CN109615397A - Security identifier authentication method and device based on block chain - Google Patents

Security identifier authentication method and device based on block chain Download PDF

Info

Publication number
CN109615397A
CN109615397A CN201811492806.1A CN201811492806A CN109615397A CN 109615397 A CN109615397 A CN 109615397A CN 201811492806 A CN201811492806 A CN 201811492806A CN 109615397 A CN109615397 A CN 109615397A
Authority
CN
China
Prior art keywords
security identifier
security
chain
examination
result
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201811492806.1A
Other languages
Chinese (zh)
Inventor
田君
张艳菊
卢亦斌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Suzhou Lang run innovation intellectual property operation Co.,Ltd.
Original Assignee
Chain Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chain Technology Co Ltd filed Critical Chain Technology Co Ltd
Priority to CN201811492806.1A priority Critical patent/CN109615397A/en
Publication of CN109615397A publication Critical patent/CN109615397A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • G06Q30/0185Product, service or business identity fraud
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/08Insurance

Landscapes

  • Business, Economics & Management (AREA)
  • Finance (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Marketing (AREA)
  • Economics (AREA)
  • Development Economics (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Technology Law (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The invention discloses a kind of security identifier authentication methods and device based on block chain.Method includes: the security identifier authentication information for receiving security identifier application node and providing, and security identifier authentication information is entered chain and deposits card, so that security identifier manager carries out preliminary hearing to security identifier authentication information;It receives the preliminary hearing that security identifier management node provides and deposits card as a result, preliminary hearing result is entered chain, so that security identifier examines that detection root carries out examination as to substances to security identifier applicant according to preliminary hearing result;It receives the examination as to substances that security identifier examines that detection node provides and deposits card as a result, examination as to substances result is entered chain, so that security identifier manager determines whether to provide security identifier according to examination as to substances result;The security identifier release information that security identifier management node provides is received, security identifier release information is entered into chain and deposits card, realizes the real time monitoring of equipment, monitoring capacity is promoted, reduces security risk.

Description

Security identifier authentication method and device based on block chain
Technical field
The present invention relates to block chain technical fields, and in particular to a kind of security identifier authentication method and dress based on block chain It sets.
Background technique
After equipment investment use, due to plant issue, cause safety accident and cause casualties with it is great Property loss has stringent security performance requirement to equipment, especially for winning equipment.
China is from the nineties in last century, on the basis of using for reference international advanced management experience, in conjunction with the actual conditions in China, Start to carry out enforceable security identifier management system, clearly propose the access system of equipment, to improve production management level, setting Standby safe operation reduces accident, specification industry order, plays the role of highly important.But in normal course of operation, still deposit Dynamic management, real time monitoring and data are being difficult to realize only in internal communication, the problem that can not be shared.
Summary of the invention
In view of the above problems, it proposes on the present invention overcomes the above problem or at least be partially solved in order to provide one kind State the security identifier authentication method and device based on block chain of problem.
According to an aspect of the invention, there is provided a kind of security identifier authentication method based on block chain, method include:
The security identifier authentication information that security identifier application node provides is received, and security identifier authentication information is entered into chain and is deposited Card, so that security identifier manager carries out preliminary hearing to security identifier authentication information;
Receive the preliminary hearing that security identifier management node provides as a result, and preliminary hearing result entered into chain deposit card, for security identifier Examine that detection root carries out examination as to substances to security identifier applicant according to preliminary hearing result;
Receive the examination as to substances that security identifier examines that detection node provides as a result, and examination as to substances result entered into chain deposit card, So that security identifier manager determines whether to provide security identifier according to examination as to substances result;
The security identifier release information that security identifier management node provides is received, and security identifier release information is entered into chain and is deposited Card.
Optionally, after security identifier release information to be entered to chain and deposits card, method further include: receive security identifier application section The equipment operating data that point provides, and equipment operating data is stored into block chain.
