amount subtracts sales volume under new state S';
Whether farm produce sale amount is 0 under verifying creation stateful transaction, if then entering error status.
Further, it is described with more private key rules access permission control include:
Distribute the communication that key pair is used for adjacent entities terminal room for each entity terminal;
Two adjacent entities terminals, when communicating between entity terminal i and entity terminal i+1, wherein entity terminal i is to send Side, entity terminal i+1 is recipient, and the key pair of entity terminal i is (PKi,SKi), wherein PKiFor the public affairs of entity terminal i Key, SKiFor the private key of entity terminal i, by the way of secondary hash iteration, by the public key and message S of sender's entity terminal ii Input as hash function simultaneously, obtains the hash operation message authentication code HMAC that can be used as characteristic value, calculation method is as follows:
Wherein, SiFor the information of tracing to the source that entity terminal i generates, H is hash function, and opad and ipad are two different pre- First specified character string,Indicate that exclusive or , ∣ indicates connection;
With the private key SK of sender's entity terminal iiIt signs to the HMAC obtained by formula (14), entity terminal i will The HMAC and message text that sender signed send entity terminal i+1 to together.
Further, described Information Authentication to be traced to the source by improved common recognition mechanism, multistage and more private key rules access Permission control realizes that distributed book keeping operation includes:
It traces to the source Information Authentication rule creation New Transaction according to the multistage of each input of transaction, and whole by sender's entity The transaction data of New Transaction is packaged into block b by end;
Sender's entity terminal broadcasts block b by P2P network;
P2P network each entity terminal passes through the validity of block validation verification proof of algorithm block b, and according to improved Common recognition mechanism selects the common recognition block that each wheel obtains;
Verification result is broadcasted by P2P network;
Block b is linked on existing block chain C by way of hash function and synchronized update is to each entity terminal, Realize the distributed book keeping operation of transaction.
Further, the block validation verification algorithm includes:
If the block b exist and wound generation block be not it is empty, by block b four-tuple<s, t', c, len>expression, Middle s is that block generates serial number, and t' indicates to trace to the source the type of transaction of different entities terminal room transaction in chain, and c is according to standard of tracing to the source The coded format of obtained code of tracing to the source, len are the length of single transaction in newborn block, are traced to the source Information Authentication rule according to multistage Block b is verified, is accessed permission control with more private key rules, is deposited by entity terminal i and entity terminal i+1 are local Tracing to the source for storage encodes SiAnd Si' and the public key of entity terminal i calculate separately hash operation message authentication code, if the verifying to block By and calculate two hash operation message authentication codes it is equal, then block b is linked to the end of block chain C, is otherwise prompted Error.
Compared with prior art, the invention has the benefit that
A kind of agricultural product using block chain technology of the invention are traced to the source information security solution, are passed through and are improved common recognition machine System is kept accounts using distributed network and ensures that agricultural product are traced to the source the data integrity and reliability of information;It is traced to the source information by multistage Verifying, guarantee information of tracing to the source can not distort;It accesses permission control with more private key rules, can effectively prevent attacker couple The unauthorized change of information of tracing to the source account book, to improve the confidence level for information of tracing to the source.By the above-mentioned means, the present invention solves agriculture Data storage security problem present in product traceability system.
Detailed description of the invention
Fig. 1 is block chain schematic diagram.
Fig. 2 is that a kind of agricultural product using block chain technology of the embodiment of the present invention are traced to the source the base of information security solution This flow chart.
Fig. 3 is that a kind of agricultural product using block chain technology of further embodiment of this invention are traced to the source information security solution Basic flow chart.
Fig. 4 is that a kind of agricultural product using block chain technology of the embodiment of the present invention are traced to the source the phase of information security solution Adjacent entity terminal communication scheme.
Fig. 5 be the embodiment of the present invention a kind of agricultural product using block chain technology trace to the source information security solution point Cloth book keeping operation schematic diagram.
Specific embodiment
With reference to the accompanying drawing with specific embodiment the present invention will be further explained explanation:
Embodiment one
The information security solution as shown in Fig. 2, a kind of agricultural product using block chain technology of the invention are traced to the source, packet It includes:
