CN109242508A - A kind of anti-fake and traceability system of the Third Party Authentication report based on block chain technology - Google Patents

A kind of anti-fake and traceability system of the Third Party Authentication report based on block chain technology Download PDF

Info

Publication number
CN109242508A
CN109242508A CN201810926632.9A CN201810926632A CN109242508A CN 109242508 A CN109242508 A CN 109242508A CN 201810926632 A CN201810926632 A CN 201810926632A CN 109242508 A CN109242508 A CN 109242508A
Authority
CN
China
Prior art keywords
block
node
certification
party authentication
party
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810926632.9A
Other languages
Chinese (zh)
Inventor
黎智帅
张楠坤
Original Assignee
Beijing Yuan Chain Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Yuan Chain Technology Co Ltd filed Critical Beijing Yuan Chain Technology Co Ltd
Priority to CN201810926632.9A priority Critical patent/CN109242508A/en
Publication of CN109242508A publication Critical patent/CN109242508A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • G06Q30/0185Product, service or business identity fraud
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps

Abstract

The present invention provides a kind of anti-fake and traceability system of Third Party Authentication report based on block chain technology, and participant includes the both sides for needing to authenticate, certification authority, the general public and enterprise;The system includes block chain account book, network node;The network node is divided into one's own side's node, certification node and query node;The present invention refines the function of the participant of Third Party Authentication and power, communication network and temporary communications network are established in case of the write-in and reading of the details of Third Party Authentication report, wherein, parameter involved in the detailed record of Third Party Authentication report is defined, the permission of definite functions, respective node of the invention is also clear that, stronger safe and efficient product false proof and platform of tracing to the source can be provided for consumer, enterprise and third party's quality inspection organization, prevent the circulation of counterfeit and shoddy goods.

