CN109194710A - A kind of specific people's behavior supervisory systems and method based on block chain and intelligent contract - Google Patents
A kind of specific people's behavior supervisory systems and method based on block chain and intelligent contract Download PDFInfo
- Publication number
- CN109194710A CN109194710A CN201810838385.7A CN201810838385A CN109194710A CN 109194710 A CN109194710 A CN 109194710A CN 201810838385 A CN201810838385 A CN 201810838385A CN 109194710 A CN109194710 A CN 109194710A
- Authority
- CN
- China
- Prior art keywords
- contract
- block chain
- intelligent
- block
- specific people
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/104—Peer-to-peer [P2P] networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/06—Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Alarm Systems (AREA)
- Storage Device Security (AREA)
Abstract
The present invention relates to a kind of specific people's behavior supervisory systems and method based on block chain and intelligent contract, it is to be tampered forgery, malicious attack risk for the problem that solving data presence in existing congenic method, and intelligent terminal lacks range, pressure-bearing, electricity and monitors and design.Its main points is that the user terminal module of the system is the intelligent terminal being worn on specific people, the specific people's location information for carrying intelligent terminal, equipment running status information are uploaded in block chain first, then by writing behavioural norm intelligence contract code in block chain, the behavior of specific people is standardized;When specific people has exceeded the scope of activities of administrator's setting, or contract implementation sub-module automatic running intelligence contract code when having exceeded the pressure limit and equipment electricity also uncharged lower than safe electricity range of intelligent terminal receiving, it sounds an alarm, administrator this person is reminded to have beyond scope of activities or malicious sabotage equipment, the intentional behavior that do not conform to the rules that do not charge.
Description
Technical field
The present invention relates to specific people's supervisory systems, are a kind of specific people's behavior prisons based on block chain and intelligent contract
Guard system and method.
Background technique
With the development of society, love and concern of the specific people increasingly by country and government, specific people include
The people of the needs such as community correction personnel, the offender paroled, drug addict supervision.But the behavior of specific people supervision is always
A problem, traditional specific people's behavior monitoring and managing method is that him is allowed to put on non-removable intelligent wearable device, in real time with
Track monitors his location information etc., and routes the message to background management platform, when he has exceeded the scope of activities of limitation
It will warning reminding administrative staff.But this traditional behavior management method can only judge specific people whether there is or not the behavior of crossing the border,
For some other behavior, such as malicious sabotage equipment, when equipment low battery, does not deliberately charge, these behaviors all may cause
Equipment is unable to operate normally, and is supervised with this to escape.With advances in technology, the concept of block chain, block chain are now proposed
It is a kind of data structure for sequentially in time forming data block with the mode of similar chained list, and is guaranteed in a manner of cryptography
The distributed decentralization database that data can not be distorted and can not be forged, being capable of safe and simple ground storing data.According to block
The related notion of chain 2.0, can also dispose intelligent contract in block chain, and intelligent contract is one section of automatic execution agreement terms
Computer program, meeting trigger condition can execute automatically.But it is closed in existing similar product and method based on block chain and intelligence
About the technology of specific people's behavior supervision and intelligent terminal supervision is disclosed less.
Summary of the invention
To overcome above-mentioned deficiency, the purpose of the present invention is provide a kind of spy based on block chain and intelligent contract to this field
Fix the number of workers's behavior supervisory systems and method make it solve data presence in existing congenic method and are tampered forgery, malicious attack wind
Danger and similar smart terminal product lack the technical issues of range, pressure-bearing, electricity monitoring.The purpose is to pass through following technology
What scheme was realized.