Step S101: common recognition mechanism is improved, improved common recognition mechanism, the improved common recognition mechanism are obtained are as follows: when all Entity terminal all holds the block of verifying to be committed, in order to allow itself Income Maximum, any entity terminal can not all change from Body is packaged the verification result of the block generated to other entity terminals.
The improvement common recognition mechanism includes:
If epicycle, which calculates the time, not yet to be terminated, for the A occurred earliesti∈ A, and make ui(Si1,…Sij,…,Sin)=n, Then choose AiThe block generated is packaged as epicycle common recognition block;
If epicycle, which calculates the time, have been terminated,So that n > ui(Si1,…Sij,…,Sin)>uj(Sj1,… Sji,…,Sjn), then choose AiThe block generated is packaged as epicycle common recognition block;
If epicycle, which calculates the time, have been terminated,Aj,So that n > ui(Si1,…Sij,…,Sin)=uj(Sj1,… Sji,…,Sjn)>uk(Sk1,…Skj,…,Skn), then from Ai、AjIt is packaged to choose in the block generated and reaches u earliestiThe area of current value Block is as epicycle common recognition block;
Wherein, Ai、AjFor entity terminal, and AjFor authentication entity terminal, A={ A1,A2,...,AnIt is entity in system The set of terminal, (Sj1,…Sji,…,Sjn) it is by AiEach entity terminal authentication combination for the block composition being packaged, SijFor AjTo AiSubmit the verification result of block;
The SijMeet:
Step S102: it carries out multistage and traces to the source Information Authentication.
Progress multistage Information Authentication of tracing to the source includes:
Following multistage is arranged for each input of transaction to trace to the source Information Authentication rule:
Whether the agricultural product that sale is attempted in verifying belong to the agricultural product of current state S, if otherwise entering error status;
It verifies to whether the signature of this transaction is the agricultural product owner, if otherwise entering error status;
Verify whether the agricultural product quantity possessed is less than the agricultural product quantity for attempting sale, if then entering error status; If otherwise entering new state S', and the owning amount of agricultural product is that former owning amount subtracts sales volume under new state S';
Whether farm produce sale amount is 0 under verifying creation stateful transaction, if then entering error status.
Step S103: it accesses permission control with more private key rules.
It is described with more private key rules access permission control include:
Distribute the communication that key pair is used for adjacent entities terminal room for each entity terminal;
Two adjacent entities terminals, when communicating between entity terminal i and entity terminal i+1, wherein entity terminal i is to send Side, entity terminal i+1 is recipient, and the key pair of entity terminal i is (PKi,SKi), wherein PKiFor the public affairs of entity terminal i Key, SKiFor the private key of entity terminal i, by the way of secondary hash iteration, by the public key and message S of sender's entity terminal ii Input as hash function simultaneously, obtains the hash operation message authentication code HMAC that can be used as characteristic value, calculation method is as follows:
Wherein, SiFor the information of tracing to the source that entity terminal i generates, H is hash function, and opad and ipad are two different pre- First specified character string,Indicate that exclusive or , ∣ indicates connection;
With the private key SK of sender's entity terminal iiIt signs to the HMAC obtained by formula (14), entity terminal i will The HMAC and message text that sender signed send entity terminal i+1 to together.
Permission that step S104: tracing to the source Information Authentication by improved common recognition mechanism, multistage and more private key rules access Distributed book keeping operation is realized in control.
It is described Information Authentication to be traced to the source by improved common recognition mechanism, multistage and more private key rules access permission control, Realize that distributed book keeping operation includes:
It traces to the source Information Authentication rule creation New Transaction according to the multistage of each input of transaction, and whole by sender's entity The transaction data of New Transaction is packaged into block b by end;
Sender's entity terminal broadcasts block b by P2P network;
P2P network each entity terminal passes through the validity of block validation verification proof of algorithm block b, and according to improved Common recognition mechanism selects the common recognition block that each wheel obtains;The block validation verification algorithm includes:
If the block b exist and wound generation block be not it is empty, by block b four-tuple<s, t', c, len>expression, Middle s is that block generates serial number, and t' indicates to trace to the source the type of transaction of different entities terminal room transaction in chain, and c is according to standard of tracing to the source The coded format of obtained code of tracing to the source, len are the length of single transaction in newborn block, are traced to the source Information Authentication rule according to multistage Block b is verified, is accessed permission control with more private key rules, is deposited by entity terminal i and entity terminal i+1 are local Tracing to the source for storage encodes SiAnd Si' and the public key of entity terminal i calculate separately hash operation message authentication code, if the verifying to block By and calculate two hash operation message authentication codes it is equal, then block b is linked to the end of block chain C, is otherwise prompted Error;