Description

A kind of anti-fake and traceability system of the Third Party Authentication report based on block chain technology
Technical field
The present invention relates to block chain anti-counterfeit field, for a kind of the anti-fake of Third Party Authentication report based on block chain technology and Traceability system.
Background technique
For many years while national economy continues to develop, the production and circulation of counterfeit goods are also becoming increasingly rampant, and make to consume Person, enterprise, national interests are sustained a great loss, and cause huge destruction to society, market economy, Third Party Authentication report is prevented Pseudo- and retrospect importance highlights.Block chain technology is a neutral presence, it seems an account book, can recorde all friendships Easy data can be used for the true and false of verification information.First, block chain is different from common centralization information storage mechanism, goes The characteristic of the heart determines that block chain is safeguarded the opening and equality of data by numerous nodes jointly.Second, authenticated letter Breath, which is added to block chain, will be will be unable to realize the modification to data by permanent storage, individual node, so the data of block chain Stability is higher, and having can not tamper and non repudiation.Third, anyone can be in disclosed interface polls block The data of chain, in the entire system share and exchange data, therefore block chain maintain system information high opening and thoroughly Bright property.It with the popularization of Internet of Things and block chain technology, is combined, is realized with existing information safe practice by block chain technology Commodity counterfeit prevention and supply chain are traced to the source, and have the characteristic of low cost and high-tech, can effectively realize the anti-fake of Third Party Authentication report And retrospect.Study the anti-fake trace-back technique based on block chain, it is intended that providing for consumer, enterprise and third party's quality inspection organization more has The safe and efficient product false proof of power and platform of tracing to the source, prevent the circulation of counterfeit and shoddy goods.
Summary of the invention
In view of this, the present invention provides a kind of third party based on block chain technology solved or part solves the above problems Authenticate the anti-fake and traceability system of report.
To achieve the effect that above-mentioned technical proposal, the technical solution of the present invention is as follows: a kind of third based on block chain technology The anti-fake and traceability system of side's certification report, includes the following contents:
The anti-fake and traceability system of Third Party Authentication report based on block chain technology includes block chain account book, network section Point;Network node is divided into one's own side's node, certification node and query node;One's own side's node, certification node and query node composition Communication network authenticates manager of the node as network node;
(1) block chain account book is used to store the detailed record of Third Party Authentication report, the detailed note of Third Party Authentication report Record is packaged into block of the data packet in block chain account book and is stored in the form of chain type, and chain structure indicates block with sequential relationship A chain is linked together and formed in tandem, and the area being arranged in front can be traced back to by arranging posterior block in chain Block, sequential relationship are the precedence relationship of the time of the generation of block;Data are connected by hash algorithm, timestamp characteristic is provided, Guarantee that data can not distort characteristic;Block chain account book use P2P networking technology, network node wherein included it is equal and with Flat topological structure is interconnected and interaction;Public and private key protection mechanism is realized using rivest, shamir, adelman, can be used for testing Demonstrate,prove nodal information, protection privacy of user, digital signature and debarkation authentication;
(2) certification node is responsible for that the detailed record of Third Party Authentication report is written into block chain account book, has read right And write permission;Read right is the detailed record for reading the Third Party Authentication report in block chain account book in block, and write permission is The detailed record of Third Party Authentication report is written into block chain account book;When Third Party Authentication report is written into block for certification node When the detailed record accused, temporary communications network is established, the certification node recorded in detail for being responsible for write-in Third Party Authentication report is made For the manager of temporary communications network, the network node in other communication networks is contained in temporary communications network, temporarily The in the detailed record of network node broadcast Third Party Authentication report of the manager of communication network into temporary communications network Tripartite authenticates the main information of report, and the network node in temporary communications network is sent to the manager of temporary communications network checks Shen Please, after agreeing to, the detailed record of the network node broadcast Third Party Authentication report into temporary communications network;When certification saves When the detailed record of Third Party Authentication report is written into block for point, while it being put into abstract in block head within a block, made a summary The VI N code of middle add-on third party certification report and the purchaser record of Third Party Authentication report;It authenticates node and has certification authority Information, including authorized by state certificate, number of registration, authentication service range set up time, scale etc., are the manager of system, are responsible for Coordination between network node;This role is directly generally served as by the organ of country or government, or is recognized by country or government Can tissue go to serve as this role;
(3) one's own side's node is the both sides for needing to obtain Third Party Authentication, has the right to send the request and certification for establishing new block Node codetermines and the generation of control block;One's own side's node has permission the request for sending to traceability chain and establishing new block, request It will be sent to the another party for needing the both sides authenticated, after both sides reach the consensus for needing to carry out Third Party Authentication, transmission is recognized Certification node is given in card request;After certification node receives certification request, staff is sent to walk workflow, after process is covered, nothing Whether passing through by certification, it is both needed to obtain the confirmation for needing the both sides authenticated;Authentication result obtains needing the confirmation of the both sides authenticated Afterwards, timestamp is covered, new block is formed, is added in traceability chain, this block once being formed, can be traced, can not modify;For Certification does not pass through, it is also necessary to which the one's own side's node authenticated again sends the request for establishing block according to method again, and new block is asked Seek the block information that a upper authentification failure is had in information;For same project to one's own side's node of multiple certification authorities, according to Method sends the request for establishing block to multiple certification authorities;
(4) query node only has read right, can inquire authentication information, is not involved in block foundation;The read right of limitation Only in the case where belonging to the permission of manager of the same communication network, to be just read out belonging to of storing in block chain account book The detailed record of the Third Party Authentication report of manager's write-in of the same communication network;Query node can be according to one's own side's node The Third Party Authentication report of offer traces the true authentication result of this certification authority, this purpose history authentication result authenticates machine The authentication result of the authority of structure and this project in different authentication mechanism;