A kind of specific people's behavior supervisory systems based on block chain and intelligent contract, which includes user terminal mould
Block, intelligent contract module, block chain module, certificate center module, monitoring management module;It is characterized in that the user terminal mould
Block is the intelligent terminal being worn on specific people, equipped with locating module, pressure inductor, power management on intelligent terminal
Module;The location information of locating module real-time tracking locating personnel;Pressure inductor can sense the external force that intelligent terminal is subject to
Impact;Power management module can detection device electricity at any time;The information that user terminal module detects can all use certificate verification
After the public key encryption of module, block chain module is upload the data to by behavioural norm intelligence contract together, that is, uploads to backstage
Server, the data source as entire behavior supervisory systems;The intelligence contract module is responsible for the man-machine of offer behavior supervision
Interactive interface, generate including contract and contract executes two submodules: contract generates submodule and is responsible for the spy for formulating administrator
Fix the number of workers's scope of activities intelligence contract code, intelligent terminal bear pressure limit intelligence contract code, the safe electricity of intelligent terminal
Range intelligence contract code submits storage into block chain module;The block chain module is the core technology portion of whole system
Point, it is main to realize two parts function, first is that the intelligent contract code that intelligent contract module is generated is stored into block chain, as
The basis that intelligent contract module is called;Second is that the location information of storage specific people, equipment bear pressure information and equipment electricity
Measure information;The certificate center module is responsible for generating public key, private key and version number, for user terminal module and monitoring management module
It uses, public key is for being encrypted to the data that intelligent terminal acquires, and the administrator for only possessing private key can just look into
See these information, and public key, private key regularly update, new version number is generated after updating;The monitoring management module
It supervises specific people's location information in block chain, equipment receiving pressure information and equipment information about power is uploaded to, sees
Whether specific people has illegal behavior.
The intelligent terminal is symmetrically worn on the wrist or ankle of specific people, and intelligent terminal is further equipped with distance-sensor
With angle inductor, the distance between two intelligent terminals of distance-sensor real-time monitoring position, angle inductor real-time monitoring
Movement and rest angle change between two intelligent terminals.To which intelligent terminal has exceeded distance range and movement angle range
Shi Heyue implementation sub-module automatic running intelligence contract code, sounds an alarm, and reminds administrator this person that there are malicious sabotage equipment
The behavior that do not conform to the rules.
According to the design feature of above system, method is as follows: first believing the specific people position for carrying intelligent terminal
Breath, equipment running status information (such as battery capacity, by external force situation) upload in block chain, then by compiling in block chain
Behavioural norm intelligence contract code is write, the behavior of specific people is standardized;When specific people has exceeded administrator's setting
Scope of activities, or have exceeded intelligent terminal receiving pressure limit and equipment electricity lower than safe electricity range it is also uncharged
Shi Heyue implementation sub-module automatic running intelligence contract code, sounds an alarm, remind administrator this person have beyond scope of activities or
Person's malicious sabotage equipment, the behavior that do not conform to the rules that deliberately do not charge.
The present invention is highly-safe, and supervision is convenient, is not easy to be tampered and forge, and has trackability, while intelligent terminal has
There is monitoring function;It fits through block chain technology and supervises to specific people's management, the especially supervision of Prison staff.
Detailed description of the invention
Fig. 1 is block structure schematic diagram of the invention.
Fig. 2 is block flow sheet of the invention.
Fig. 3 is intelligent contract execution flow chart of the invention.
Specific embodiment
Now in conjunction with attached drawing, the working principle of the invention is further described.As shown in Figure 1-Figure 3, which includes using
Family terminal module, intelligent contract module, block chain module, certificate center module, monitoring management module, user terminal module is to match
The intelligent terminal being worn over specific people, which will carry specific people's location information of intelligent terminal first, equipment is transported
Row status information uploads in block chain, then by writing behavioural norm intelligence contract code in block chain, to particular person
The behavior of member is standardized;When specific people have exceeded administrator setting scope of activities, or have exceeded intelligent terminal receiving
Pressure limit and contract implementation sub-module automatic running is intelligently closed when equipment electricity also uncharged lower than safe electricity range
About code sounds an alarm, and administrator this person is reminded to have that beyond scope of activities or malicious sabotage equipment, does not deliberately charge not conform to
Regulation behavior.
The specific method is as follows for it: using the block chain based on multicenter first, i.e. only authorization host node could generate
New block, authorization host node is the manager node in background server, and only authorized user terminal could handle
Data access block chain network, a user terminal represent an ordinary node, and ordinary node stores all block datas, still
The right for only verifying block, does not generate the right of block;And the address of ordinary node and hold a of intelligent terminal
People's informational linkage together, facilitates calling to check, disposes three intelligent contracts, three intelligence to each user for holding intelligent terminal
Energy contract is scope of activities intelligence contract respectively, equipment bears pressure limit intelligence contract, equipment safety electricity range is intelligently closed
About, and intelligent contract it is stored in block chain.