Optionally, after storing equipment operating data into block chain, method further include: receive security identifier supervision Side is to the Safety Examination provided after equipment operating data progress Safety Examination by security identifier supervisory node as a result, and will be safe Examination result enters chain and deposits card.
Optionally, security identifier release information includes: security identifier effective time;
Method further include: if security identifier fails, run intelligent contract notice security identifier manager to security identifier Applicant carries out security identifier review;
Equipment operating data is broadcast to security identifier management node, so that safety management side carries out equipment operating data Review analysis, to determine equipment with the presence or absence of violation operation action.
Optionally, after storing equipment operating data into block chain, method further include: equipment operating data is wide It broadcasts to security identifier management node and/or security identifier supervisory node, so that security identifier manager and/or security identifier supervise Root carries out safety accident confirmation of responsibility according to equipment operating data, alternatively, so that security identifier manager runs number according to equipment According to revision security identifier Valuation Standard;And/or so that security identifier monitoring party revises security control mark according to equipment operating data It is quasi-.
Optionally, before receiving the security identifier authentication information that security identifier application node provides, method further include:
The real-name authentication solicited message that security identifier application node provides is received, real-name authentication solicited message is tested Card completes real-name authentication processing if being proved to be successful, and successfully responds to security identifier application node feedback real-name authentication.
Optionally, method further include: information is paid in the insurance for receiving the security identifier applicant that insurance service node provides, And insurance paid into information enters chain and deposit card.
According to another aspect of the present invention, a kind of security identifier authentication device based on block chain is provided, device includes:
First execution module, the security identifier authentication information provided suitable for receiving security identifier application node;Receive safety Identify the preliminary hearing result that management node provides;It receives security identifier and examines the examination as to substances result that detection node provides;And it connects Receive the security identifier release information that security identifier management node provides;
Second execution module deposits card suitable for security identifier authentication information is entered chain, so that security identifier manager is to safety ID authentication information carries out preliminary hearing;Preliminary hearing result is entered into chain and deposits card, so that security identifier examines detection root according to preliminary hearing result pair Security identifier applicant carries out examination as to substances;Examination as to substances result is entered into chain and deposits card, so that security identifier manager is according to essence Examination result determines whether to provide security identifier;And security identifier release information is entered into chain and deposits card.
According to another aspect of the invention, provide a kind of calculating equipment, comprising: processor, memory, communication interface and Communication bus, processor, memory and communication interface complete mutual communication by communication bus;
For memory for storing an at least executable instruction, it is above-mentioned based on block chain that executable instruction executes processor The corresponding operation of security identifier authentication method.
In accordance with a further aspect of the present invention, a kind of computer storage medium is provided, at least one is stored in storage medium Executable instruction, executable instruction make processor execute such as the above-mentioned corresponding behaviour of security identifier authentication method based on block chain Make.
In accordance with a further aspect of the present invention, a kind of security identifier Verification System based on block chain is provided, system includes: System includes: security identifier application node, security identifier management node, security identifier examination detection node, security identifier supervision Node, insurance service node and the security identifier authentication platform based on block chain;
Security identifier authentication platform based on block chain includes: processor, memory, communication interface and communication bus, place Reason device, memory and communication interface complete mutual communication by communication bus;
Memory executes processor as above-mentioned based on block chain for storing an at least executable instruction, executable instruction The corresponding operation of security identifier authentication method.
The scheme provided according to the present invention receives the security identifier authentication information that security identifier application node provides, and will Security identifier authentication information enters chain and deposits card, so that security identifier manager carries out preliminary hearing to security identifier authentication information;Receive peace Preliminary hearing that full mark management node provides as a result, and preliminary hearing result entered into chain deposit card, detect root evidence so that security identifier examines Preliminary hearing result carries out examination as to substances to security identifier applicant;It receives security identifier and examines the examination as to substances knot that detection node provides Fruit, and examination as to substances result is entered into chain and deposits card, so that security identifier manager determines whether to provide peace according to examination as to substances result Full mark;The security identifier release information that security identifier management node provides is received, and security identifier release information is entered into chain and is deposited Card.Based on scheme provided by the invention, the real time monitoring of equipment is realized, monitoring capacity is promoted, reduces security risk, overcome The data that each link generates are entered chain and deposit card by the problems such as data can not be monitored in real time, can not be shared in security identifier management process Mode can ensure the safeties of data, guarantee that the whole record data of security identifier certification can not be distorted and can be traced to the source.