Beneficial achievement of the invention are as follows: the Third Party Authentication report based on block chain technology that the present invention provides a kind of is prevented Pseudo- and traceability system, definite functions, the permission of respective node are it is also clear that can be consumer, enterprise and third party's quality inspection organization Stronger safe and efficient product false proof and platform of tracing to the source are provided, the circulation of counterfeit and shoddy goods is prevented.
Specific embodiment
In order to which technical problems, technical solutions and advantages to be solved are more clearly understood, tie below Embodiment is closed, the present invention will be described in detail.It should be noted that specific embodiment described herein is only to explain The present invention is not intended to limit the present invention, and the product for being able to achieve said function belongs to equivalent replacement and improvement, is all contained in this hair Within bright protection scope.The specific method is as follows:
Embodiment 1: the anti-fake and traceability system of the Third Party Authentication report based on block chain technology include block chain account book, Network node;Network node is divided into one's own side's node, certification node and query node;One's own side's node, certification node and inquiry section Point composition communication network, authenticates manager of the node as network node;
(1) block chain account book is used to store the detailed record of Third Party Authentication report, the detailed note of Third Party Authentication report Record is packaged into block of the data packet in block chain account book and is stored in the form of chain type, and chain structure indicates block with sequential relationship A chain is linked together and formed in tandem, and the area being arranged in front can be traced back to by arranging posterior block in chain Block, sequential relationship are the precedence relationship of the time of the generation of block;Data are connected by hash algorithm, timestamp characteristic is provided, Guarantee that data can not distort characteristic;Block chain account book use P2P networking technology, network node wherein included it is equal and with Flat topological structure is interconnected and interaction;Public and private key protection mechanism is realized using rivest, shamir, adelman, can be used for testing Demonstrate,prove nodal information, protection privacy of user, digital signature and debarkation authentication;
(2) certification node is responsible for that the detailed record of Third Party Authentication report is written into block chain account book, has read right And write permission;Read right is the detailed record for reading the Third Party Authentication report in block chain account book in block, and write permission is The detailed record of Third Party Authentication report is written into block chain account book;When Third Party Authentication report is written into block for certification node When the detailed record accused, temporary communications network is established, the certification node recorded in detail for being responsible for write-in Third Party Authentication report is made For the manager of temporary communications network, the network node in other communication networks is contained in temporary communications network, temporarily The in the detailed record of network node broadcast Third Party Authentication report of the manager of communication network into temporary communications network Tripartite authenticates the main information of report, and the network node in temporary communications network is sent to the manager of temporary communications network checks Shen Please, after agreeing to, the detailed record of the network node broadcast Third Party Authentication report into temporary communications network;When certification saves When the detailed record of Third Party Authentication report is written into block for point, while it being put into abstract in block head within a block, made a summary The VI N code of middle add-on third party certification report and the purchaser record of Third Party Authentication report;It authenticates node and has certification authority Information, including authorized by state certificate, number of registration, authentication service range set up time, scale etc., are the manager of system, are responsible for Coordination between network node;This role is directly generally served as by the organ of country or government, or is recognized by country or government Can tissue go to serve as this role;
(3) one's own side's node is the both sides for needing to obtain Third Party Authentication, has the right to send the request and certification for establishing new block Node codetermines and the generation of control block;One's own side's node has permission the request for sending to traceability chain and establishing new block, request It will be sent to the another party for needing the both sides authenticated, after both sides reach the consensus for needing to carry out Third Party Authentication, transmission is recognized Certification node is given in card request;After certification node receives certification request, staff is sent to walk workflow, after process is covered, nothing Whether passing through by certification, it is both needed to obtain the confirmation for needing the both sides authenticated;Authentication result obtains needing the confirmation of the both sides authenticated Afterwards, timestamp is covered, new block is formed, is added in traceability chain, this block once being formed, can be traced, can not modify;For Certification does not pass through, it is also necessary to which the one's own side's node authenticated again sends the request for establishing block according to method again, and new block is asked Seek the block information that a upper authentification failure is had in information;For same project to one's own side's node of multiple certification authorities, according to Method sends the request for establishing block to multiple certification authorities;
(4) query node only has read right, can inquire authentication information, is not involved in block foundation;The read right of limitation Only in the case where belonging to the permission of manager of the same communication network, to be just read out belonging to of storing in block chain account book The detailed record of the Third Party Authentication report of manager's write-in of the same communication network;Query node can be according to one's own side's node The Third Party Authentication report of offer traces the true authentication result of this certification authority, this purpose history authentication result authenticates machine The authentication result of the authority of structure and this project in different authentication mechanism;
Beneficial achievement of the invention are as follows: the Third Party Authentication report based on block chain technology that the present invention provides a kind of is prevented Pseudo- and traceability system, definite functions, the permission of respective node are it is also clear that can be consumer, enterprise and third party's quality inspection organization Stronger safe and efficient product false proof and platform of tracing to the source are provided, the circulation of counterfeit and shoddy goods is prevented.
The foregoing is merely the preferred embodiments of the invention, the claims that are not intended to limit the invention. Simultaneously it is described above, for those skilled in the technology concerned it would be appreciated that and implement, therefore other be based on institute of the present invention The equivalent change that disclosure is completed, should be included in the covering scope of the claims.

