CN109615397A - Security identifier authentication method and device based on block chain - Google Patents
Security identifier authentication method and device based on block chain Download PDFInfo
- Publication number
- CN109615397A CN109615397A CN201811492806.1A CN201811492806A CN109615397A CN 109615397 A CN109615397 A CN 109615397A CN 201811492806 A CN201811492806 A CN 201811492806A CN 109615397 A CN109615397 A CN 109615397A
- Authority
- CN
- China
- Prior art keywords
- security identifier
- security
- chain
- examination
- result
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/018—Certifying business or products
- G06Q30/0185—Product, service or business identity fraud
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/08—Insurance
Landscapes
- Business, Economics & Management (AREA)
- Finance (AREA)
- Engineering & Computer Science (AREA)
- Accounting & Taxation (AREA)
- Marketing (AREA)
- Economics (AREA)
- Development Economics (AREA)
- Strategic Management (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Entrepreneurship & Innovation (AREA)
- Technology Law (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
The invention discloses a kind of security identifier authentication methods and device based on block chain.Method includes: the security identifier authentication information for receiving security identifier application node and providing, and security identifier authentication information is entered chain and deposits card, so that security identifier manager carries out preliminary hearing to security identifier authentication information;It receives the preliminary hearing that security identifier management node provides and deposits card as a result, preliminary hearing result is entered chain, so that security identifier examines that detection root carries out examination as to substances to security identifier applicant according to preliminary hearing result;It receives the examination as to substances that security identifier examines that detection node provides and deposits card as a result, examination as to substances result is entered chain, so that security identifier manager determines whether to provide security identifier according to examination as to substances result;The security identifier release information that security identifier management node provides is received, security identifier release information is entered into chain and deposits card, realizes the real time monitoring of equipment, monitoring capacity is promoted, reduces security risk.
Description
Technical field
The present invention relates to block chain technical fields, and in particular to a kind of security identifier authentication method and dress based on block chain
It sets.
Background technique
After equipment investment use, due to plant issue, cause safety accident and cause casualties with it is great
Property loss has stringent security performance requirement to equipment, especially for winning equipment.
China is from the nineties in last century, on the basis of using for reference international advanced management experience, in conjunction with the actual conditions in China,
Start to carry out enforceable security identifier management system, clearly propose the access system of equipment, to improve production management level, setting
Standby safe operation reduces accident, specification industry order, plays the role of highly important.But in normal course of operation, still deposit
Dynamic management, real time monitoring and data are being difficult to realize only in internal communication, the problem that can not be shared.
Summary of the invention
In view of the above problems, it proposes on the present invention overcomes the above problem or at least be partially solved in order to provide one kind
State the security identifier authentication method and device based on block chain of problem.
According to an aspect of the invention, there is provided a kind of security identifier authentication method based on block chain, method include:
The security identifier authentication information that security identifier application node provides is received, and security identifier authentication information is entered into chain and is deposited
Card, so that security identifier manager carries out preliminary hearing to security identifier authentication information;
Receive the preliminary hearing that security identifier management node provides as a result, and preliminary hearing result entered into chain deposit card, for security identifier
Examine that detection root carries out examination as to substances to security identifier applicant according to preliminary hearing result;
Receive the examination as to substances that security identifier examines that detection node provides as a result, and examination as to substances result entered into chain deposit card,
So that security identifier manager determines whether to provide security identifier according to examination as to substances result;
The security identifier release information that security identifier management node provides is received, and security identifier release information is entered into chain and is deposited
Card.
Optionally, after security identifier release information to be entered to chain and deposits card, method further include: receive security identifier application section
The equipment operating data that point provides, and equipment operating data is stored into block chain.
Optionally, after storing equipment operating data into block chain, method further include: receive security identifier supervision
Side is to the Safety Examination provided after equipment operating data progress Safety Examination by security identifier supervisory node as a result, and will be safe
Examination result enters chain and deposits card.
Optionally, security identifier release information includes: security identifier effective time;
Method further include: if security identifier fails, run intelligent contract notice security identifier manager to security identifier
Applicant carries out security identifier review;
Equipment operating data is broadcast to security identifier management node, so that safety management side carries out equipment operating data
Review analysis, to determine equipment with the presence or absence of violation operation action.
Optionally, after storing equipment operating data into block chain, method further include: equipment operating data is wide
It broadcasts to security identifier management node and/or security identifier supervisory node, so that security identifier manager and/or security identifier supervise
Root carries out safety accident confirmation of responsibility according to equipment operating data, alternatively, so that security identifier manager runs number according to equipment
According to revision security identifier Valuation Standard;And/or so that security identifier monitoring party revises security control mark according to equipment operating data
It is quasi-.
Optionally, before receiving the security identifier authentication information that security identifier application node provides, method further include:
The real-name authentication solicited message that security identifier application node provides is received, real-name authentication solicited message is tested
Card completes real-name authentication processing if being proved to be successful, and successfully responds to security identifier application node feedback real-name authentication.
Optionally, method further include: information is paid in the insurance for receiving the security identifier applicant that insurance service node provides,
And insurance paid into information enters chain and deposit card.
According to another aspect of the present invention, a kind of security identifier authentication device based on block chain is provided, device includes:
First execution module, the security identifier authentication information provided suitable for receiving security identifier application node;Receive safety
Identify the preliminary hearing result that management node provides;It receives security identifier and examines the examination as to substances result that detection node provides;And it connects
Receive the security identifier release information that security identifier management node provides;
Second execution module deposits card suitable for security identifier authentication information is entered chain, so that security identifier manager is to safety
ID authentication information carries out preliminary hearing;Preliminary hearing result is entered into chain and deposits card, so that security identifier examines detection root according to preliminary hearing result pair
Security identifier applicant carries out examination as to substances;Examination as to substances result is entered into chain and deposits card, so that security identifier manager is according to essence
Examination result determines whether to provide security identifier;And security identifier release information is entered into chain and deposits card.
According to another aspect of the invention, provide a kind of calculating equipment, comprising: processor, memory, communication interface and
Communication bus, processor, memory and communication interface complete mutual communication by communication bus;
For memory for storing an at least executable instruction, it is above-mentioned based on block chain that executable instruction executes processor
The corresponding operation of security identifier authentication method.
