CN109242508A - A kind of anti-fake and traceability system of the Third Party Authentication report based on block chain technology - Google Patents
A kind of anti-fake and traceability system of the Third Party Authentication report based on block chain technology Download PDFInfo
- Publication number
- CN109242508A CN109242508A CN201810926632.9A CN201810926632A CN109242508A CN 109242508 A CN109242508 A CN 109242508A CN 201810926632 A CN201810926632 A CN 201810926632A CN 109242508 A CN109242508 A CN 109242508A
- Authority
- CN
- China
- Prior art keywords
- block
- node
- certification
- party authentication
- party
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/018—Certifying business or products
- G06Q30/0185—Product, service or business identity fraud
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/104—Peer-to-peer [P2P] networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/321—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3297—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
Abstract
The present invention provides a kind of anti-fake and traceability system of Third Party Authentication report based on block chain technology, and participant includes the both sides for needing to authenticate, certification authority, the general public and enterprise;The system includes block chain account book, network node;The network node is divided into one's own side's node, certification node and query node;The present invention refines the function of the participant of Third Party Authentication and power, communication network and temporary communications network are established in case of the write-in and reading of the details of Third Party Authentication report, wherein, parameter involved in the detailed record of Third Party Authentication report is defined, the permission of definite functions, respective node of the invention is also clear that, stronger safe and efficient product false proof and platform of tracing to the source can be provided for consumer, enterprise and third party's quality inspection organization, prevent the circulation of counterfeit and shoddy goods.
Description
Technical field
The present invention relates to block chain anti-counterfeit field, for a kind of the anti-fake of Third Party Authentication report based on block chain technology and
Traceability system.
Background technique
For many years while national economy continues to develop, the production and circulation of counterfeit goods are also becoming increasingly rampant, and make to consume
Person, enterprise, national interests are sustained a great loss, and cause huge destruction to society, market economy, Third Party Authentication report is prevented
Pseudo- and retrospect importance highlights.Block chain technology is a neutral presence, it seems an account book, can recorde all friendships
Easy data can be used for the true and false of verification information.First, block chain is different from common centralization information storage mechanism, goes
The characteristic of the heart determines that block chain is safeguarded the opening and equality of data by numerous nodes jointly.Second, authenticated letter
Breath, which is added to block chain, will be will be unable to realize the modification to data by permanent storage, individual node, so the data of block chain
Stability is higher, and having can not tamper and non repudiation.Third, anyone can be in disclosed interface polls block
The data of chain, in the entire system share and exchange data, therefore block chain maintain system information high opening and thoroughly
Bright property.It with the popularization of Internet of Things and block chain technology, is combined, is realized with existing information safe practice by block chain technology
Commodity counterfeit prevention and supply chain are traced to the source, and have the characteristic of low cost and high-tech, can effectively realize the anti-fake of Third Party Authentication report
And retrospect.Study the anti-fake trace-back technique based on block chain, it is intended that providing for consumer, enterprise and third party's quality inspection organization more has
The safe and efficient product false proof of power and platform of tracing to the source, prevent the circulation of counterfeit and shoddy goods.
Summary of the invention
In view of this, the present invention provides a kind of third party based on block chain technology solved or part solves the above problems
Authenticate the anti-fake and traceability system of report.