Verification result is broadcasted by P2P network;
Block b is linked on existing block chain C by way of hash function and synchronized update is to each entity terminal, Realize the distributed book keeping operation of transaction.
Embodiment two
As shown in figure 3, another kind of the invention is traced to the source information security solution using the agricultural product of block chain technology, packet It includes:
Step S201: it models to obtain problem model by problem.
The agricultural product security threat that information system faces of tracing to the source has the feature that
(1) attack source is unlimited, and each attacker individually arrives, and independently of each other, and attack stream is steady, does not consider peak occur The case where phase or idle periods;
(2) arrival of attacker meets the Poisson distribution that parameter is λ, and wherein λ is the average value for the unit time reaching attack;
(3) information of tracing to the source caused by attack every time distorts situation obedience parametermQuantum condition entropy;
(4) time interval that attack reaches every time is destroyed mutually indepedent with caused by.
If entity terminal number is M in traceability system, U is the set of system middle peasant product coding, U={ u1,u2,…un,Including two codomains, ui.code corresponding product traceability coding, u are indicatedi.state the state of coding of tracing to the source is indicated, ui.state ∈ { -1,0,1 } (i ∈ N), three kinds of values respectively correspond trace to the source coding distort, it is unchanged and forgery three kinds of feelings Condition;L is system safety operation condition, SL(t1,t2) description system [t in the case where meeting safe operating conditions L1,t2] in time range By the infringement degree of various attacks, PL(t1,t2, k) and it is system [t in the case where meeting safe operating conditions L1,t2] in time range The probability that coding of tracing to the source is distorted or forged by k times, RB(S) risks and assumptions run at security algorithm B for system, Huo Chengwei The robustness of system, uses pn(t) probability attacked by n attacker in t moment system is indicated.
From the foregoing, it will be observed that the probability for having an attacker to reach in [t, t+ Δ t] time interval is λ when Δ t is sufficiently small Δt.Therefore, in t+ time Δt, the probability that system is attacked by n attacker is pn(t+ Δ t), has:
pn(t+ Δ t)=pn(t)(1-λΔt-mΔt)+pn+1(t)mDt+o(Dt)
Dt → 0 is enabled, is obtained:
As n=0, at the t+Dt moment, the not no state of attacker in system, is divided into following three kinds of mutually independent feelings Condition:
(1) moment t system is not attacked, and does not also occur new attack in [t, t+Dt], and probability is (1- λ Dt) p0(t);
(2) moment t system is not attacked, and occurs a new attack in [t, t+Dt], and probability is λ Dt μ Dtp0 (t);
(3) moment t system is attacked, and does not occur new attack in [t, t+Dt], and probability is (1- λ Dt) μ Dtp1 (t)。
To have:
Therefore, pn(t) formula (1) and (2) should be obeyed.
Enable the corresponding three kinds of situations of the state value of coding:
Then SL(t1,t2) can be calculated by following formula:
The problem of present invention establishes model is as follows:
u1∨u2∨...∨un=1, (ui∈U) (7)
PL(t1,t2, k) and=P { SL(t1,t2)=k }, (0≤t1<t2, k=0,1,2 ...) and (8)
Formula (5) is the probability equation group that t moment system has been attacked by n attacker;Formula (6) is system infringement degree Constraint function;Formula (7) is system restriction function, it is desirable that at least there is a coding of tracing to the source;Formula (8) is time [t1,t2] in occur The probability that k coding of tracing to the source is destroyed;Formula (9) is aims of systems constraint function, is attacked to measure system in a period of time The average case hit, the value is smaller, illustrates system robustness with higher.
The conventional ciphers such as centralization database purchase mode combination access control, access authentication, information encryption, digital watermarking The security means that method combines, the promotion of available system secure storage performance interior to a certain degree, but not can avoid system Security threat caused by potential loophole that may be present and staff's malicious sabotage, thus can not fundamentally solve above-mentioned The dynamic data storage safety problem of formula (5)~(9) description.Therefore the present invention proposes to deposit dynamic data based on block chain technology The method that storage mechanism optimizes.
Step S202: common recognition mechanism is improved, improved common recognition mechanism, the improved common recognition mechanism are obtained are as follows: when all Entity terminal all holds the block of verifying to be committed, in order to allow itself Income Maximum, any entity terminal can not all change from Body is packaged the verification result of the block generated to other entity terminals.