The above description is only an overview of the technical scheme of the present invention, in order to better understand the technical means of the present invention, And it can be implemented in accordance with the contents of the specification, and in order to allow above and other objects of the present invention, feature and advantage can It is clearer and more comprehensible, the followings are specific embodiments of the present invention.
Detailed description of the invention
By reading the following detailed description of the preferred embodiment, various other advantages and benefits are common for this field Technical staff will become clear.The drawings are only for the purpose of illustrating a preferred embodiment, and is not considered as to the present invention Limitation.And throughout the drawings, the same reference numbers will be used to refer to the same parts.In the accompanying drawings:
Fig. 1 shows the process signal of the security identifier authentication method according to an embodiment of the invention based on block chain Figure;
Fig. 2 shows the processes of the security identifier authentication method in accordance with another embodiment of the present invention based on block chain to show It is intended to;
Fig. 3 shows the structural representation of the security identifier authentication device according to an embodiment of the invention based on block chain Figure;
Fig. 4 shows the structural schematic diagram according to an embodiment of the invention for calculating equipment.
Specific embodiment
Exemplary embodiments of the present disclosure are described in more detail below with reference to accompanying drawings.Although showing the disclosure in attached drawing Exemplary embodiment, it being understood, however, that may be realized in various forms the disclosure without should be by embodiments set forth here It is limited.On the contrary, these embodiments are provided to facilitate a more thoroughly understanding of the present invention, and can be by the scope of the present disclosure It is fully disclosed to those skilled in the art.
Methods and apparatus of the present invention is based on block chain technology, is also referred to as distributed account book technology, is a kind of interconnection Grid database technology, its main feature is that it is decentralization, open and clear, allow everyone to each may participate in data-base recording.
Fig. 1 shows the process signal of the security identifier authentication method according to an embodiment of the invention based on block chain Figure.Block chain involved in the present embodiment is specifically as follows alliance's chain, and alliance's chain is otherwise known as industry chain, and having allows to authorize Node network is added, and the characteristics of can check information according to permission.Specifically, by security identifier service stage and security identifier Definition is more in alliance's chain as alliance chain member, and according to the function of each participant for each participant involved by management phase A node.
Wherein, during security identifier service stage and security identifier management phase, related participant at least: Platform operation side, security identifier applicant, security identifier manager, security identifier examine detection side.It is responsible for dimension in platform operation side The normal operation of platform is protected, parameter relevant to security identifier and rule are set;Security identifier applicant is specially that equipment has peace Full ID authentication demand participant, such as the production unit etc. using equipment progress operation;Security identifier manager is specially pair Security identifier authentication information carries out the participant of preliminary hearing, for example, security identifier office etc.;Security identifier examines that detection side is specific For to security identifier applicant carry out examination as to substances participant, for example, security identifier syndic etc..As a result, in the present embodiment Alliance's chain, which includes at least, to be had: security identifier application node, security identifier management node and security identifier examine detection node.
In practical application, the safety based on block chain that the solution of the present invention building includes above-mentioned each node can use ID authentication platform, each participant handle industry on the security identifier authentication platform based on block chain by corresponding node Business, each node saves the data being collected into block chain, to guarantee the safety of data, promotes the credible of platform Degree.
As shown in Figure 1, method includes the following steps:
Step S100 receives the security identifier authentication information that security identifier application node provides, and security identifier is authenticated Information enters chain and deposits card, so that security identifier manager carries out preliminary hearing to security identifier authentication information.