To achieve the effect that above-mentioned technical proposal, the technical solution of the present invention is as follows: a kind of third based on block chain technology
The anti-fake and traceability system of side's certification report, includes the following contents:
The anti-fake and traceability system of Third Party Authentication report based on block chain technology includes block chain account book, network section
Point;Network node is divided into one's own side's node, certification node and query node;One's own side's node, certification node and query node composition
Communication network authenticates manager of the node as network node;
(1) block chain account book is used to store the detailed record of Third Party Authentication report, the detailed note of Third Party Authentication report
Record is packaged into block of the data packet in block chain account book and is stored in the form of chain type, and chain structure indicates block with sequential relationship
A chain is linked together and formed in tandem, and the area being arranged in front can be traced back to by arranging posterior block in chain
Block, sequential relationship are the precedence relationship of the time of the generation of block;Data are connected by hash algorithm, timestamp characteristic is provided,
Guarantee that data can not distort characteristic;Block chain account book use P2P networking technology, network node wherein included it is equal and with
Flat topological structure is interconnected and interaction;Public and private key protection mechanism is realized using rivest, shamir, adelman, can be used for testing
Demonstrate,prove nodal information, protection privacy of user, digital signature and debarkation authentication;
(2) certification node is responsible for that the detailed record of Third Party Authentication report is written into block chain account book, has read right
And write permission;Read right is the detailed record for reading the Third Party Authentication report in block chain account book in block, and write permission is
The detailed record of Third Party Authentication report is written into block chain account book;When Third Party Authentication report is written into block for certification node
When the detailed record accused, temporary communications network is established, the certification node recorded in detail for being responsible for write-in Third Party Authentication report is made
For the manager of temporary communications network, the network node in other communication networks is contained in temporary communications network, temporarily
The in the detailed record of network node broadcast Third Party Authentication report of the manager of communication network into temporary communications network
Tripartite authenticates the main information of report, and the network node in temporary communications network is sent to the manager of temporary communications network checks Shen
Please, after agreeing to, the detailed record of the network node broadcast Third Party Authentication report into temporary communications network;When certification saves
When the detailed record of Third Party Authentication report is written into block for point, while it being put into abstract in block head within a block, made a summary
The VI N code of middle add-on third party certification report and the purchaser record of Third Party Authentication report;It authenticates node and has certification authority
Information, including authorized by state certificate, number of registration, authentication service range set up time, scale etc., are the manager of system, are responsible for
Coordination between network node;This role is directly generally served as by the organ of country or government, or is recognized by country or government
Can tissue go to serve as this role;
(3) one's own side's node is the both sides for needing to obtain Third Party Authentication, has the right to send the request and certification for establishing new block
Node codetermines and the generation of control block;One's own side's node has permission the request for sending to traceability chain and establishing new block, request
It will be sent to the another party for needing the both sides authenticated, after both sides reach the consensus for needing to carry out Third Party Authentication, transmission is recognized
Certification node is given in card request;After certification node receives certification request, staff is sent to walk workflow, after process is covered, nothing
Whether passing through by certification, it is both needed to obtain the confirmation for needing the both sides authenticated;Authentication result obtains needing the confirmation of the both sides authenticated
Afterwards, timestamp is covered, new block is formed, is added in traceability chain, this block once being formed, can be traced, can not modify;For
Certification does not pass through, it is also necessary to which the one's own side's node authenticated again sends the request for establishing block according to method again, and new block is asked
Seek the block information that a upper authentification failure is had in information;For same project to one's own side's node of multiple certification authorities, according to
Method sends the request for establishing block to multiple certification authorities;
(4) query node only has read right, can inquire authentication information, is not involved in block foundation;The read right of limitation
Only in the case where belonging to the permission of manager of the same communication network, to be just read out belonging to of storing in block chain account book
The detailed record of the Third Party Authentication report of manager's write-in of the same communication network;Query node can be according to one's own side's node
The Third Party Authentication report of offer traces the true authentication result of this certification authority, this purpose history authentication result authenticates machine
The authentication result of the authority of structure and this project in different authentication mechanism;
Beneficial achievement of the invention are as follows: the Third Party Authentication report based on block chain technology that the present invention provides a kind of is prevented
Pseudo- and traceability system, definite functions, the permission of respective node are it is also clear that can be consumer, enterprise and third party's quality inspection organization
Stronger safe and efficient product false proof and platform of tracing to the source are provided, the circulation of counterfeit and shoddy goods is prevented.