The Core Superiority of block chain technology swashs first is that can use in the decentralization system of decision-making power high degree of dispersion Mechanism is encouraged, the validity for making each entity terminal efficiently be directed to block data is reached common understanding.But the mechanism is traced to the source body in agricultural product Application in system exists obvious insufficient.By research so that the local behavior that common recognition terminal maximizes self benefits is traced to the source with guarantee The relationship of security of system and validity overall goals, it can be deduced that such as draw a conclusion: when all entity terminals all hold it is to be committed The block of verifying, in order to allow itself Income Maximum, either party, which can not change itself and is packaged to other entity terminals, is generated Block verification result.Its mathematical form is described as follows:
In agricultural product traceability system, A={ A1,A2,…,AnBe terminal in system set, the terminal is that entity is whole End.Certain terminal AiThe packing block of submission obtains the combination of other terminal authentications and its income set Gi={ Si1,…,Sin:ui} It indicates.By some terminal AiEach terminal authentication combination (S for the block composition being packagedi1,…,Sin) in, any participation verifying Square AjTo AiThe verification result of block is submitted to be expressed as Sij, and meet:
It then obtains wheel block book keeping operation power and is divided into several situations:
(1) the epicycle calculating time not yet terminates, for the A occurred earliesti∈ A, and make ui(Si1,…,Sij,…,Sin)= N then chooses AiBeing packaged the block generated is epicycle common recognition block, that is, chooses the block for passing through all terminal authentications of system earliest;
(2) the epicycle calculating time has terminated,So that n > ui(Si1,…,Sij,…,Sin)>uj(Sj1,…, Sji,…Sjn), then choose AiBeing packaged the block generated is epicycle common recognition block, that is, chooses and obtain most through all terminal authentications of system The block of big income;
(3) the epicycle calculating time has terminated,So that n > ui(Si1,…,Sij,…,Sin)=uj (Sj1,…,Sji,…Sjn)>uk(Sk1,…,Skj,…Skn), then from Ai, AjIt is packaged to choose in the block generated and reaches u earliestiWhen The block of preceding value is epicycle common recognition block, that is, chooses the block for obtaining maximum returns through all terminal authentications of system earliest.
Step S203: it carries out multistage and traces to the source Information Authentication, comprising:
Goods entry, stock and sales account book can also be considered as a state transition system from technological layer in agricultural product traceability system, The system includes all existing agricultural product ownership " state " and " state transition function ", and associated description is given below.
The agricultural product that " state " of agricultural product traceability system is all encoded, distributed storages, does not sell The set of (Unsale Agriculture Products Outputs, UAPO).Every class UAPO has a number and owns Person is defined by the public key of 20 bytes here.One transaction includes one or more input/output.It is each defeated Enter comprising one to the reference of existing UAPO and is signed by the cryptography of private key corresponding with owner address creation, it is each defeated The UAPO being newly added in state comprising one out.
Agricultural product traceability system state transition function is defined as follows:
APPLY (S, TX) → S'or ERROR (13)
For each input of transaction be defined as follows multistage trace to the source Information Authentication rule:
Rule 1:
Regular 2:SIGN (UAPO) ≠ SIGNowner (UAPO) → ERROR;
Rule 3:
Rule 4:
Rule 5:
1 expression of rule enters error status if attempting to sell the agricultural product for being not belonging to current state S, prevents the hair of transaction The person of sending sells the agricultural product being not present;Rule 2 is prevented for verifying to whether the signature of this transaction is the agricultural product owner The sender only to trade sells other people agricultural product;Rule 3,4,5 ensures to be worth conservation: if the agricultural product quantity possessed is less than The agricultural product quantity for attempting sale enters error status by rule 3;Otherwise new state S', and agriculture under the state are entered by rule 4 The owning amount of product is that former owning amount subtracts sales volume;It is 0 that rule 5, which shows only to allow agricultural product owning amount under creation state, no Allowing certain transaction farm produce sale amount is 0, and system is avoided a large amount of meaningless transaction bring system Denial of Service attack occur.
Step S204: it accesses permission control with more private key rules, comprising:
The present invention supports data information dynamically to repair when adjacent entities terminal room transmits using multistage access control model Change, the process of exchange of agricultural product can regard the conversion of agricultural product state described in step S103 as.
It in the present invention, is that each entity generates key pair between adjacent level in traceability system by cipher key distribution mechanism Communication, and adjacent entity terminal is only allowed to be communicated.For two adjacent entities terminal is and entity in agricultural-product supply-chain The communication of terminal i+1, adjacent entities terminal room is as shown in Figure 4.And entity terminal i is sender, the key pair of entity terminal i is (PKi,SKi), wherein PKiFor the public key of entity terminal i, SKiFor the private key of entity terminal i, entity terminal i+1 is recipient, real What body terminal i generated traces to the source information as SiIf carrying out signature to information of completely tracing to the source will lead to both sides defect, on the one hand The corresponding digital signature of storage full message generally requires a large amount of space, on the other hand using asymmetric encryption techniques to complete Message progress computations expense is larger, and processing speed is slower.Therefore the adjacent gradation entity terminal in agricultural product traceability system Between when communicating, by the way of secondary hash iteration, by sender's public key and message SiInput as hash function simultaneously, obtains To can be used as characteristic value hash operation message authentication code (Hash based Message Authentication Code, HMAC),