In accordance with a further aspect of the present invention, a kind of computer storage medium is provided, at least one is stored in storage medium
Executable instruction, executable instruction make processor execute such as the above-mentioned corresponding behaviour of security identifier authentication method based on block chain
Make.
In accordance with a further aspect of the present invention, a kind of security identifier Verification System based on block chain is provided, system includes:
System includes: security identifier application node, security identifier management node, security identifier examination detection node, security identifier supervision
Node, insurance service node and the security identifier authentication platform based on block chain;
Security identifier authentication platform based on block chain includes: processor, memory, communication interface and communication bus, place
Reason device, memory and communication interface complete mutual communication by communication bus;
Memory executes processor as above-mentioned based on block chain for storing an at least executable instruction, executable instruction
The corresponding operation of security identifier authentication method.
The scheme provided according to the present invention receives the security identifier authentication information that security identifier application node provides, and will
Security identifier authentication information enters chain and deposits card, so that security identifier manager carries out preliminary hearing to security identifier authentication information;Receive peace
Preliminary hearing that full mark management node provides as a result, and preliminary hearing result entered into chain deposit card, detect root evidence so that security identifier examines
Preliminary hearing result carries out examination as to substances to security identifier applicant;It receives security identifier and examines the examination as to substances knot that detection node provides
Fruit, and examination as to substances result is entered into chain and deposits card, so that security identifier manager determines whether to provide peace according to examination as to substances result
Full mark;The security identifier release information that security identifier management node provides is received, and security identifier release information is entered into chain and is deposited
Card.Based on scheme provided by the invention, the real time monitoring of equipment is realized, monitoring capacity is promoted, reduces security risk, overcome
The data that each link generates are entered chain and deposit card by the problems such as data can not be monitored in real time, can not be shared in security identifier management process
Mode can ensure the safeties of data, guarantee that the whole record data of security identifier certification can not be distorted and can be traced to the source.
The above description is only an overview of the technical scheme of the present invention, in order to better understand the technical means of the present invention,
And it can be implemented in accordance with the contents of the specification, and in order to allow above and other objects of the present invention, feature and advantage can
It is clearer and more comprehensible, the followings are specific embodiments of the present invention.
Detailed description of the invention
By reading the following detailed description of the preferred embodiment, various other advantages and benefits are common for this field
Technical staff will become clear.The drawings are only for the purpose of illustrating a preferred embodiment, and is not considered as to the present invention
Limitation.And throughout the drawings, the same reference numbers will be used to refer to the same parts.In the accompanying drawings:
Fig. 1 shows the process signal of the security identifier authentication method according to an embodiment of the invention based on block chain
Figure;
Fig. 2 shows the processes of the security identifier authentication method in accordance with another embodiment of the present invention based on block chain to show
It is intended to;
Fig. 3 shows the structural representation of the security identifier authentication device according to an embodiment of the invention based on block chain
Figure;
Fig. 4 shows the structural schematic diagram according to an embodiment of the invention for calculating equipment.
Specific embodiment
Exemplary embodiments of the present disclosure are described in more detail below with reference to accompanying drawings.Although showing the disclosure in attached drawing
Exemplary embodiment, it being understood, however, that may be realized in various forms the disclosure without should be by embodiments set forth here
It is limited.On the contrary, these embodiments are provided to facilitate a more thoroughly understanding of the present invention, and can be by the scope of the present disclosure
It is fully disclosed to those skilled in the art.
Methods and apparatus of the present invention is based on block chain technology, is also referred to as distributed account book technology, is a kind of interconnection
Grid database technology, its main feature is that it is decentralization, open and clear, allow everyone to each may participate in data-base recording.
Fig. 1 shows the process signal of the security identifier authentication method according to an embodiment of the invention based on block chain
Figure.Block chain involved in the present embodiment is specifically as follows alliance's chain, and alliance's chain is otherwise known as industry chain, and having allows to authorize
Node network is added, and the characteristics of can check information according to permission.Specifically, by security identifier service stage and security identifier
Definition is more in alliance's chain as alliance chain member, and according to the function of each participant for each participant involved by management phase
A node.
Wherein, during security identifier service stage and security identifier management phase, related participant at least:
Platform operation side, security identifier applicant, security identifier manager, security identifier examine detection side.It is responsible for dimension in platform operation side
The normal operation of platform is protected, parameter relevant to security identifier and rule are set;Security identifier applicant is specially that equipment has peace
Full ID authentication demand participant, such as the production unit etc. using equipment progress operation;Security identifier manager is specially pair
Security identifier authentication information carries out the participant of preliminary hearing, for example, security identifier office etc.;Security identifier examines that detection side is specific
For to security identifier applicant carry out examination as to substances participant, for example, security identifier syndic etc..As a result, in the present embodiment
Alliance's chain, which includes at least, to be had: security identifier application node, security identifier management node and security identifier examine detection node.
In practical application, the safety based on block chain that the solution of the present invention building includes above-mentioned each node can use
ID authentication platform, each participant handle industry on the security identifier authentication platform based on block chain by corresponding node
Business, each node saves the data being collected into block chain, to guarantee the safety of data, promotes the credible of platform
Degree.
As shown in Figure 1, method includes the following steps:
Step S100 receives the security identifier authentication information that security identifier application node provides, and security identifier is authenticated
Information enters chain and deposits card, so that security identifier manager carries out preliminary hearing to security identifier authentication information.
Security identifier applicant is equipment user, in equipment before use, requiring to carry out security identifier certification to equipment,
It only can just be come into operation by the equipment that security identifier authenticates, therefore, security identifier certification here can be understood as again
Obtain the license that equipment investment uses.
Security identifier applicant can propose security identifier certification application, and submit needed for certification according to corresponding regulation
Information, specifically, security identifier applicant can submit security identifier authentication information by security identifier application node, receive
After the security identifier authentication information provided to security identifier application node, security identifier authentication information is entered into chain and deposits card, for
Security identifier manager carries out preliminary hearing to security identifier authentication information.By saving security identifier authentication information into block chain
It can guarantee that data can not distort, ensure that the authenticity of data.Wherein, security identifier authentication information includes: equipment and technology ginseng
Several and equipment operating environment information etc..