Specific embodiment
In order to which technical problems, technical solutions and advantages to be solved are more clearly understood, tie below
Embodiment is closed, the present invention will be described in detail.It should be noted that specific embodiment described herein is only to explain
The present invention is not intended to limit the present invention, and the product for being able to achieve said function belongs to equivalent replacement and improvement, is all contained in this hair
Within bright protection scope.The specific method is as follows:
Embodiment 1: the anti-fake and traceability system of the Third Party Authentication report based on block chain technology include block chain account book,
Network node;Network node is divided into one's own side's node, certification node and query node;One's own side's node, certification node and inquiry section
Point composition communication network, authenticates manager of the node as network node;
(1) block chain account book is used to store the detailed record of Third Party Authentication report, the detailed note of Third Party Authentication report
Record is packaged into block of the data packet in block chain account book and is stored in the form of chain type, and chain structure indicates block with sequential relationship
A chain is linked together and formed in tandem, and the area being arranged in front can be traced back to by arranging posterior block in chain
Block, sequential relationship are the precedence relationship of the time of the generation of block;Data are connected by hash algorithm, timestamp characteristic is provided,
Guarantee that data can not distort characteristic;Block chain account book use P2P networking technology, network node wherein included it is equal and with
Flat topological structure is interconnected and interaction;Public and private key protection mechanism is realized using rivest, shamir, adelman, can be used for testing
Demonstrate,prove nodal information, protection privacy of user, digital signature and debarkation authentication;
(2) certification node is responsible for that the detailed record of Third Party Authentication report is written into block chain account book, has read right
And write permission;Read right is the detailed record for reading the Third Party Authentication report in block chain account book in block, and write permission is
The detailed record of Third Party Authentication report is written into block chain account book;When Third Party Authentication report is written into block for certification node
When the detailed record accused, temporary communications network is established, the certification node recorded in detail for being responsible for write-in Third Party Authentication report is made
For the manager of temporary communications network, the network node in other communication networks is contained in temporary communications network, temporarily
The in the detailed record of network node broadcast Third Party Authentication report of the manager of communication network into temporary communications network
Tripartite authenticates the main information of report, and the network node in temporary communications network is sent to the manager of temporary communications network checks Shen
Please, after agreeing to, the detailed record of the network node broadcast Third Party Authentication report into temporary communications network;When certification saves
When the detailed record of Third Party Authentication report is written into block for point, while it being put into abstract in block head within a block, made a summary
The VI N code of middle add-on third party certification report and the purchaser record of Third Party Authentication report;It authenticates node and has certification authority
Information, including authorized by state certificate, number of registration, authentication service range set up time, scale etc., are the manager of system, are responsible for
Coordination between network node;This role is directly generally served as by the organ of country or government, or is recognized by country or government
Can tissue go to serve as this role;
(3) one's own side's node is the both sides for needing to obtain Third Party Authentication, has the right to send the request and certification for establishing new block
Node codetermines and the generation of control block;One's own side's node has permission the request for sending to traceability chain and establishing new block, request
It will be sent to the another party for needing the both sides authenticated, after both sides reach the consensus for needing to carry out Third Party Authentication, transmission is recognized
Certification node is given in card request;After certification node receives certification request, staff is sent to walk workflow, after process is covered, nothing
Whether passing through by certification, it is both needed to obtain the confirmation for needing the both sides authenticated;Authentication result obtains needing the confirmation of the both sides authenticated
Afterwards, timestamp is covered, new block is formed, is added in traceability chain, this block once being formed, can be traced, can not modify;For
Certification does not pass through, it is also necessary to which the one's own side's node authenticated again sends the request for establishing block according to method again, and new block is asked
Seek the block information that a upper authentification failure is had in information;For same project to one's own side's node of multiple certification authorities, according to
Method sends the request for establishing block to multiple certification authorities;
(4) query node only has read right, can inquire authentication information, is not involved in block foundation;The read right of limitation
Only in the case where belonging to the permission of manager of the same communication network, to be just read out belonging to of storing in block chain account book
The detailed record of the Third Party Authentication report of manager's write-in of the same communication network;Query node can be according to one's own side's node
The Third Party Authentication report of offer traces the true authentication result of this certification authority, this purpose history authentication result authenticates machine
The authentication result of the authority of structure and this project in different authentication mechanism;
Beneficial achievement of the invention are as follows: the Third Party Authentication report based on block chain technology that the present invention provides a kind of is prevented
Pseudo- and traceability system, definite functions, the permission of respective node are it is also clear that can be consumer, enterprise and third party's quality inspection organization
Stronger safe and efficient product false proof and platform of tracing to the source are provided, the circulation of counterfeit and shoddy goods is prevented.
The foregoing is merely the preferred embodiments of the invention, the claims that are not intended to limit the invention.