Calculation method is as follows:
Wherein, PKiIt is sender's public key, SiThe message that will be sent, H is hash function, opad and ipad be two not Same preassigned character string,Indicate that exclusive or , ∣ indicates connection.
It is signed with the private key of sender to the message authentication code obtained by formula (14), the Hash fortune signed Message authentication code is calculated, since data volume is less, it is ensured that this calculating process is very fast.The Hash operation that entity terminal i will be signed Message authentication code, message text send entity terminal i+1 to together.
Permission that step S205: tracing to the source Information Authentication by improved common recognition mechanism, multistage and more private key rules access Distributed book keeping operation is realized in control, is completed agricultural product and is traced to the source information security storage.
Distributed accounting procedure can be described as Fig. 5, one entity terminal of each node on behalf, and the account of each node is entitled Its public key signs to authenticated information using the private key of oneself.
Detailed process is as follows for distribution book keeping operation:
It traces to the source Information Authentication rule creation New Transaction according to the multistage of each input of transaction, and whole by sender's entity The transaction data of New Transaction is packaged into block b by end;
Sender's entity terminal broadcasts block b by P2P network;
P2P network each entity terminal passes through the validity of block validation verification proof of algorithm block b, and according to improved Common recognition mechanism selects the common recognition block that each wheel obtains;
Verification result is broadcasted by P2P network;
Block b is linked on existing block chain C by way of hash function and synchronized update is to each entity terminal, Realize the distributed book keeping operation of transaction.
Newly generated block b four-tuple<s, t', c, len>expression, s are that block generates serial number, and t' expression is traced to the source in chain The type of transaction traded between different levels, c are the coded format of the code of tracing to the source obtained according to the standard of tracing to the source, and len is newborn block The length of middle single transaction.It creates the presence of generation block and newborn block non-empty, block validation verification algorithm is as follows.
Block validation verification algorithm:
Input: block chain C, newly-generated block b;
Output: if wound generation block is not present or new block b is not present, miscue is returned to;If new block b is legal, return Block chain C after new block is added;If b is illegal, b is returned.
Function V (x) receiving currently trades and is wrapped into block b, if block b exists and wound generation block is not sky, Block b four-tuple < s, t', c, len > is indicated, block b is verified according to multistage Information Authentication rule of tracing to the source, is used More private key rules access permission control, encode S by tracing to the source of being locally stored of entity terminal i and entity terminal i+1iAnd Si' and The public key of entity terminal i calculates separately hash operation message authentication code, if to two for being verified and the calculating Hash of block Operation message authentication code is equal, then block b is linked to the end of block chain C, otherwise prompt error.
The present invention proposes to carry out storage and management to agricultural product data of tracing to the source based on block chain technology, and all agricultural product trace back Source data and operation on it are all permanently charged to block chain data block and are accessed for authorized user.Where these data Block be synchronized to be stored in each of system and participate in the entity terminal of operation, all these entity terminals constitute agricultural production Product are traced to the source data-storage system and its tough and tensile distributed data base system, and the data of any one entity terminal, which are destroyed, all may be used It is verified with only accessing part entity terminal in database;Meanwhile because other healthy entity terminals all save completely Database, the dynamic data block of any one entity terminal is destroyed the normal operation that all will not influence entire database. Therefore, a kind of agricultural product using block chain technology proposed by the present invention are traced to the source the agriculture of information security solution very good solution Data storage security problem present in product traceability system.
Illustrated above is only the preferred embodiment of the present invention, it is noted that for the ordinary skill people of the art For member, various improvements and modifications may be made without departing from the principle of the present invention, these improvements and modifications are also answered It is considered as protection scope of the present invention.