Specific step is as follows: a) when specific people puts on intelligent terminal, intelligent terminal acquires the position of specific people in real time
The pressure information and equipment information about power that confidence breath, equipment are born, corresponding ordinary node broadcast these message to the whole network;b)
Authorization host node collects these data from network, and data are ranked up generation data list, then carries out to data list
Verification, and data list is written in new block, finally block is sent to other nodes;C) other nodes of the whole network are to the area
The legitimacy of block is verified, and the verification of block includes the verification to data information in the verification of block head information and block body,
The information such as the timestamp of hash value and current block in block head comprising previous block;After the completion of all data verifications, calculate
The Hash value of new block, and broadcasted to the whole network;If d) hash value that the 2K that a node receives other nodes are sent all and
Oneself equal, K are tolerable malicious node number, just to the whole network one confirmation message of broadcast;If e) node receives
2K+1 confirmation message can submit new block, and newly-generated block is added to the last-of-chain of existing block chain, thus intelligence
The energy collected data of terminal are written to block chain and suffer;F) the intelligent contract in block chain inspects periodically state of automata, by
Item traverses the state machine for including in each contract, affairs and trigger condition.
In the step f) intelligent contract within certain time someone's behavioural norm as defined in violate due to be triggered, then
The affairs for the condition that meets are pushed in queue to be verified, wait common recognition;Time is up for common recognition, and verifying node can be nearest one
All contracts saved in the section time, are packaged into a contract set, and calculate the hash value of this contract set, finally together
The hash value of this contract set is added in block, the whole network is diffused into;After other verifying nodes receive this block structure,
The Hash for the contract set that the inside includes can be taken out, be compared with the contract set oneself saved;Portion is sent simultaneously
The contract set oneself approved is to other verifying nodes;By the transmission more taken turns and compare, all verifying nodes are finally right
Contract set is reached an agreement;Contract intelligent so is just successfully performed, and is reported and given monitoring management module, and administrator is reminded
Someone violates defined behavior, it is necessary to take corresponding measure.
In conclusion the information that the equipment that the system and method is carried for these specific people is collected into is very sensitive
And its safety is all very important information, and the presence of these data is tampered, the risk of malicious attack, in conjunction with block chain
Technology is stored in the information such as the sensitive position information of specific people, equipment running status in block chain, and that realizes data can not
It distorts and can not forge, it is ensured that data are authentic and valid.The system and method whether there is for specific people to cross the border, malicious sabotage
The behavior that equipment, low battery deliberately do not charge, by writer's behavioural norm intelligence contract in block chain, to specific people
Behavior constrained, force specific people to execute according to the rules, otherwise when specific people is there are when the behavior of breach of contract,
It is automatic to execute intelligent contract program, it sounds an alarm and reminds backstage manager.That is row of the system and method for specific people
For supervision problem, three intelligent contracts are disposed in block chain, three intelligent contracts are scope of activities intelligence contract, intelligence respectively
Terminal bears pressure limit intelligence contract, the safe electricity intelligence contract of intelligent terminal, when illegal row occurs in specific people
For when, it is automatic to execute intelligent contract and simultaneously report to administrator.To be achieved that with completely intelligentized operation to specific people
The requirement of behavior supervision, method are simple and efficient.
Claims (7)
1. a kind of specific people's behavior supervisory systems based on block chain and intelligent contract, the system include user terminal module,
Intelligent contract module, block chain module, certificate center module, monitoring management module;It is characterized by:
The user terminal module is the intelligent terminal being worn on specific people, and the information that user terminal module detects is all
After the public key encryption that will use certificate verification module, block chain mould is upload the data to by behavioural norm intelligence contract together
Block uploads to background server, the data source as entire behavior supervisory systems;
The intelligence contract module is responsible for the man-machine interactive interface of offer behavior supervision, including contract generates and contract executes two
Submodule: contract generates submodule and is responsible for the specific people's scope of activities intelligence contract code for formulating administrator, intelligent terminal
Bearing the safe electricity range intelligence contract code of pressure limit intelligence contract code, intelligent terminal submits storage to arrive block chain module
In;
The block chain module is the core technology part of whole system, main to realize two parts function, first is that by intelligent contract
The intelligent contract code that module generates is stored into block chain, the basis called as intelligent contract module;Second is that storage is specific
The location information of personnel, equipment bear pressure information and equipment information about power;
The certificate center module is responsible for generating public key, private key and version number, makes for user terminal module and monitoring management module
It is for being encrypted to the data that intelligent terminal acquires with, public key, and the administrator for only possessing private key can just check
To these information, and public key, private key regularly update, and new version number is generated after updating;
The monitoring management module to upload to specific people's location information in block chain, equipment bears pressure information and equipment
Information about power is supervised, and sees whether specific people has illegal behavior.