Simultaneously it is described above, for those skilled in the technology concerned it would be appreciated that and implement, therefore other be based on institute of the present invention
The equivalent change that disclosure is completed, should be included in the covering scope of the claims.
Claims (1)
1. a kind of anti-fake and traceability system of the Third Party Authentication report based on block chain technology, which is characterized in that comprising following
Content:
(1) the detailed record of the Third Party Authentication report is packaged into block of the data packet in the block chain account book with chain
The storage of formula form, the chain structure indicate that the block is linked together in tandem with sequential relationship and forms a chain
Item, posterior block is arranged in the chain can trace back to the block being arranged in front, and the sequential relationship is the generation of block
Time precedence relationship;Data are connected by hash algorithm, timestamp characteristic is provided, and guarantee that data can not distort characteristic;Institute
Block chain account book is stated using P2P networking technology, network node wherein included is equal and mutual with flat topological structure
Connection and interaction;Public and private key protection mechanism is realized using rivest, shamir, adelman, can be used for verifying nodal information, protects user
Privacy, digital signature and debarkation authentication;
(2) the certification node is responsible for that the detailed record of the Third Party Authentication report, tool are written into the block chain account book
There are read right and write permission;The read right is the Third Party Authentication report read in the block chain account book in block
Detailed record, the write permission is the detailed record that Third Party Authentication report is written into the block chain account book;When
When the detailed record of the Third Party Authentication report is written into the block for the certification node, temporary communications network is established,
It is responsible for management of the certification node of the write-in Third Party Authentication report recorded in detail as the temporary communications network
Person, the network node in other described communication networks are contained in the temporary communications network, the temporary communications
The network node of the manager of network into the temporary communications network broadcasts the detailed note of the Third Party Authentication report
The Third Party Authentication in record reports main information, and the network node in the temporary communications network temporarily leads to described
The manager of news network, which sends, checks application, the network node broadcast after agreeing to, into the temporary communications network
The detailed record of the Third Party Authentication report;When the Third Party Authentication report is written into the block for the certification node
Detailed record when, while abstract is put into the block head in the block, add-on third party certification report in the abstract
VI N code and Third Party Authentication report purchaser record;The certification node has certification authority's information, including country is recognized
Can certificate, number of registration, authentication service range, set up time, scale etc., be the manager of the system, be responsible for the network section
Coordination between point;This role, or the group approved by country or government are directly generally served as by the organ of country or government
It knits and serves as this role;
(3) one's own side's node is the both sides for needing to obtain Third Party Authentication, has the right to send and establishes the request of new block and described
Authenticate the generation that node codetermines and controls block;One's own side's node, which has permission to traceability chain transmission, establishes new block
Request, the request will be sent to described another party of both sides for needing to authenticate, and both sides, which reach, to need to carry out Third Party Authentication
Consensus after, send certification request to the certification node;After the certification node receives the certification request, work is sent
Walk workflow as personnel, after process is covered, no matter authenticate by whether, be both needed to obtain the both sides for needing to authenticate really
Recognize;After the authentication result obtains the confirmation of the both sides for needing to authenticate, timestamp is covered, new block is formed, is added to
In the traceability chain, this block once being formed, can be traced, can not modify;For certification do not pass through, it is also necessary to authenticate again oneself
Fang Jiedian sends the request for establishing block again according to the method, authenticates in the new block solicited message with upper one