In a kind of optional embodiment of the present invention, equipment technical parameters by equipment producer to be provided, and specifically, is received
Equipment produces the equipment technical parameters that node provides, and equipment technical parameters are entered chain and deposit card.
Step S101, receive the preliminary hearing that security identifier management node provides as a result, and preliminary hearing result entered into chain deposit card, for
Security identifier examines that detection root carries out examination as to substances to security identifier applicant according to preliminary hearing result.
Security identifier authentication information real-time broadcast can be shared to safety by the security identifier authentication platform based on block chain
Management node is identified, after receiving security identifier certification application, security identifier manager can be to security identifier application node institute
The security identifier authentication information of offer carries out preliminary hearing, mainly examines whether meet corresponding requirement, for example, technical requirements, stream
Range request, if satisfactory, it is believed that passed through preliminary hearing;If it does not meet the requirements, it is believed that do not pass through preliminary hearing.
Security identifier manager to security identifier authentication information carry out it is pre- post-trial, security identifier management node can be passed through
Preliminary hearing is submitted as a result, preliminary hearing result is entered chain and deposits card after receiving the preliminary hearing result that security identifier management node provides.
The examination that security identifier manager carries out security identifier authentication information is preliminary inquiry process, if by tentatively examining
Cha Hou, it is also necessary to which examination as to substances is carried out to security identifier applicant.Security identifier examines that detection side is according to preliminary hearing result to peace
Full mark applicant carries out examination as to substances.
Step S102 receives the examination as to substances that security identifier examines that detection node provides as a result, and by examination as to substances result
Enter chain and deposit card, so that security identifier manager determines whether to provide security identifier according to examination as to substances result.
Security identifier authentication platform based on block chain can examine broadcasting share when preliminary hearing fructufy to security identifier
Detection node, security identifier examine that detection side is appointed by security identifier manager, security identifier manager are assisted to examine
Look into, such as carry out paper examination and in-process review, wherein in-process review refer to the qualification to security identifier applicant, technical force,
The working conditions such as equipment and detection means or service condition etc. carry out in-process review.
Security identifier examines that detection side after carrying out examination as to substances to security identifier applicant, can be examined by security identifier
Look into detection node submit examination as to substances as a result, receive security identifier examine detection node provide examination as to substances result after,
Examination as to substances result is entered into chain and deposits card.Security identifier manager can determine whether to provide safety post according to examination as to substances result
Know.
Step S103 receives the security identifier release information that security identifier management node provides, and security identifier is provided
Information enters chain and deposits card.
Security identifier examines that detection side after carrying out examination as to substances to security identifier applicant, can enter examination as to substances result
Chain deposits card, and the security identifier authentication platform based on block chain can give broadcasting share when examination as to substances fructufy to security identifier pipe
Node is managed, if security identifier manager thinks that security identifier applicant has passed through security identifier certification according to examination as to substances result,
Security identifier can be provided to security identifier applicant, then can submit security identifier granting letter by security identifier management node
Breath, after receiving security identifier release information, enters chain for security identifier release information and deposits card.
The method provided according to that above embodiment of the present invention receives the security identifier certification that security identifier application node provides
Information, and security identifier authentication information is entered into chain and deposits card, so that security identifier manager carries out in advance security identifier authentication information
It examines;Receive the preliminary hearing that security identifier management node provides as a result, and preliminary hearing result entered into chain deposit card, so that security identifier examines inspection
It surveys root and examination as to substances is carried out to security identifier applicant according to preliminary hearing result;It receives security identifier and examines the reality that detection node provides
Matter examination result, and examination as to substances result is entered into chain and deposits card, so that security identifier manager is according to the determination of examination as to substances result
No granting security identifier;The security identifier release information that security identifier management node provides is received, and security identifier granting is believed
It ceases and deposits card into chain.Based on scheme provided by the invention, the real time monitoring of equipment is realized, it is hidden to promote monitoring capacity, reduction safety
Suffer from, overcomes the problems such as data in security identifier management process can not be monitored in real time, can not be shared, the data that each link is generated
The safeties of data can be ensured by entering chain and depositing the mode of card, guarantee the whole record data of security identifier certification can not distort and
It can trace to the source.
Fig. 2 shows the processes of the security identifier authentication method in accordance with another embodiment of the present invention based on block chain to show
It is intended to.As shown in Fig. 2, method includes the following steps:
Step S200 receives the security identifier authentication information that security identifier application node provides, and security identifier is authenticated
Information enters chain and deposits card, so that security identifier manager carries out preliminary hearing to security identifier authentication information.
Wherein, security identifier applicant is equipment user, for example, the fortune of the production unit of mining production, lift facility
Unit etc. is sought, mineral products unit needs to carry out security identifier certification to the equipment of production operation, in equipment before carrying out mining production
After authenticating by security identifier, allow equipment investment mining production process;Lift facility before being put into use, needs to carry out safety
ID authentication guarantees that lift facility meets Operational requirements, ensures personal safety.
Security identifier authentication information is that security identifier applicant submit required for security identifier certification for equipment
Authentication information, for example, equipment technical parameters, equipment operating environment information, application form etc..
Security identifier applicant can propose security identifier certification application, and submit needed for certification according to corresponding regulation
Information, specifically, security identifier applicant can submit security identifier authentication information by security identifier application node, receive
After the security identifier authentication information provided to security identifier application node, security identifier authentication information is entered into chain and deposits card.Pass through
Security identifier authentication information, which is saved, can guarantee that data can not be distorted into block chain, ensure that the authenticity of data.
In the present embodiment, security identifier management node is that a node in block chain network therefore can be by wide
Security identifier authentication information is sent to security identifier management node by the mode broadcast, and security identifier manager is receiving safety post
After knowing authentication information, preliminary hearing can be carried out to security identifier authentication information.
Step S201, receive the preliminary hearing that security identifier management node provides as a result, and preliminary hearing result entered into chain deposit card, for
Security identifier examines that detection root carries out examination as to substances to security identifier applicant according to preliminary hearing result.