Claims (1)

1. a kind of anti-fake and traceability system of the Third Party Authentication report based on block chain technology, which is characterized in that comprising following Content:
(1) the detailed record of the Third Party Authentication report is packaged into block of the data packet in the block chain account book with chain The storage of formula form, the chain structure indicate that the block is linked together in tandem with sequential relationship and forms a chain Item, posterior block is arranged in the chain can trace back to the block being arranged in front, and the sequential relationship is the generation of block Time precedence relationship;Data are connected by hash algorithm, timestamp characteristic is provided, and guarantee that data can not distort characteristic;Institute Block chain account book is stated using P2P networking technology, network node wherein included is equal and mutual with flat topological structure Connection and interaction;Public and private key protection mechanism is realized using rivest, shamir, adelman, can be used for verifying nodal information, protects user Privacy, digital signature and debarkation authentication;
(2) the certification node is responsible for that the detailed record of the Third Party Authentication report, tool are written into the block chain account book There are read right and write permission;The read right is the Third Party Authentication report read in the block chain account book in block Detailed record, the write permission is the detailed record that Third Party Authentication report is written into the block chain account book;When When the detailed record of the Third Party Authentication report is written into the block for the certification node, temporary communications network is established, It is responsible for management of the certification node of the write-in Third Party Authentication report recorded in detail as the temporary communications network Person, the network node in other described communication networks are contained in the temporary communications network, the temporary communications The network node of the manager of network into the temporary communications network broadcasts the detailed note of the Third Party Authentication report The Third Party Authentication in record reports main information, and the network node in the temporary communications network temporarily leads to described The manager of news network, which sends, checks application, the network node broadcast after agreeing to, into the temporary communications network The detailed record of the Third Party Authentication report;When the Third Party Authentication report is written into the block for the certification node Detailed record when, while abstract is put into the block head in the block, add-on third party certification report in the abstract VI N code and Third Party Authentication report purchaser record;The certification node has certification authority's information, including country is recognized Can certificate, number of registration, authentication service range, set up time, scale etc., be the manager of the system, be responsible for the network section Coordination between point;This role, or the group approved by country or government are directly generally served as by the organ of country or government It knits and serves as this role;
(3) one's own side's node is the both sides for needing to obtain Third Party Authentication, has the right to send and establishes the request of new block and described Authenticate the generation that node codetermines and controls block;One's own side's node, which has permission to traceability chain transmission, establishes new block Request, the request will be sent to described another party of both sides for needing to authenticate, and both sides, which reach, to need to carry out Third Party Authentication Consensus after, send certification request to the certification node;After the certification node receives the certification request, work is sent Walk workflow as personnel, after process is covered, no matter authenticate by whether, be both needed to obtain the both sides for needing to authenticate really Recognize;After the authentication result obtains the confirmation of the both sides for needing to authenticate, timestamp is covered, new block is formed, is added to In the traceability chain, this block once being formed, can be traced, can not modify;For certification do not pass through, it is also necessary to authenticate again oneself Fang Jiedian sends the request for establishing block again according to the method, authenticates in the new block solicited message with upper one The block information of failure;For same project to one's own side's node of multiple certification authorities, according to the method to multiple certification machines Structure sends the request for establishing block;
(4) query node only has the read right, can inquire authentication information, is not involved in block foundation;The limitation Read right be only in the case where belonging to the permission of the manager of the same communication network, can just be read out the area The Third Party Authentication report of the manager write-in for belonging to the same communication network stored in block chain account book Record in detail;The query node can trace the true of this certification authority according to the Third Party Authentication report that one's own side's node provides Authentication result, this purpose history authentication result, the authority of the certification authority and this project are in different authentication mechanism Authentication result.
CN201810926632.9A 2018-08-15 2018-08-15 A kind of anti-fake and traceability system of the Third Party Authentication report based on block chain technology Pending CN109242508A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810926632.9A CN109242508A (en) 2018-08-15 2018-08-15 A kind of anti-fake and traceability system of the Third Party Authentication report based on block chain technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810926632.9A CN109242508A (en) 2018-08-15 2018-08-15 A kind of anti-fake and traceability system of the Third Party Authentication report based on block chain technology