The block information of failure;For same project to one's own side's node of multiple certification authorities, according to the method to multiple certification machines
Structure sends the request for establishing block;
(4) query node only has the read right, can inquire authentication information, is not involved in block foundation;The limitation
Read right be only in the case where belonging to the permission of the manager of the same communication network, can just be read out the area
The Third Party Authentication report of the manager write-in for belonging to the same communication network stored in block chain account book
Record in detail;The query node can trace the true of this certification authority according to the Third Party Authentication report that one's own side's node provides
Authentication result, this purpose history authentication result, the authority of the certification authority and this project are in different authentication mechanism
Authentication result.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810926632.9A CN109242508A (en) | 2018-08-15 | 2018-08-15 | A kind of anti-fake and traceability system of the Third Party Authentication report based on block chain technology |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810926632.9A CN109242508A (en) | 2018-08-15 | 2018-08-15 | A kind of anti-fake and traceability system of the Third Party Authentication report based on block chain technology |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109242508A true CN109242508A (en) | 2019-01-18 |
Family
ID=65071569
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810926632.9A Pending CN109242508A (en) | 2018-08-15 | 2018-08-15 | A kind of anti-fake and traceability system of the Third Party Authentication report based on block chain technology |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109242508A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110322333A (en) * | 2019-07-10 | 2019-10-11 | 北京元链科技有限公司 | One kind being based on block chain clearance of goods taxation systems |
CN110490613A (en) * | 2019-08-27 | 2019-11-22 | 山东浪潮质量链科技有限公司 | A kind of method and system of the product testing based on block chain |
CN110489430A (en) * | 2019-07-03 | 2019-11-22 | 特斯联(北京)科技有限公司 | A kind of source tracing method and its system signed and verified based on data block |
Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104065484A (en) * | 2014-06-26 | 2014-09-24 | 江苏买卖网电子商务有限公司 | Electronic contract platform realizing method based on SDK message and digital signature |
CN105610578A (en) * | 2016-01-25 | 2016-05-25 | 杭州复杂美科技有限公司 | Block chain information archiving and privacy protection method |
CN106341493A (en) * | 2016-11-01 | 2017-01-18 | 北京金股链科技有限公司 | Entity rights oriented digitalized electronic contract signing method |
CN107257341A (en) * | 2017-06-21 | 2017-10-17 | 济南浪潮高新科技投资发展有限公司 | A kind of student status based on block chain reviews authentication method |
CN107273760A (en) * | 2017-06-09 | 2017-10-20 | 济南浪潮高新科技投资发展有限公司 | One kind is based on many CA application authentication methods of block chain |
CN107833052A (en) * | 2017-10-27 | 2018-03-23 | 南京物联传感技术有限公司 | A kind of polymerization payment system and method for work based on block chain |
CN107944892A (en) * | 2017-12-28 | 2018-04-20 | 上海唯链信息科技有限公司 | A kind of milk supply traceability system based on block chain technology |
CN108055138A (en) * | 2018-02-01 | 2018-05-18 | 国家计算机网络与信息安全管理中心 | Distributed recorder method and system is applied based on block chain |
CN108063826A (en) * | 2017-12-27 | 2018-05-22 | 上海唯链信息科技有限公司 | A kind of shared and traceability system of car networking based on block chain technology |
CN108111299A (en) * | 2017-12-28 | 2018-06-01 | 上海唯链信息科技有限公司 | A kind of real-time auditing traceability system based on block chain technology |
CN108230109A (en) * | 2018-01-02 | 2018-06-29 | 罗梅琴 | A kind of shared system and method based on block chain technology |
CN108389615A (en) * | 2018-02-08 | 2018-08-10 | 罗梅琴 | A kind of pregnant baby retrospect deposit system and method based on block chain technology |
-
2018
- 2018-08-15 CN CN201810926632.9A patent/CN109242508A/en active Pending
Patent Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104065484A (en) * | 2014-06-26 | 2014-09-24 | 江苏买卖网电子商务有限公司 | Electronic contract platform realizing method based on SDK message and digital signature |
CN105610578A (en) * | 2016-01-25 | 2016-05-25 | 杭州复杂美科技有限公司 | Block chain information archiving and privacy protection method |
CN106341493A (en) * | 2016-11-01 | 2017-01-18 | 北京金股链科技有限公司 | Entity rights oriented digitalized electronic contract signing method |
CN107273760A (en) * | 2017-06-09 | 2017-10-20 | 济南浪潮高新科技投资发展有限公司 | One kind is based on many CA application authentication methods of block chain |
CN107257341A (en) * | 2017-06-21 | 2017-10-17 | 济南浪潮高新科技投资发展有限公司 | A kind of student status based on block chain reviews authentication method |