Security identifier authentication information real-time broadcast can be shared to safety by the security identifier authentication platform based on block chain
Management node is identified, after receiving security identifier certification application, security identifier manager can be to security identifier application node institute
The security identifier authentication information of offer carries out preliminary hearing, mainly examines whether meet corresponding requirement, for example, technical requirements, stream
Range request, if satisfactory, it is believed that passed through preliminary hearing;If it does not meet the requirements, it is believed that do not pass through preliminary hearing.
Security identifier manager to security identifier authentication information carry out it is pre- post-trial, security identifier management node can be passed through
Preliminary hearing is submitted as a result, preliminary hearing result is entered chain and deposits card after receiving the preliminary hearing result that security identifier management node provides, wherein
Preliminary hearing result does not pass through preliminary hearing specifically by preliminary hearing or.
It, can be with the quantity of the untreated security identifier certification application of real-time statistics in a kind of optional embodiment of the present invention
And the quantity counted is showed into security identifier manager, so that security identifier manager be reminded to accelerate to examine.
The examination that security identifier manager carries out security identifier authentication information is preliminary inquiry process, if by tentatively examining
Cha Hou, it is also necessary to which examination as to substances is carried out to security identifier applicant.Security identifier examines that detection side is according to preliminary hearing result to peace
Full mark applicant carries out examination as to substances.
In the present embodiment, security identifier examines that detection node is a node in block chain network, therefore, Ke Yitong
Cross broadcast mode by preliminary hearing result be sent to security identifier examine detection node, security identifier examine detection side receive it is pre-
It concludes after fruit, examination as to substances can be carried out to security identifier applicant.
Step S202 receives the examination as to substances that security identifier examines that detection node provides as a result, and by examination as to substances result
Enter chain and deposit card, so that security identifier manager determines whether to provide security identifier according to examination as to substances result.
Security identifier examines that detection side is appointed by security identifier manager, and security identifier manager is assisted to examine
Look into, such as carry out paper examination and in-process review, wherein in-process review refer to the qualification to security identifier applicant, technical force,
The working conditions such as equipment and detection means or service condition etc. carry out in-process review.
Security identifier examines that detection side after carrying out examination as to substances to security identifier applicant, can be examined by security identifier
Look into detection node submit examination as to substances as a result, receive security identifier examine detection node provide examination as to substances result after,
Examination as to substances result is entered into chain and deposits card.Wherein, examination as to substances result does not pass through specifically by examination or examination.
In the present embodiment, security identifier management node is that a node in block chain network therefore can be by wide
Examination as to substances result is sent to security identifier management node by the mode broadcast, and security identifier manager is receiving examination as to substances knot
After fruit, it can be determined whether to provide security identifier according to examination as to substances result.
Step S203 receives the security identifier release information that security identifier management node provides, and security identifier is provided
Information enters chain and deposits card.
If security identifier manager thinks that security identifier applicant has passed through security identifier certification according to examination as to substances result,
Security identifier can be provided to security identifier applicant, then can submit security identifier granting letter by security identifier management node
Breath, after receiving security identifier release information, enters chain for security identifier release information and deposits card.Wherein, security identifier granting is believed
Breath includes: security identifier Time Of Release, security identifier out-of-service time etc..
In the present embodiment, by storing the data in security identifier verification process into block chain, number can be ensured
According to safety, guarantee that the whole record data of security identifier certification can not be distorted and can be traced to the source, avoid safety post recognition
The phenomenon of playing tricks of card.
Security identifier obtained can be posted in equipment by security identifier applicant after obtaining security identifier, peace
Full mark applicant can use equipment investment.
Step S204 receives the equipment operating data that security identifier application node provides, and equipment operating data is stored
Into block chain.
Security identifier applicant needs the data of recording equipment day-to-day operation in using device procedures, for the ease of subsequent
Determining whether equipment runs in violation of rules and regulations, security identifier applicant can submit equipment operating data by security identifier application node,
After the equipment operating data that the offer of security identifier application node is provided, equipment operating data is stored into block chain, is led to
It crosses and stores equipment operating data into block chain, convenient for monitoring in real time to equipment, improve the safety of operation.Its
In, equipment operating data includes: the information such as equipment operating environment, operating current, different equipment, corresponding equipment operating data
Difference will not enumerate here.
Step S205 receives security identifier monitoring party and is supervised to after equipment operating data progress Safety Examination by security identifier
The Safety Examination that pipe node provides is as a result, and entering chain for Safety Examination result and depositing card.
Security identifier monitoring party is the department supervised to security identifier applicant, is responsible for supervision security identifier applicant
Whether equipment is used in safe range, specifically, security identifier monitoring party can be regular or irregular to equipment operation
Data carry out Safety Examination, no the case where Misuse equipment, security identifier supervision occur to determine in equipment running process
Side to equipment operating data carry out Safety Examination after, can by security identifier supervisory node provide Safety Examination as a result,
After receiving Safety Examination result, Safety Examination result is entered into chain and deposits card.
Step S206 runs intelligent contract notice security identifier manager to security identifier Shen if security identifier fails
Please just carry out security identifier review.
The security identifier provided every time all has validity period, after validity period, needs to carry out safety to equipment again
ID authentication, that is, security identifier review specifically can preset intelligent contract, it is specified that intelligent contract service condition is peace
When full mark effective time reaches, runs intelligent contract notice security identifier manager and safety post is carried out to security identifier applicant
Know review, review here can be divided into two aspects: on the one hand be to carry out review according to existing proceeding in error;On the other hand it is
Equipment operating data is analyzed, to determine that, in the security identifier valid period, equipment whether there is violation operation action.
Equipment operating data is broadcast to security identifier management node by step S207, so that safety management side transports equipment
Row data carry out review analysis, to determine equipment with the presence or absence of violation operation action.
Equipment operating data can be shared to safety by broadcast mode by the security identifier authentication platform based on block chain
Management node is identified, security identifier manager carries out data analysis after getting equipment operating data, to equipment operating data,
To determine equipment with the presence or absence of violation operation action.Security identifier manager can submit data by security identifier management node
Data can be analyzed and be tied as a result, based on the security identifier authentication platform of block chain after receiving data analysis result by analysis
Fruit enters chain and deposits card.