2. specific people's behavior supervisory systems according to claim 1 based on block chain and intelligent contract, feature exist
In on the intelligent terminal equipped with locating module, pressure inductor, power management module;Locating module real-time tracking positions people
The location information of member;Pressure inductor can sense the external impacts that intelligent terminal is subject to;Power management module can detect at any time
Equipment electricity.
3. specific people's behavior supervisory systems according to claim 2 based on block chain and intelligent contract, feature exist
It is symmetrically worn on the wrist or ankle of specific people in the intelligent terminal, intelligent terminal is further equipped with distance-sensor and angle
Inductor, the distance between two intelligent terminals of distance-sensor real-time monitoring position, two intelligence of angle inductor real-time monitoring
Movement and rest angle change between energy terminal.
4. specific people's behavior monitoring and managing method according to claim 1 based on block chain and intelligent contract, feature exist
In first uploading to the specific people's location information for carrying intelligent terminal, equipment running status information in block chain, then lead to
It crosses in block chain and writes behavioural norm intelligence contract code, the behavior of specific people is standardized;When specific people exceeds
The scope of activities of administrator's setting, or the pressure limit and equipment electricity that have exceeded intelligent terminal receiving are lower than safety electricity
Contract implementation sub-module automatic running intelligence contract code when amount range is also uncharged, sounds an alarm, and administrator this person is reminded to have
Beyond scope of activities or malicious sabotage equipment, the intentional behavior that do not conform to the rules that do not charge.
5. specific people's behavior monitoring and managing method according to claim 4 based on block chain and intelligent contract, feature exist
In using the block chain based on multicenter first, i.e., only authorization host node could generate new block, and authorization host node is
Manager node in background server, and only authorized user terminal could data access block chain network, one
A user terminal represents an ordinary node, and ordinary node stores all block datas, but only verifies the right of block, does not have
There is the right for generating block;And the address of ordinary node and the personal information for holding intelligent terminal are linked together, it is convenient
Calling is checked, disposes three intelligent contracts to each user for holding intelligent terminal, three intelligent contracts are scope of activities respectively
Intelligent contract, equipment bear pressure limit intelligence contract, equipment safety electricity range intelligence contract, and intelligent contract is stored in
In block chain.
6. specific people's behavior monitoring and managing method according to claim 5 based on block chain and intelligent contract, feature exist
In specific step is as follows: a) when specific people puts on intelligent terminal, intelligent terminal acquire in real time specific people location information,
The pressure information and equipment information about power that equipment is born, corresponding ordinary node broadcast these message to the whole network;B) authorization master
Node collects these data from network, and data are ranked up generation data list, are then verified to data list, and
Data list is written in new block, finally sends block to other nodes;C) conjunction of other nodes of the whole network to the block
Method is verified, and the verification of block includes the verification to data information in the verification of block head information and block body, block head
In the hash value comprising previous block and current block the information such as timestamp;After the completion of all data verifications, new block is calculated
Hash value, and to the whole network broadcast;If d) hash value that the 2K that a node receives other nodes are sent all with oneself
Equal, K is tolerable malicious node number, just broadcasts a confirmation message to the whole network;If e) node receives 2K+1 item
Confirmation message can submit new block, and newly-generated block is added to the last-of-chain of existing block chain, thus intelligent terminal
Collected data are written to block chain and suffer;F) the intelligent contract in block chain inspects periodically state of automata, traverses one by one
State machine, affairs and the trigger condition for including in each contract.