Claims (7)

  1. The information security solution 1. a kind of agricultural product using block chain technology are traced to the source characterized by comprising
    Common recognition mechanism is improved, obtains improved common recognition mechanism, the improved common recognition mechanism are as follows: when all entity terminals are all held The block of verifying to be committed, in order to allow itself Income Maximum, any entity terminal can not all change itself to other entities end End is packaged the verification result of the block generated;
    Multistage is carried out to trace to the source Information Authentication;
    It accesses permission control with more private key rules;
    Information Authentication is traced to the source by improved common recognition mechanism, multistage and more private key rules access permission control, realizes distribution Formula book keeping operation.
  2. The information security solution 2. a kind of agricultural product using block chain technology according to claim 1 are traced to the source, it is special Sign is, before improving common recognition mechanism, further includes: model to obtain problem model by problem;
    Described problem model are as follows:
    u1∨u2∨...∨un=1, (ui∈U) (7)
    PL(t1,t2, k) and=P { SL(t1,t2)=k }, (0≤t1<t2, k=0,1,2 ...) and (8)
    Wherein, λ is the average value for the unit time reaching attack, and μ is parameter, and U is the collection of traceability system middle peasant product traceability coding It closes, U={ u1,u2,…un, ui.state the state of coding of tracing to the source, u are indicatedi.state { -1,0,1 } ∈, i ∈ [1, n], ui.state three kinds of values respectively correspond trace to the source coding distort, it is unchanged and forgery three kinds of situations;L is traceability system peace Full service condition, SL(t1,t2) description system [t in the case where meeting safe operating conditions L1,t2] in time range by various attacks Infringement degree, PL(t1,t2, k) and it is traceability system [t in the case where meeting safe operating conditions L1,t2] coding of tracing to the source in time range The probability distorted or forged by k times, RB(S) risks and assumptions run at security algorithm B for system, pn(t) it indicates in t Carve the probability that traceability system has been attacked by n attacker.
  3. The information security solution 3. a kind of agricultural product using block chain technology according to claim 2 are traced to the source, it is special Sign is that the improvement common recognition mechanism includes:
    If epicycle, which calculates the time, not yet to be terminated, for the A occurred earliesti∈ A, and make ui(Si1,…Sij,…,Sin)=n, then select Take AiThe block generated is packaged as epicycle common recognition block;
    If epicycle, which calculates the time, have been terminated,So that n > ui(Si1,…Sij,…,Sin)>uj(Sj1,… Sji,…,Sjn), then choose AiThe block generated is packaged as epicycle common recognition block;
    If epicycle, which calculates the time, have been terminated,So that n > ui(Si1,…Sij,…,Sin)=uj(Sj1,… Sji,…,Sjn)>uk(Sk1,…Skj,…,Skn), then from Ai、AjIt is packaged to choose in the block generated and reaches u earliestiThe area of current value Block is as epicycle common recognition block;
    Wherein, Ai、AjFor entity terminal, and AjFor authentication entity terminal, A={ A1,A2,...,AnIt is entity terminal in system Set, (Sj1,…Sji,…,Sjn) it is by AiEach entity terminal authentication combination for the block composition being packaged, SijFor AjTo Ai Submit the verification result of block;
    The SijMeet:
  4. The information security solution 4. a kind of agricultural product using block chain technology according to claim 1 are traced to the source, it is special Sign is, progress multistage Information Authentication of tracing to the source includes:
    Following multistage is arranged for each input of transaction to trace to the source Information Authentication rule:
    Whether the agricultural product that sale is attempted in verifying belong to the agricultural product of current state S, if otherwise entering error status;
    It verifies to whether the signature of this transaction is the agricultural product owner, if otherwise entering error status;
    Verify whether the agricultural product quantity possessed is less than the agricultural product quantity for attempting sale, if then entering error status;If not Then enter new state S', and the owning amount of agricultural product is that former owning amount subtracts sales volume under new state S';
    Whether farm produce sale amount is 0 under verifying creation stateful transaction, if then entering error status.
  5. The information security solution 5. a kind of agricultural product using block chain technology according to claim 1 are traced to the source, it is special Sign is, described to include: with the permission control that accesses of more private key rules
    Distribute the communication that key pair is used for adjacent entities terminal room for each entity terminal;
    Two adjacent entities terminals, when communicating between entity terminal i and entity terminal i+1, wherein entity terminal i is sender, real Body terminal i+1 is recipient, and the key pair of entity terminal i is (PKi,SKi), wherein PKiFor the public key of entity terminal i, SKi For the private key of entity terminal i, by the way of secondary hash iteration, by the public key and message S of sender's entity terminal iiSimultaneously As the input of hash function, the hash operation message authentication code HMAC that can be used as characteristic value is obtained, calculation method is as follows:
    Wherein, SiFor the information of tracing to the source that entity terminal i generates, H is hash function, and opad and ipad are two different preparatory fingers Fixed character string,Indicate that exclusive or , ∣ indicates connection;
    With the private key SK of sender's entity terminal iiIt signs to the HMAC obtained by formula (14), entity terminal i is by sender The HMAC and message text to sign sends entity terminal i+1 to together.
  6. The information security solution 6. a kind of agricultural product using block chain technology according to claim 3 are traced to the source, it is special Sign is, described by improved common recognition mechanism, multistage to trace to the source Information Authentication and more private key rules access permission control, real Existing distribution, which is kept accounts, includes:
    It traces to the source Information Authentication rule creation New Transaction according to the multistage of each input of transaction, and will by sender's entity terminal The transaction data of New Transaction is packaged into block b;
    Sender's entity terminal broadcasts block b by P2P network;
    P2P network each entity terminal passes through the validity of block validation verification proof of algorithm block b, and according to improved common recognition Mechanism selects the common recognition block that each wheel obtains;
    Verification result is broadcasted by P2P network;
    Block b is linked on existing block chain C by way of hash function and synchronized update is to each entity terminal, is realized The distributed book keeping operation of transaction.
  7. The information security solution 7. a kind of agricultural product using block chain technology according to claim 6 are traced to the source, it is special Sign is that the block validation verification algorithm includes:
    If the block b exist and wound generation block be not it is empty, by block b four-tuple < s, t', c, len > expression, wherein s be Block generates serial number, and t' indicates to trace to the source the type of transaction of different entities terminal room transaction in chain, and the c foundation standard of tracing to the source obtains It traces to the source the coded format of code, len is the length of single transaction in newborn block, traces to the source Information Authentication rule to block according to multistage B is verified, and is accessed permission control with more private key rules, is traced back by what entity terminal i and entity terminal i+1 were locally stored Source code SiAnd Si' and the public key of entity terminal i calculate separately hash operation message authentication code, if to block be verified and Two hash operation message authentication codes calculated are equal, then block b is linked to the end of block chain C, otherwise prompt error.
CN201810960917.4A 2018-08-22 2018-08-22 A kind of agricultural product using block chain technology are traced to the source information security solution Pending CN109146524A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810960917.4A CN109146524A (en) 2018-08-22 2018-08-22 A kind of agricultural product using block chain technology are traced to the source information security solution