In the present embodiment, it to the execution of step S205 and step S206- step S207 sequence and is not specifically limited.
Equipment operating data is broadcast to security identifier management node and/or security identifier supervisory node by step S208, with
Security identifier Valuation Standard is revised according to equipment operating data for security identifier manager;And/or for security identifier monitoring party
Security control standard is revised according to equipment operating data.
Security identifier manager is responsible to define security identifier Valuation Standard, and security identifier monitoring party is responsible to define security control
Standard, with the development of technology, corresponding security identifier Valuation Standard, security control standard should also change therewith, therefore,
Equipment operating data can be broadcast to security identifier management node and/or safety by the security identifier authentication platform based on block chain
Supervisory node is identified, security identifier manager revises safety post after getting equipment operating data, according to equipment operating data
Know Valuation Standard;And/or security identifier monitoring party is revised according to equipment operating data and is pacified after getting equipment operating data
Full supervision standard.
Information is paid in step S209, the insurance for receiving the security identifier applicant that insurance service node provides, and will insurance
It pays information and enters chain and deposit card.
For production operations personnel such as mining, since operating environment has certain risk, security identifier applicant is logical
Chang Huiwei is bought as personnel to be insured, and insurance service side is to provide the insurance company of insurance service, insurance service side and safety post
After knowing applicant's signing insurance contract, insurance service side can pass through insurance service node and provide the insurance of security identifier applicant
Information is paid, after receiving insurance and paying information, information is paid into insurance enters chain and deposit card.Wherein, insurance pays information and includes:
Time, premium received, guarantee time, compensation content etc. are paid in insurance.
In a kind of optional embodiment of the present invention, due to storing equipment operating data into block chain, sending out
When raw safety accident, data can be carried out and traced to the source, specifically, by equipment operating data be broadcast to security identifier management node and/
Or security identifier supervisory node, so that security identifier manager and/or security identifier monitoring party carry out according to equipment operating data
Safety accident confirmation of responsibility.
In a kind of optional embodiment of the present invention, security identifier applicant is authenticating it to equipment progress safety sign
Before, it needs first to carry out real-name authentication, specifically, the real-name authentication solicited message that security identifier application node provides is received, to reality
Name certification request information is verified, if being proved to be successful, is completed real-name authentication processing, is fed back to security identifier application node real
Name certification successfully response.
In a kind of optional embodiment of the present invention, security identifier Valuation Standard can be by upper management department liable system
It is fixed, specifically, network is added in the corresponding node of upper management department, gives equipment operating data real-time broadcast to upper management portion
The corresponding node of door, upper management department revise security identifier Valuation Standard according to equipment operating data.
The method provided according to that above embodiment of the present invention realizes the real time monitoring of equipment, promotes monitoring capacity, reduces
Security risk, overcomes the problems such as data in security identifier management process can not be monitored in real time, can not be shared, each link is produced
Raw data, which enter chain, which deposits the mode of card, can ensure the safeties of data, guarantee that the whole record data of security identifier certification can not
It distorts and can trace to the source.
Fig. 3 shows the structural representation of the security identifier authentication device according to an embodiment of the invention based on block chain
Figure.As shown in figure 3, the device includes: the first execution module 300, the second execution module 310.
First execution module 300, the security identifier authentication information provided suitable for receiving security identifier application node;Receive peace
The preliminary hearing result that full mark management node provides;It receives security identifier and examines the examination as to substances result that detection node provides;And
Receive the security identifier release information that security identifier management node provides;
Second execution module 310 deposits card suitable for security identifier authentication information is entered chain, so that security identifier manager is to peace
Full ID authentication information carries out preliminary hearing;Preliminary hearing result is entered into chain and deposits card, so that security identifier examines detection root according to preliminary hearing result
Examination as to substances is carried out to security identifier applicant;Examination as to substances result is entered into chain and deposits card, so that security identifier manager is according to reality
Matter examination result determines whether to provide security identifier;And security identifier release information is entered into chain and deposits card.
Optionally, the first execution module is further adapted for: receiving the equipment operating data that security identifier application node provides;
Second execution module is further adapted for: equipment operating data is stored into block chain.
Optionally, the first execution module is further adapted for: receiving security identifier monitoring party and carries out safe examine to equipment operating data
The Safety Examination result provided after looking by security identifier supervisory node;
Second execution module is further adapted for: Safety Examination result being entered chain and deposits card.
Optionally, security identifier release information includes: security identifier effective time;
Device further include: notification module fails if being suitable for security identifier, runs intelligent contract notice security identifier management
Side carries out security identifier review to security identifier applicant;
Third execution module, suitable for equipment operating data is broadcast to security identifier management node, for safety management side
Review analysis is carried out to equipment operating data, to determine equipment with the presence or absence of violation operation action.
Optionally, device further include: the 4th execution module, suitable for equipment operating data is broadcast to security identifier management section
Point and/or security identifier supervisory node, so that security identifier manager and/or security identifier monitoring party are according to equipment operating data
Safety accident confirmation of responsibility is carried out, alternatively, so that security identifier manager revises security identifier certification according to equipment operating data
Standard;And/or so that security identifier monitoring party revises security control standard according to equipment operating data.
Optionally, the first execution module is further adapted for: receiving the real-name authentication solicited message that security identifier application node provides;
Device further include: authentication module, suitable for being verified to real-name authentication solicited message;
6th execution module, if completing real-name authentication processing suitable for being proved to be successful, being fed back to security identifier application node
Real-name authentication successfully responds.
Optionally, the first execution module is further adapted for: receiving the insurance for the security identifier applicant that insurance service node provides
Pay information;
Second execution module is further adapted for: information is paid in insurance enters chain and deposit card.