CN107833052A (en) * | 2017-10-27 | 2018-03-23 | 南京物联传感技术有限公司 | A kind of polymerization payment system and method for work based on block chain |
CN108063826A (en) * | 2017-12-27 | 2018-05-22 | 上海唯链信息科技有限公司 | A kind of shared and traceability system of car networking based on block chain technology |
CN107944892A (en) * | 2017-12-28 | 2018-04-20 | 上海唯链信息科技有限公司 | A kind of milk supply traceability system based on block chain technology |
CN108111299A (en) * | 2017-12-28 | 2018-06-01 | 上海唯链信息科技有限公司 | A kind of real-time auditing traceability system based on block chain technology |
CN108230109A (en) * | 2018-01-02 | 2018-06-29 | 罗梅琴 | A kind of shared system and method based on block chain technology |
CN108055138A (en) * | 2018-02-01 | 2018-05-18 | 国家计算机网络与信息安全管理中心 | Distributed recorder method and system is applied based on block chain |
CN108389615A (en) * | 2018-02-08 | 2018-08-10 | 罗梅琴 | A kind of pregnant baby retrospect deposit system and method based on block chain technology |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110489430A (en) * | 2019-07-03 | 2019-11-22 | 特斯联(北京)科技有限公司 | A kind of source tracing method and its system signed and verified based on data block |
CN110322333A (en) * | 2019-07-10 | 2019-10-11 | 北京元链科技有限公司 | One kind being based on block chain clearance of goods taxation systems |
CN110490613A (en) * | 2019-08-27 | 2019-11-22 | 山东浪潮质量链科技有限公司 | A kind of method and system of the product testing based on block chain |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108768988A (en) | Block chain access control method, equipment and computer readable storage medium | |
CN112055025B (en) | Privacy data protection method based on block chain | |
CN101189827B (en) | Method for inclusive authentication and management of service provider, terminal and user identity module, and system and terminal device using the method | |
CN108389615A (en) | A kind of pregnant baby retrospect deposit system and method based on block chain technology | |
CN107181765A (en) | Network digital identity identifying method based on block chain technology | |
CN114186248B (en) | Zero-knowledge proof verifiable certificate digital identity management system and method based on block chain intelligent contracts | |
CN106972931A (en) | A kind of method of certificate transparence in PKI | |
CN105656920B (en) | A kind of encryption and decryption method and system for posting number of packages evidence based on express delivery | |
CN107317789A (en) | Key distribution, authentication method, apparatus and system | |
CN112199726A (en) | Block chain-based alliance trust distributed identity authentication method and system | |
CN111211907A (en) | Information privacy protection and supervision method and system for logistics block chain | |
CN109242508A (en) | A kind of anti-fake and traceability system of the Third Party Authentication report based on block chain technology | |
CN101291216B (en) | P2p network system and authentication method thereof | |
CN110349026A (en) | Decentralized Autonomous energy internet power exchange and energy system based on block chain | |
CN101547096B (en) | Net-meeting system and management method thereof based on digital certificate | |
WO2023082690A1 (en) | Matrix consortium blockchain based sponsoring method capable of concealing real name | |
CN113079215B (en) | Block chain-based wireless security access method for power distribution Internet of things | |
CN109617875A (en) | A kind of the secure accessing platform and its implementation of terminal communication network | |
CN113469716A (en) | Product tracing method and system based on block chain and identification analysis | |
CN110380859A (en) | Based on unsymmetrical key pond to and DH agreement quantum communications service station identity identifying method and system | |
CN108833113A (en) | A kind of authentication method and system of the enhancing communication security calculated based on mist | |
CN115967941A (en) | Power 5G terminal authentication method and authentication system | |
CN110945833B (en) | Method and system for multi-mode identification network privacy protection and identity management | |
CN107295510A (en) | The method, equipment and system of Home eNodeB access control are realized based on OCSP | |
CN107786546A (en) | A kind of red wine anti-fake traceability system based on privately owned chain |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20200225 Address after: 100083, five floor, block D, China soft tower, 55 Xueyuan Road, Haidian District, Beijing. Applicant after: Li Zhishuai Address before: 100083, five floor, block D, China soft tower, 55 Xueyuan Road, Haidian District, Beijing. Applicant before: Beijing yuan Chain Technology Co., Ltd. |
|
TA01 | Transfer of patent application right | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20190118 |
|
WD01 | Invention patent application deemed withdrawn after publication |