Publications (1)

Publication Number Publication Date
CN109242508A true CN109242508A (en) 2019-01-18

Family

ID=65071569

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810926632.9A Pending CN109242508A (en) 2018-08-15 2018-08-15 A kind of anti-fake and traceability system of the Third Party Authentication report based on block chain technology

Country Status (1)

Country Link
CN (1) CN109242508A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110322333A (en) * 2019-07-10 2019-10-11 北京元链科技有限公司 One kind being based on block chain clearance of goods taxation systems
CN110490613A (en) * 2019-08-27 2019-11-22 山东浪潮质量链科技有限公司 A kind of method and system of the product testing based on block chain
CN110489430A (en) * 2019-07-03 2019-11-22 特斯联(北京)科技有限公司 A kind of source tracing method and its system signed and verified based on data block

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104065484A (en) * 2014-06-26 2014-09-24 江苏买卖网电子商务有限公司 Electronic contract platform realizing method based on SDK message and digital signature
CN105610578A (en) * 2016-01-25 2016-05-25 杭州复杂美科技有限公司 Block chain information archiving and privacy protection method
CN106341493A (en) * 2016-11-01 2017-01-18 北京金股链科技有限公司 Entity rights oriented digitalized electronic contract signing method
CN107257341A (en) * 2017-06-21 2017-10-17 济南浪潮高新科技投资发展有限公司 A kind of student status based on block chain reviews authentication method
CN107273760A (en) * 2017-06-09 2017-10-20 济南浪潮高新科技投资发展有限公司 One kind is based on many CA application authentication methods of block chain
CN107833052A (en) * 2017-10-27 2018-03-23 南京物联传感技术有限公司 A kind of polymerization payment system and method for work based on block chain
CN107944892A (en) * 2017-12-28 2018-04-20 上海唯链信息科技有限公司 A kind of milk supply traceability system based on block chain technology
CN108055138A (en) * 2018-02-01 2018-05-18 国家计算机网络与信息安全管理中心 Distributed recorder method and system is applied based on block chain
CN108063826A (en) * 2017-12-27 2018-05-22 上海唯链信息科技有限公司 A kind of shared and traceability system of car networking based on block chain technology
CN108111299A (en) * 2017-12-28 2018-06-01 上海唯链信息科技有限公司 A kind of real-time auditing traceability system based on block chain technology
CN108230109A (en) * 2018-01-02 2018-06-29 罗梅琴 A kind of shared system and method based on block chain technology
CN108389615A (en) * 2018-02-08 2018-08-10 罗梅琴 A kind of pregnant baby retrospect deposit system and method based on block chain technology