The device provided according to that above embodiment of the present invention receives the security identifier certification that security identifier application node provides
Information, and security identifier authentication information is entered into chain and deposits card, so that security identifier manager carries out in advance security identifier authentication information
It examines;Receive the preliminary hearing that security identifier management node provides as a result, and preliminary hearing result entered into chain deposit card, so that security identifier examines inspection
It surveys root and examination as to substances is carried out to security identifier applicant according to preliminary hearing result;It receives security identifier and examines the reality that detection node provides
Matter examination result, and examination as to substances result is entered into chain and deposits card, so that security identifier manager is according to the determination of examination as to substances result
No granting security identifier;The security identifier release information that security identifier management node provides is received, and security identifier granting is believed
It ceases and deposits card into chain.Based on scheme provided by the invention, the real time monitoring of equipment is realized, it is hidden to promote monitoring capacity, reduction safety
Suffer from, overcomes the problems such as data in security identifier management process can not be monitored in real time, can not be shared, the data that each link is generated
The safeties of data can be ensured by entering chain and depositing the mode of card, guarantee the whole record data of security identifier certification can not distort and
It can trace to the source.
The embodiment of the present application also provides a kind of nonvolatile computer storage media, computer storage medium be stored with to
The safety based on block chain in above-mentioned any means embodiment can be performed in a few executable instruction, the computer executable instructions
Identification authentication method.
Fig. 4 shows the structural schematic diagram according to an embodiment of the invention for calculating equipment, the specific embodiment of the invention
The specific implementation for calculating equipment is not limited.
As shown in figure 4, the calculating equipment may include: processor (processor) 402, communication interface
(Communications Interface) 404, memory (memory) 406 and communication bus 508.
Wherein:
Processor 402, communication interface 404 and memory 406 complete mutual communication by communication bus 408.
Communication interface 404, for being communicated with the network element of other equipment such as client or other servers etc..
Processor 402 can specifically execute the above-mentioned security identifier authenticating party based on block chain for executing program 410
Correlation step in method embodiment.
Specifically, program 410 may include program code, which includes computer operation instruction.
Processor 402 may be central processor CPU or specific integrated circuit ASIC (Application
Specific Integrated Circuit), or be arranged to implement the integrated electricity of one or more of the embodiment of the present invention
Road.The one or more processors that equipment includes are calculated, can be same type of processor, such as one or more CPU;It can also
To be different types of processor, such as one or more CPU and one or more ASIC.
Memory 406, for storing program 410.Memory 406 may include high speed RAM memory, it is also possible to further include
Nonvolatile memory (non-volatile memory), for example, at least a magnetic disk storage.
Program 410 specifically can be used for so that processor 402 execute in above-mentioned any means embodiment based on block chain
Security identifier authentication method.The specific implementation of each step may refer to the above-mentioned security identifier based on block chain in program 410
Corresponding description in corresponding steps and the unit in embodiment is authenticated, this will not be repeated here.Those skilled in the art can be clear
Recognize to Chu, for convenience and simplicity of description, the equipment of foregoing description and the specific work process of module, can refer to aforementioned
Corresponding process description in embodiment of the method, details are not described herein.
The embodiment of the present application also provides a kind of security identifier Verification Systems based on block chain, which includes: safety
It identifies application node, security identifier management node, security identifier and examines detection node, security identifier supervisory node, insurance service
Node and security identifier authentication platform based on block chain;
Wherein, the security identifier authentication platform based on block chain includes: that processor, memory, communication interface and communication are total
Line, processor, memory and communication interface complete mutual communication by communication bus;
Memory makes processor execute above-mentioned any means implementation for storing an at least executable instruction, executable instruction
The security identifier authentication method based on block chain in example.
Algorithm and display are not inherently related to any particular computer, virtual system, or other device provided herein.
Various general-purpose systems can also be used together with teachings based herein.As described above, it constructs required by this kind of system
Structure be obvious.In addition, the present invention is also not directed to any particular programming language.It should be understood that can use various
Programming language realizes summary of the invention described herein, and the description done above to language-specific is to disclose this hair
Bright preferred forms.
In the instructions provided here, numerous specific details are set forth.It is to be appreciated, however, that implementation of the invention
Example can be practiced without these specific details.In some instances, well known method, structure is not been shown in detail
And technology, so as not to obscure the understanding of this specification.
Similarly, it should be understood that in order to simplify the disclosure and help to understand one or more of the various inventive aspects,
Above in the description of exemplary embodiment of the present invention, each feature of the invention is grouped together into single implementation sometimes
In example, figure or descriptions thereof.However, the disclosed method should not be interpreted as reflecting the following intention: i.e. required to protect
Shield the present invention claims features more more than feature expressly recited in each claim.More precisely, as following
Claims reflect as, inventive aspect is all features less than single embodiment disclosed above.Therefore,
Thus the claims for following specific embodiment are expressly incorporated in the specific embodiment, wherein each claim itself
All as a separate embodiment of the present invention.
Those skilled in the art will understand that can be carried out adaptively to the module in the equipment in embodiment
Change and they are arranged in one or more devices different from this embodiment.It can be the module or list in embodiment
Member or component are combined into a module or unit or component, and furthermore they can be divided into multiple submodule or subelement or
Sub-component.Other than such feature and/or at least some of process or unit exclude each other, it can use any
Combination is to all features disclosed in this specification (including adjoint claim, abstract and attached drawing) and so disclosed
All process or units of what method or apparatus are combined.Unless expressly stated otherwise, this specification is (including adjoint power
Benefit require, abstract and attached drawing) disclosed in each feature can carry out generation with an alternative feature that provides the same, equivalent, or similar purpose
It replaces.
In addition, it will be appreciated by those of skill in the art that although some embodiments described herein include other embodiments
In included certain features rather than other feature, but the combination of the feature of different embodiments mean it is of the invention
Within the scope of and form different embodiments.For example, in the following claims, embodiment claimed is appointed
Meaning one of can in any combination mode come using.
Various component embodiments of the invention can be implemented in hardware, or to run on one or more processors
Software module realize, or be implemented in a combination thereof.It will be understood by those of skill in the art that can be used in practice
Microprocessor or digital signal processor (DSP) realize the safety post recognition according to an embodiment of the present invention based on block chain
Demonstrate,prove some or all functions of some or all components in equipment.The present invention is also implemented as executing institute here
Some or all device or device programs of the method for description are (for example, computer program and computer program produce
Product).It is such to realize that program of the invention can store on a computer-readable medium, or can have one or more
The form of signal.Such signal can be downloaded from an internet website to obtain, and perhaps be provided on the carrier signal or to appoint
What other forms provides.