Security identifier applicant is equipment user, in equipment before use, requiring to carry out security identifier certification to equipment, It only can just be come into operation by the equipment that security identifier authenticates, therefore, security identifier certification here can be understood as again Obtain the license that equipment investment uses.
Security identifier applicant can propose security identifier certification application, and submit needed for certification according to corresponding regulation Information, specifically, security identifier applicant can submit security identifier authentication information by security identifier application node, receive After the security identifier authentication information provided to security identifier application node, security identifier authentication information is entered into chain and deposits card, for Security identifier manager carries out preliminary hearing to security identifier authentication information.By saving security identifier authentication information into block chain It can guarantee that data can not distort, ensure that the authenticity of data.Wherein, security identifier authentication information includes: equipment and technology ginseng Several and equipment operating environment information etc..
In a kind of optional embodiment of the present invention, equipment technical parameters by equipment producer to be provided, and specifically, is received Equipment produces the equipment technical parameters that node provides, and equipment technical parameters are entered chain and deposit card.
Step S101, receive the preliminary hearing that security identifier management node provides as a result, and preliminary hearing result entered into chain deposit card, for Security identifier examines that detection root carries out examination as to substances to security identifier applicant according to preliminary hearing result.
Security identifier authentication information real-time broadcast can be shared to safety by the security identifier authentication platform based on block chain Management node is identified, after receiving security identifier certification application, security identifier manager can be to security identifier application node institute The security identifier authentication information of offer carries out preliminary hearing, mainly examines whether meet corresponding requirement, for example, technical requirements, stream Range request, if satisfactory, it is believed that passed through preliminary hearing;If it does not meet the requirements, it is believed that do not pass through preliminary hearing.
Security identifier manager to security identifier authentication information carry out it is pre- post-trial, security identifier management node can be passed through Preliminary hearing is submitted as a result, preliminary hearing result is entered chain and deposits card after receiving the preliminary hearing result that security identifier management node provides.
The examination that security identifier manager carries out security identifier authentication information is preliminary inquiry process, if by tentatively examining Cha Hou, it is also necessary to which examination as to substances is carried out to security identifier applicant.Security identifier examines that detection side is according to preliminary hearing result to peace Full mark applicant carries out examination as to substances.
Step S102 receives the examination as to substances that security identifier examines that detection node provides as a result, and by examination as to substances result Enter chain and deposit card, so that security identifier manager determines whether to provide security identifier according to examination as to substances result.
Security identifier authentication platform based on block chain can examine broadcasting share when preliminary hearing fructufy to security identifier Detection node, security identifier examine that detection side is appointed by security identifier manager, security identifier manager are assisted to examine Look into, such as carry out paper examination and in-process review, wherein in-process review refer to the qualification to security identifier applicant, technical force, The working conditions such as equipment and detection means or service condition etc. carry out in-process review.
Security identifier examines that detection side after carrying out examination as to substances to security identifier applicant, can be examined by security identifier Look into detection node submit examination as to substances as a result, receive security identifier examine detection node provide examination as to substances result after, Examination as to substances result is entered into chain and deposits card.Security identifier manager can determine whether to provide safety post according to examination as to substances result Know.
Step S103 receives the security identifier release information that security identifier management node provides, and security identifier is provided Information enters chain and deposits card.
Security identifier examines that detection side after carrying out examination as to substances to security identifier applicant, can enter examination as to substances result Chain deposits card, and the security identifier authentication platform based on block chain can give broadcasting share when examination as to substances fructufy to security identifier pipe Node is managed, if security identifier manager thinks that security identifier applicant has passed through security identifier certification according to examination as to substances result, Security identifier can be provided to security identifier applicant, then can submit security identifier granting letter by security identifier management node Breath, after receiving security identifier release information, enters chain for security identifier release information and deposits card.