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810960917.4A CN109146524A (en) 2018-08-22 2018-08-22 A kind of agricultural product using block chain technology are traced to the source information security solution

Publications (1)

Publication Number Publication Date
CN109146524A true CN109146524A (en) 2019-01-04

Family

ID=64790754

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810960917.4A Pending CN109146524A (en) 2018-08-22 2018-08-22 A kind of agricultural product using block chain technology are traced to the source information security solution

Country Status (1)

Country Link
CN (1) CN109146524A (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110008720A (en) * 2019-03-19 2019-07-12 周口师范学院 Internet of Things dynamic data source tracing method and device based on alliance's chain
CN110515591A (en) * 2019-08-05 2019-11-29 湖南天河国云科技有限公司 Random digit generation method and device based on block chain
CN110569654A (en) * 2019-08-30 2019-12-13 广州奇化有限公司 Block chain credible data processing method and device for supply chain quick response mode
CN110852745A (en) * 2019-10-12 2020-02-28 杭州云象网络技术有限公司 Block chain distributed dynamic network key automatic updating method
CN111163064A (en) * 2019-12-13 2020-05-15 厦门市美亚柏科信息股份有限公司 Block chain-based internet information tracing method and computer-readable storage medium
CN111383033A (en) * 2020-03-05 2020-07-07 云南阵码科技有限公司 Anti-counterfeiting tracing method and device for chemical fertilizer product
CN112184247A (en) * 2020-10-16 2021-01-05 浙江工业大学 Product full-link information tracing system based on block chain fragmentation technology
CN113011437A (en) * 2021-03-09 2021-06-22 安徽超清科技股份有限公司 Product traceability system based on industrial internet
US11195015B2 (en) * 2019-05-13 2021-12-07 Bao Tran IoT-based farming and plant growth ecosystem
CN116894843A (en) * 2023-09-11 2023-10-17 西南林业大学 Pu' er tea information tracing method based on perceptual hash algorithm and blockchain

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107704493A (en) * 2017-08-23 2018-02-16 中链科技有限公司 It is a kind of to be used to provide the method and system that product is traced to the source
CN107909372A (en) * 2017-10-25 2018-04-13 复旦大学 A kind of agricultural product source tracing method based on block chain technology

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107704493A (en) * 2017-08-23 2018-02-16 中链科技有限公司 It is a kind of to be used to provide the method and system that product is traced to the source
CN107909372A (en) * 2017-10-25 2018-04-13 复旦大学 A kind of agricultural product source tracing method based on block chain technology