7. specific people's behavior monitoring and managing method according to claim 6 based on block chain and intelligent contract, feature exist
In the step f) intelligent contract within certain time someone's behavioural norm as defined in violate due to be triggered, then will meet
The affairs of condition are pushed in queue to be verified, wait common recognition;Time is up for common recognition, and verifying node can be nearest a period of time
All contracts of interior preservation are packaged into a contract set together, and calculate the hash value of this contract set, finally by this
The hash value of contract set is added in block, is diffused into the whole network;It, can be inner after other verifying nodes receive this block structure
The Hash for the contract set that bread contains takes out, and is compared with the contract set oneself saved;Portion is sent simultaneously oneself to recognize
Can contract set to other verifying nodes;By the transmission more taken turns and compare, all final pairings of verifying node are met by appointment
Conjunction is reached an agreement;Contract intelligent so is just successfully performed, and is reported and given monitoring management module, and administrator someone is reminded to disobey
Anti- defined behavior, it is necessary to take corresponding measure.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810838385.7A CN109194710B (en) | 2018-07-19 | 2018-07-19 | System and method for supervising specific personnel behaviors based on block chain and intelligent contract |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810838385.7A CN109194710B (en) | 2018-07-19 | 2018-07-19 | System and method for supervising specific personnel behaviors based on block chain and intelligent contract |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109194710A true CN109194710A (en) | 2019-01-11 |
CN109194710B CN109194710B (en) | 2021-08-17 |
Family
ID=64937095
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810838385.7A Active CN109194710B (en) | 2018-07-19 | 2018-07-19 | System and method for supervising specific personnel behaviors based on block chain and intelligent contract |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109194710B (en) |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109767843A (en) * | 2019-01-18 | 2019-05-17 | 四川大学 | Infectious disease method for early warning and Infectious Diseases Data block catenary system based on intelligent contract |
CN109903151A (en) * | 2019-01-21 | 2019-06-18 | 苏宁易购集团股份有限公司 | Mortgage vehicle fence realization method and system based on block chain technology |
CN109993330A (en) * | 2019-02-27 | 2019-07-09 | 深圳市元征科技股份有限公司 | A kind of data analysing method, electronic equipment and computer-readable medium |
CN110322952A (en) * | 2019-03-27 | 2019-10-11 | 杨海燕 | A kind of medical care system and its working method based on block chain |
CN110598432A (en) * | 2019-09-06 | 2019-12-20 | 腾讯科技(深圳)有限公司 | Community correction information management method and device, medium and electronic equipment |
CN110675150A (en) * | 2019-09-24 | 2020-01-10 | 支付宝(杭州)信息技术有限公司 | Federation chain-based compliance management and supervision method and device |
CN110956476A (en) * | 2019-12-17 | 2020-04-03 | 江苏扬子易联智能软件有限公司 | Method and platform for realizing GMP/GSP automatic supervision based on block chain |
CN111882227A (en) * | 2020-07-31 | 2020-11-03 | 贵州东冠科技有限公司 | Labor metering production management system based on prison management |
CN112529724A (en) * | 2020-10-14 | 2021-03-19 | 厦门中源能链科技有限公司 | Power consumption monitoring method and system, mobile terminal and storage medium |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106407481A (en) * | 2016-11-30 | 2017-02-15 | 福州微启迪物联科技有限公司 | Block chain architecture-based ecological environment monitoring system and implementation method thereof |
CN106779708A (en) * | 2016-12-23 | 2017-05-31 | 中钞信用卡产业发展有限公司北京智能卡技术研究院 | Participant identity management method and system on block chain based on intelligent contract |
CN107103473A (en) * | 2017-04-27 | 2017-08-29 | 电子科技大学 | A kind of intelligent contract implementation method based on block chain |
CN107491915A (en) * | 2017-08-03 | 2017-12-19 | 迅鳐成都科技有限公司 | Goods right management system based on block chain in a kind of steel industry WMS |
CN107886388A (en) * | 2017-09-22 | 2018-04-06 | 杭州云象网络技术有限公司 | The traffic trip credit and safety service platform and its operation method of multicenter are realized based on alliance's chain |
-
2018
- 2018-07-19 CN CN201810838385.7A patent/CN109194710B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106407481A (en) * | 2016-11-30 | 2017-02-15 | 福州微启迪物联科技有限公司 | Block chain architecture-based ecological environment monitoring system and implementation method thereof |
CN106779708A (en) * | 2016-12-23 | 2017-05-31 | 中钞信用卡产业发展有限公司北京智能卡技术研究院 | Participant identity management method and system on block chain based on intelligent contract |
CN107103473A (en) * | 2017-04-27 | 2017-08-29 | 电子科技大学 | A kind of intelligent contract implementation method based on block chain |