The method provided according to that above embodiment of the present invention receives the security identifier certification that security identifier application node provides Information, and security identifier authentication information is entered into chain and deposits card, so that security identifier manager carries out in advance security identifier authentication information It examines;Receive the preliminary hearing that security identifier management node provides as a result, and preliminary hearing result entered into chain deposit card, so that security identifier examines inspection It surveys root and examination as to substances is carried out to security identifier applicant according to preliminary hearing result;It receives security identifier and examines the reality that detection node provides Matter examination result, and examination as to substances result is entered into chain and deposits card, so that security identifier manager is according to the determination of examination as to substances result No granting security identifier;The security identifier release information that security identifier management node provides is received, and security identifier granting is believed It ceases and deposits card into chain.Based on scheme provided by the invention, the real time monitoring of equipment is realized, it is hidden to promote monitoring capacity, reduction safety Suffer from, overcomes the problems such as data in security identifier management process can not be monitored in real time, can not be shared, the data that each link is generated The safeties of data can be ensured by entering chain and depositing the mode of card, guarantee the whole record data of security identifier certification can not distort and It can trace to the source.
Fig. 2 shows the processes of the security identifier authentication method in accordance with another embodiment of the present invention based on block chain to show It is intended to.As shown in Fig. 2, method includes the following steps:
Step S200 receives the security identifier authentication information that security identifier application node provides, and security identifier is authenticated Information enters chain and deposits card, so that security identifier manager carries out preliminary hearing to security identifier authentication information.
Wherein, security identifier applicant is equipment user, for example, the fortune of the production unit of mining production, lift facility Unit etc. is sought, mineral products unit needs to carry out security identifier certification to the equipment of production operation, in equipment before carrying out mining production After authenticating by security identifier, allow equipment investment mining production process;Lift facility before being put into use, needs to carry out safety ID authentication guarantees that lift facility meets Operational requirements, ensures personal safety.
Security identifier authentication information is that security identifier applicant submit required for security identifier certification for equipment Authentication information, for example, equipment technical parameters, equipment operating environment information, application form etc..
Security identifier applicant can propose security identifier certification application, and submit needed for certification according to corresponding regulation Information, specifically, security identifier applicant can submit security identifier authentication information by security identifier application node, receive After the security identifier authentication information provided to security identifier application node, security identifier authentication information is entered into chain and deposits card.Pass through Security identifier authentication information, which is saved, can guarantee that data can not be distorted into block chain, ensure that the authenticity of data.
In the present embodiment, security identifier management node is that a node in block chain network therefore can be by wide Security identifier authentication information is sent to security identifier management node by the mode broadcast, and security identifier manager is receiving safety post After knowing authentication information, preliminary hearing can be carried out to security identifier authentication information.
Step S201, receive the preliminary hearing that security identifier management node provides as a result, and preliminary hearing result entered into chain deposit card, for Security identifier examines that detection root carries out examination as to substances to security identifier applicant according to preliminary hearing result.
Security identifier authentication information real-time broadcast can be shared to safety by the security identifier authentication platform based on block chain Management node is identified, after receiving security identifier certification application, security identifier manager can be to security identifier application node institute The security identifier authentication information of offer carries out preliminary hearing, mainly examines whether meet corresponding requirement, for example, technical requirements, stream Range request, if satisfactory, it is believed that passed through preliminary hearing;If it does not meet the requirements, it is believed that do not pass through preliminary hearing.
Security identifier manager to security identifier authentication information carry out it is pre- post-trial, security identifier management node can be passed through Preliminary hearing is submitted as a result, preliminary hearing result is entered chain and deposits card after receiving the preliminary hearing result that security identifier management node provides, wherein Preliminary hearing result does not pass through preliminary hearing specifically by preliminary hearing or.
It, can be with the quantity of the untreated security identifier certification application of real-time statistics in a kind of optional embodiment of the present invention And the quantity counted is showed into security identifier manager, so that security identifier manager be reminded to accelerate to examine.