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104065484A (en) * 2014-06-26 2014-09-24 江苏买卖网电子商务有限公司 Electronic contract platform realizing method based on SDK message and digital signature
CN105610578A (en) * 2016-01-25 2016-05-25 杭州复杂美科技有限公司 Block chain information archiving and privacy protection method
CN106341493A (en) * 2016-11-01 2017-01-18 北京金股链科技有限公司 Entity rights oriented digitalized electronic contract signing method
CN107273760A (en) * 2017-06-09 2017-10-20 济南浪潮高新科技投资发展有限公司 One kind is based on many CA application authentication methods of block chain
CN107257341A (en) * 2017-06-21 2017-10-17 济南浪潮高新科技投资发展有限公司 A kind of student status based on block chain reviews authentication method
CN107833052A (en) * 2017-10-27 2018-03-23 南京物联传感技术有限公司 A kind of polymerization payment system and method for work based on block chain
CN108063826A (en) * 2017-12-27 2018-05-22 上海唯链信息科技有限公司 A kind of shared and traceability system of car networking based on block chain technology
CN107944892A (en) * 2017-12-28 2018-04-20 上海唯链信息科技有限公司 A kind of milk supply traceability system based on block chain technology
CN108111299A (en) * 2017-12-28 2018-06-01 上海唯链信息科技有限公司 A kind of real-time auditing traceability system based on block chain technology
CN108230109A (en) * 2018-01-02 2018-06-29 罗梅琴 A kind of shared system and method based on block chain technology
CN108055138A (en) * 2018-02-01 2018-05-18 国家计算机网络与信息安全管理中心 Distributed recorder method and system is applied based on block chain
CN108389615A (en) * 2018-02-08 2018-08-10 罗梅琴 A kind of pregnant baby retrospect deposit system and method based on block chain technology

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110489430A (en) * 2019-07-03 2019-11-22 特斯联(北京)科技有限公司 A kind of source tracing method and its system signed and verified based on data block
CN110322333A (en) * 2019-07-10 2019-10-11 北京元链科技有限公司 One kind being based on block chain clearance of goods taxation systems
CN110490613A (en) * 2019-08-27 2019-11-22 山东浪潮质量链科技有限公司 A kind of method and system of the product testing based on block chain

Similar Documents

Publication Publication Date Title
CN108768988A (en) Block chain access control method, equipment and computer readable storage medium
CN112055025B (en) Privacy data protection method based on block chain
CN101189827B (en) Method for inclusive authentication and management of service provider, terminal and user identity module, and system and terminal device using the method
CN108389615A (en) A kind of pregnant baby retrospect deposit system and method based on block chain technology
CN107181765A (en) Network digital identity identifying method based on block chain technology
CN114186248B (en) Zero-knowledge proof verifiable certificate digital identity management system and method based on block chain intelligent contracts
CN106972931A (en) A kind of method of certificate transparence in PKI
CN105656920B (en) A kind of encryption and decryption method and system for posting number of packages evidence based on express delivery
CN107317789A (en) Key distribution, authentication method, apparatus and system
CN112199726A (en) Block chain-based alliance trust distributed identity authentication method and system
CN111211907A (en) Information privacy protection and supervision method and system for logistics block chain
CN109242508A (en) A kind of anti-fake and traceability system of the Third Party Authentication report based on block chain technology
CN101291216B (en) P2p network system and authentication method thereof
CN110349026A (en) Decentralized Autonomous energy internet power exchange and energy system based on block chain
CN101547096B (en) Net-meeting system and management method thereof based on digital certificate
WO2023082690A1 (en) Matrix consortium blockchain based sponsoring method capable of concealing real name
CN113079215B (en) Block chain-based wireless security access method for power distribution Internet of things
CN109617875A (en) A kind of the secure accessing platform and its implementation of terminal communication network
CN113469716A (en) Product tracing method and system based on block chain and identification analysis
CN110380859A (en) Based on unsymmetrical key pond to and DH agreement quantum communications service station identity identifying method and system
CN108833113A (en) A kind of authentication method and system of the enhancing communication security calculated based on mist
CN115967941A (en) Power 5G terminal authentication method and authentication system
CN110945833B (en) Method and system for multi-mode identification network privacy protection and identity management
CN107295510A (en) The method, equipment and system of Home eNodeB access control are realized based on OCSP
CN107786546A (en) A kind of red wine anti-fake traceability system based on privately owned chain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20200225

Address after: 100083, five floor, block D, China soft tower, 55 Xueyuan Road, Haidian District, Beijing.

Applicant after: Li Zhishuai

Address before: 100083, five floor, block D, China soft tower, 55 Xueyuan Road, Haidian District, Beijing.

Applicant before: Beijing yuan Chain Technology Co., Ltd.

TA01 Transfer of patent application right
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20190118

WD01 Invention patent application deemed withdrawn after publication