It should be noted that the above-mentioned embodiments illustrate rather than limit the invention, and ability
Field technique personnel can be designed alternative embodiment without departing from the scope of the appended claims.In the claims,
Any reference symbol between parentheses should not be configured to limitations on claims.Word "comprising" does not exclude the presence of not
Element or step listed in the claims.Word "a" or "an" located in front of the element does not exclude the presence of multiple such
Element.The present invention can be by means of including the hardware of several different elements and being come by means of properly programmed computer real
It is existing.In the unit claims listing several devices, several in these devices can be through the same hardware branch
To embody.The use of word first, second, and third does not indicate any sequence.These words can be explained and be run after fame
Claim.
Claims (11)
1. a kind of security identifier authentication method based on block chain, which is characterized in that the described method includes:
The security identifier authentication information that security identifier application node provides is received, and the security identifier authentication information is entered into chain and is deposited
Card, so that security identifier manager carries out preliminary hearing to security identifier authentication information;
Receive the preliminary hearing that security identifier management node provides as a result, and the preliminary hearing result entered into chain deposit card, for security identifier
Examine that detection root carries out examination as to substances to security identifier applicant according to preliminary hearing result;
Receive the examination as to substances that security identifier examines that detection node provides as a result, and the examination as to substances result entered into chain deposit card,
So that the security identifier manager determines whether to provide security identifier according to examination as to substances result;
The security identifier release information that the security identifier management node provides is received, and the security identifier release information is entered
Chain deposits card.
2. the method according to claim 1, wherein depositing card the security identifier release information is entered chain
Afterwards, the method also includes: receive the equipment operating data that security identifier application node provides, and by the equipment operating data
It stores into block chain.
3. according to the method described in claim 2, it is characterized in that, the equipment operating data is stored into block chain it
Afterwards, the method also includes: receive security identifier monitoring party to equipment operating data carry out Safety Examination after pass through security identifier
The Safety Examination that supervisory node provides is as a result, and entering chain for the Safety Examination result and depositing card.
4. according to the method in claim 2 or 3, which is characterized in that the security identifier release information includes: security identifier
Effective time;
The method also includes: if security identifier fails, intelligent contract notice security identifier manager is run to security identifier
Applicant carries out security identifier review;
Equipment operating data is broadcast to security identifier management node, so that safety management side carries out review to equipment operating data
Analysis, to determine equipment with the presence or absence of violation operation action.
5. according to the method in claim 2 or 3, which is characterized in that store by the equipment operating data to block chain
In after, the method also includes: by equipment operating data be broadcast to security identifier management node and/or security identifier supervision section
Point, so that security identifier manager and/or security identifier monitoring party carry out safety accident confirmation of responsibility according to equipment operating data,
Alternatively, so that security identifier manager revises security identifier Valuation Standard according to equipment operating data;And/or for security identifier
Monitoring party revises security control standard according to equipment operating data.
6. method according to any one of claim 1-3, which is characterized in that provided receiving security identifier application node
Security identifier authentication information before, the method also includes:
The real-name authentication solicited message that security identifier application node provides is received, the real-name authentication solicited message is tested
Card completes real-name authentication processing if being proved to be successful, and Xiang Suoshu security identifier application node feedback real-name authentication is successfully rung
It answers.
7. method according to any one of claim 1-3, which is characterized in that the method also includes: receive insurance clothes
Information is paid in the insurance for the security identifier applicant that business node provides, and the insurance paid information enters chain and deposit card.
8. a kind of security identifier authentication device based on block chain, which is characterized in that described device includes:
First execution module, the security identifier authentication information provided suitable for receiving security identifier application node;Receive security identifier
The preliminary hearing result that management node provides;It receives security identifier and examines the examination as to substances result that detection node provides;And receive institute
The security identifier release information of security identifier management node offer is provided;
Second execution module deposits card suitable for the security identifier authentication information is entered chain, so that security identifier manager is to safety
ID authentication information carries out preliminary hearing;The preliminary hearing result is entered into chain and deposits card, so that security identifier examines that detection root evidence concludes in advance
Fruit carries out examination as to substances to security identifier applicant;The examination as to substances result is entered into chain and deposits card, for the security identifier pipe
Factually matter examination result determines whether to provide security identifier reason root;And the security identifier release information is entered into chain and deposits card.
9. a kind of calculating equipment characterized by comprising processor, memory, communication interface and communication bus, the processing
Device, the memory and the communication interface complete mutual communication by the communication bus;
The memory executes the processor as right is wanted for storing an at least executable instruction, the executable instruction
Ask the corresponding operation of security identifier authentication method described in any one of 1-7 based on block chain.
10. a kind of computer storage medium, which is characterized in that be stored with an at least executable instruction, institute in the storage medium
Stating executable instruction makes processor execute such as the security identifier authenticating party of any of claims 1-7 based on block chain
The corresponding operation of method.