CN107491915A (en) * | 2017-08-03 | 2017-12-19 | 迅鳐成都科技有限公司 | Goods right management system based on block chain in a kind of steel industry WMS |
CN107886388A (en) * | 2017-09-22 | 2018-04-06 | 杭州云象网络技术有限公司 | The traffic trip credit and safety service platform and its operation method of multicenter are realized based on alliance's chain |
Non-Patent Citations (2)
Title |
---|
NÉSTOR ÁLVAREZ-DÍAZ等: ""Smart Contracts based on Blockchain for Logistics Management"", 《ACM IML’17》 * |
ZHIMIN GAO等: ""Blockchain-based Identity Management with Mobile Device"", 《ACM CRYBLOCK"18》 * |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109767843A (en) * | 2019-01-18 | 2019-05-17 | 四川大学 | Infectious disease method for early warning and Infectious Diseases Data block catenary system based on intelligent contract |
CN109903151A (en) * | 2019-01-21 | 2019-06-18 | 苏宁易购集团股份有限公司 | Mortgage vehicle fence realization method and system based on block chain technology |
CN109993330A (en) * | 2019-02-27 | 2019-07-09 | 深圳市元征科技股份有限公司 | A kind of data analysing method, electronic equipment and computer-readable medium |
US11945457B2 (en) | 2019-02-27 | 2024-04-02 | Launch Tech Co., Ltd. | Method for data analysis, electronic device, and computer readable medium |
CN110322952A (en) * | 2019-03-27 | 2019-10-11 | 杨海燕 | A kind of medical care system and its working method based on block chain |
CN110598432A (en) * | 2019-09-06 | 2019-12-20 | 腾讯科技(深圳)有限公司 | Community correction information management method and device, medium and electronic equipment |
CN110675150A (en) * | 2019-09-24 | 2020-01-10 | 支付宝(杭州)信息技术有限公司 | Federation chain-based compliance management and supervision method and device |
CN110956476A (en) * | 2019-12-17 | 2020-04-03 | 江苏扬子易联智能软件有限公司 | Method and platform for realizing GMP/GSP automatic supervision based on block chain |
CN111882227A (en) * | 2020-07-31 | 2020-11-03 | 贵州东冠科技有限公司 | Labor metering production management system based on prison management |
CN112529724A (en) * | 2020-10-14 | 2021-03-19 | 厦门中源能链科技有限公司 | Power consumption monitoring method and system, mobile terminal and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN109194710B (en) | 2021-08-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109194710A (en) | A kind of specific people's behavior supervisory systems and method based on block chain and intelligent contract | |
Faisal et al. | Data-stream-based intrusion detection system for advanced metering infrastructure in smart grid: A feasibility study | |
Castiglione et al. | The role of internet of things to control the outbreak of COVID-19 pandemic | |
EP3407232B1 (en) | Spatiotemporal authentication | |
CN109144013A (en) | Capital construction and production scene managing and control system and method based on technology of Internet of things | |
CN104334075A (en) | Biometric attribute anomoly detection system with adjusting notifications | |
CN109255252B (en) | Personnel management method and system based on block chain | |
CN108777703A (en) | A kind of abnormal behaviour processing method and system based on block chain | |
CN113792836B (en) | Multi-level safety intelligent park control method and system | |
WO2015117507A1 (en) | Authentication method, collection device, authentication device and system, and cabinet and unlocking method therefor | |
CN110334826A (en) | A kind of intelligent library and room for individual study seat level monitoring system | |
CN107195056A (en) | The gate control system and guard method of major hazard installations complex | |
CN107480553A (en) | A kind of data exploration system, method, equipment and storage medium | |
CN111597589A (en) | Information authenticity protection method and system | |
Kennedy et al. | The risk in crime | |
Nellis | Surveillance-based compliance using electronic monitoring | |
CN106096443A (en) | A kind of Contract Enforcement method and system based on Biont information | |
Bonifazi et al. | A machine learning based sentient multimedia framework to increase safety at work | |
CN110288731A (en) | A kind of unlocking method, device and electronic lock | |
CN106326769B (en) | A kind of field monitoring information processing unit | |
CN106205188A (en) | A kind of based on parking stall, visual parking lot release management system | |
CN105025020A (en) | Internet of Things implementation method | |
CN115600189A (en) | Commercial password application security evaluation system | |
Saxena et al. | IoT-Based Women Safety Gadgets (WSG): Vision, Architecture, and Design Trends. | |
US20210158055A1 (en) | Frictionless and Autonomous Activity and Behavioral Monitoring |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information |
Address after: 510700 Room 601, No. 4, Kehui 1st Street, Huangpu District, Guangzhou City, Guangdong Province Applicant after: Guangzhou Huachuang IOT Technology Co., Ltd Address before: 510700 room 2522, 91 Feng Feng Road, hi tech Industrial Development Zone, Whampoa District, Guangzhou, Guangdong. Applicant before: GUANGZHOU ZEQI INFORMATION TECHNOLOGY Co.,Ltd. |
|
CB02 | Change of applicant information | ||
GR01 | Patent grant | ||
GR01 | Patent grant |