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
乔蕊等: "基于区块链技术的动态数据存储安全机制研究", 《计算机科学》 *
于丽娜等: "基于区块链技术的现代农产品供应链", 《农业机械学报》 *
冷凯君等: "《""供应链"遇上"物联网" 农产品供应链的管理与优化》", 31 May 2018 *

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110008720B (en) * 2019-03-19 2020-10-30 周口师范学院 Dynamic data tracing method and device for Internet of things based on alliance chain
CN110008720A (en) * 2019-03-19 2019-07-12 周口师范学院 Internet of Things dynamic data source tracing method and device based on alliance's chain
US11195015B2 (en) * 2019-05-13 2021-12-07 Bao Tran IoT-based farming and plant growth ecosystem
CN110515591A (en) * 2019-08-05 2019-11-29 湖南天河国云科技有限公司 Random digit generation method and device based on block chain
CN110569654A (en) * 2019-08-30 2019-12-13 广州奇化有限公司 Block chain credible data processing method and device for supply chain quick response mode
CN110852745A (en) * 2019-10-12 2020-02-28 杭州云象网络技术有限公司 Block chain distributed dynamic network key automatic updating method
CN110852745B (en) * 2019-10-12 2022-07-19 杭州云象网络技术有限公司 Block chain distributed dynamic network key automatic updating method
CN111163064A (en) * 2019-12-13 2020-05-15 厦门市美亚柏科信息股份有限公司 Block chain-based internet information tracing method and computer-readable storage medium
CN111163064B (en) * 2019-12-13 2022-05-27 厦门市美亚柏科信息股份有限公司 Block chain-based internet information tracing method and computer-readable storage medium
CN111383033A (en) * 2020-03-05 2020-07-07 云南阵码科技有限公司 Anti-counterfeiting tracing method and device for chemical fertilizer product
CN112184247A (en) * 2020-10-16 2021-01-05 浙江工业大学 Product full-link information tracing system based on block chain fragmentation technology
CN112184247B (en) * 2020-10-16 2023-04-07 浙江工业大学 Product full-link information tracing system based on block chain fragmentation technology
CN113011437A (en) * 2021-03-09 2021-06-22 安徽超清科技股份有限公司 Product traceability system based on industrial internet
CN116894843A (en) * 2023-09-11 2023-10-17 西南林业大学 Pu' er tea information tracing method based on perceptual hash algorithm and blockchain
CN116894843B (en) * 2023-09-11 2023-11-17 西南林业大学 Pu' er tea information tracing method based on perceptual hash algorithm and blockchain

Similar Documents

Publication Publication Date Title
CN109146524A (en) A kind of agricultural product using block chain technology are traced to the source information security solution
CN108234515B (en) Self-authentication digital identity management system and method based on intelligent contract
CN111046352B (en) Identity information security authorization system and method based on block chain
CN106612172B (en) A kind of data tampering recovery algorithms can verify that restoring data authenticity in cloud storage
CN109155034A (en) Implementing logic gate functions using blockchains
CN108900298B (en) Quantum cipher watermark-based private block chain honest node authentication access method
CN109785170A (en) Method of insuring based on block chain, the system of insuring based on block chain
CN109245894A (en) A kind of distributed cloud storage system based on intelligent contract
CN107276766B (en) Multi-authorization attribute encryption and decryption method
CN113348455A (en) Apparatus and method for providing authentication, non-repudiation, managed access, and twin discrimination of data using data control signatures
CN111475866A (en) Block chain electronic evidence preservation method and system
CN113065149A (en) Data copyright protection method based on block chain and collusion attack resistant fingerprint code
CN112732695B (en) Cloud storage data security deduplication method based on block chain
CN110381055A (en) RFID system privacy-protection certification protocol method in healthcare supply chain
CN104125230A (en) Short message authentication service system and authentication method
CN102842053B (en) A kind of false proof figure code label and manufacture method thereof
CN113393225A (en) Digital currency encryption payment method and system
Yang et al. Enhanced digital rights management authentication scheme based on smart card
CN114528565A (en) Efficient sensitive data uplink algorithm based on block chain
Chernyi et al. Security of electronic digital signature in maritime industry
Chaudhary et al. Designing A Secured Framework for the Steganography Process Using Blockchain and Machine Learning Technology
CN116436708A (en) Trusted data sharing method and system based on blockchain technology
CN116127429A (en) Data right determining method based on symbol mapping coding and block chain
CN112016119B (en) Autonomous identity management method based on block chain
CN113779594B (en) Block chain-based data distribution sharing method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190104

RJ01 Rejection of invention patent application after publication