11. a kind of security identifier Verification System based on block chain, which is characterized in that the system comprises: security identifier application
Node, security identifier management node, security identifier examine detection node, security identifier supervisory node, insurance service node and
Security identifier authentication platform based on block chain;
The security identifier authentication platform based on block chain includes: processor, memory, communication interface and communication bus, institute
It states processor, the memory and the communication interface and completes mutual communication by the communication bus;
The memory executes the processor as right is wanted for storing an at least executable instruction, the executable instruction
Ask the corresponding operation of security identifier authentication method described in any one of 1-7 based on block chain.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811492806.1A CN109615397A (en) | 2018-12-07 | 2018-12-07 | Security identifier authentication method and device based on block chain |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811492806.1A CN109615397A (en) | 2018-12-07 | 2018-12-07 | Security identifier authentication method and device based on block chain |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109615397A true CN109615397A (en) | 2019-04-12 |
Family
ID=66008358
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811492806.1A Withdrawn CN109615397A (en) | 2018-12-07 | 2018-12-07 | Security identifier authentication method and device based on block chain |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109615397A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111784103A (en) * | 2020-05-22 | 2020-10-16 | 上海飞鱼医疗科技有限公司 | Reagent quality full-process management system based on block chain technology |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108206760A (en) * | 2016-12-16 | 2018-06-26 | 南京联成科技发展股份有限公司 | A kind of safe O&M framework of industrial control system |
US20180189887A1 (en) * | 2018-01-02 | 2018-07-05 | Validareum Inc. | Cryptographic currency for financial data management, digital and digitalized cross-asset identification and unique digital asset identifier generation, asset valuation and financial risk management |
CN108280328A (en) * | 2018-01-31 | 2018-07-13 | 北京安妮全版权科技发展有限公司 | Method and device is really weighed based on digital signature and the copyright of time service |
CN108540335A (en) * | 2017-12-20 | 2018-09-14 | 深圳市轱辘车联数据技术有限公司 | The management method and managing device of device analysis report |
CN108549825A (en) * | 2018-03-14 | 2018-09-18 | 中链科技有限公司 | A kind of file deposits card, verification and the means of proof and device |
CN108632259A (en) * | 2018-04-17 | 2018-10-09 | 济南浪潮高新科技投资发展有限公司 | A kind of mist calculate node device authentication system and method based on block chain |
CN108810007A (en) * | 2018-06-26 | 2018-11-13 | 东北大学秦皇岛分校 | A kind of Internet of Things security architecture |
CN108876374A (en) * | 2018-06-29 | 2018-11-23 | 全链通有限公司 | The network identity certificate authentication method and system of block chain |
-
2018
- 2018-12-07 CN CN201811492806.1A patent/CN109615397A/en not_active Withdrawn
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108206760A (en) * | 2016-12-16 | 2018-06-26 | 南京联成科技发展股份有限公司 | A kind of safe O&M framework of industrial control system |
CN108540335A (en) * | 2017-12-20 | 2018-09-14 | 深圳市轱辘车联数据技术有限公司 | The management method and managing device of device analysis report |
US20180189887A1 (en) * | 2018-01-02 | 2018-07-05 | Validareum Inc. | Cryptographic currency for financial data management, digital and digitalized cross-asset identification and unique digital asset identifier generation, asset valuation and financial risk management |
CN108280328A (en) * | 2018-01-31 | 2018-07-13 | 北京安妮全版权科技发展有限公司 | Method and device is really weighed based on digital signature and the copyright of time service |
CN108549825A (en) * | 2018-03-14 | 2018-09-18 | 中链科技有限公司 | A kind of file deposits card, verification and the means of proof and device |
CN108632259A (en) * | 2018-04-17 | 2018-10-09 | 济南浪潮高新科技投资发展有限公司 | A kind of mist calculate node device authentication system and method based on block chain |
CN108810007A (en) * | 2018-06-26 | 2018-11-13 | 东北大学秦皇岛分校 | A kind of Internet of Things security architecture |
CN108876374A (en) * | 2018-06-29 | 2018-11-23 | 全链通有限公司 | The network identity certificate authentication method and system of block chain |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111784103A (en) * | 2020-05-22 | 2020-10-16 | 上海飞鱼医疗科技有限公司 | Reagent quality full-process management system based on block chain technology |
CN111784103B (en) * | 2020-05-22 | 2024-05-07 | 上海飞鱼医疗科技有限公司 | Reagent quality whole-flow management system based on blockchain technology |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Pasdar et al. | Connect api with blockchain: A survey on blockchain oracle implementation | |
CN109690539A (en) | Self-cleaning token pool | |
CN109040073B (en) | Method, device, medium and equipment for detecting access of abnormal behaviors of world wide web | |
CN106789844B (en) | Malicious user identification method and device | |
Demir et al. | Security smells in smart contracts | |
CN110866822B (en) | Wind control management method and device for securitization of assets, electronic equipment and storage medium | |
CN108292346A (en) | The extracts physical access control policy from static rights and Access Events | |
CN107784094A (en) | Monetary fund system automation liquidation method, device, equipment and storage medium | |
KR102063131B1 (en) | CENTRALIZED MANAGEMENT METHOD FOR SaaS SOLUTION | |
US20230067556A1 (en) | Systems and methods for tokenization, management, trading, settlement, and retirement of renewable energy attributes | |
CN112907244A (en) | Data processing method, device and equipment based on block chain and readable storage medium | |
CN103440460A (en) | Application system change validation method and system | |
CN109615397A (en) | Security identifier authentication method and device based on block chain | |
CN112330355B (en) | Method, device, equipment and storage medium for processing consumption coupon transaction data | |
CN111881147B (en) | Processing method and device of computing task, storage medium and processor | |
CN116501610B (en) | Method, device, equipment and medium for testing market transaction system | |
CN111027977A (en) | Data verification method and device and electronic equipment | |
CN107154930B (en) | Method and system for testing vulnerability | |
CN107451828A (en) | Publish in instalments disconnected more processing method, electronic equipment and the computer-readable storage medium of books | |
CN113129003A (en) | Two-dimensional code payment control method and device | |
Xue et al. | Applying smart contracts in online dispute resolutions on a large scale and its regulatory implications | |
CN112465628A (en) | Data verification method and device, electronic equipment and storage medium | |
CN116452158B (en) | Method, device, equipment and medium for managing index of random extraction of suppliers | |
CN114880369A (en) | Risk credit granting method and system based on weak data technology | |
CN111882436A (en) | Data processing method, device and equipment based on block chain |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
TA01 | Transfer of patent application right | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20210122 Address after: 215163 No. 9 Xuesen Road, Science and Technology City, Suzhou High-tech Zone, Jiangsu Province Applicant after: Suzhou Lang run innovation intellectual property operation Co.,Ltd. Address before: 100034 4008, 4 floor, 9 building, 56 half moon street, Xicheng District, Beijing. Applicant before: SINOCHAIN TECHNOLOGY Co.,Ltd. |
|
WW01 | Invention patent application withdrawn after publication | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20190412 |