The examination that security identifier manager carries out security identifier authentication information is preliminary inquiry process, if by tentatively examining Cha Hou, it is also necessary to which examination as to substances is carried out to security identifier applicant.Security identifier examines that detection side is according to preliminary hearing result to peace Full mark applicant carries out examination as to substances.
In the present embodiment, security identifier examines that detection node is a node in block chain network, therefore, Ke Yitong Cross broadcast mode by preliminary hearing result be sent to security identifier examine detection node, security identifier examine detection side receive it is pre- It concludes after fruit, examination as to substances can be carried out to security identifier applicant.
Step S202 receives the examination as to substances that security identifier examines that detection node provides as a result, and by examination as to substances result Enter chain and deposit card, so that security identifier manager determines whether to provide security identifier according to examination as to substances result.
Security identifier examines that detection side is appointed by security identifier manager, and security identifier manager is assisted to examine Look into, such as carry out paper examination and in-process review, wherein in-process review refer to the qualification to security identifier applicant, technical force, The working conditions such as equipment and detection means or service condition etc. carry out in-process review.
Security identifier examines that detection side after carrying out examination as to substances to security identifier applicant, can be examined by security identifier Look into detection node submit examination as to substances as a result, receive security identifier examine detection node provide examination as to substances result after, Examination as to substances result is entered into chain and deposits card.Wherein, examination as to substances result does not pass through specifically by examination or examination.
In the present embodiment, security identifier management node is that a node in block chain network therefore can be by wide Examination as to substances result is sent to security identifier management node by the mode broadcast, and security identifier manager is receiving examination as to substances knot After fruit, it can be determined whether to provide security identifier according to examination as to substances result.
Step S203 receives the security identifier release information that security identifier management node provides, and security identifier is provided Information enters chain and deposits card.
If security identifier manager thinks that security identifier applicant has passed through security identifier certification according to examination as to substances result, Security identifier can be provided to security identifier applicant, then can submit security identifier granting letter by security identifier management node Breath, after receiving security identifier release information, enters chain for security identifier release information and deposits card.Wherein, security identifier granting is believed Breath includes: security identifier Time Of Release, security identifier out-of-service time etc..
In the present embodiment, by storing the data in security identifier verification process into block chain, number can be ensured According to safety, guarantee that the whole record data of security identifier certification can not be distorted and can be traced to the source, avoid safety post recognition The phenomenon of playing tricks of card.
Security identifier obtained can be posted in equipment by security identifier applicant after obtaining security identifier, peace Full mark applicant can use equipment investment.
Step S204 receives the equipment operating data that security identifier application node provides, and equipment operating data is stored Into block chain.
Security identifier applicant needs the data of recording equipment day-to-day operation in using device procedures, for the ease of subsequent Determining whether equipment runs in violation of rules and regulations, security identifier applicant can submit equipment operating data by security identifier application node, After the equipment operating data that the offer of security identifier application node is provided, equipment operating data is stored into block chain, is led to It crosses and stores equipment operating data into block chain, convenient for monitoring in real time to equipment, improve the safety of operation.Its In, equipment operating data includes: the information such as equipment operating environment, operating current, different equipment, corresponding equipment operating data Difference will not enumerate here.
Step S205 receives security identifier monitoring party and is supervised to after equipment operating data progress Safety Examination by security identifier The Safety Examination that pipe node provides is as a result, and entering chain for Safety Examination result and depositing card.
Security identifier monitoring party is the department supervised to security identifier applicant, is responsible for supervision security identifier applicant Whether equipment is used in safe range, specifically, security identifier monitoring party can be regular or irregular to equipment operation Data carry out Safety Examination, no the case where Misuse equipment, security identifier supervision occur to determine in equipment running process Side to equipment operating data carry out Safety Examination after, can by security identifier supervisory node provide Safety Examination as a result, After receiving Safety Examination result, Safety Examination result is entered into chain and deposits card.
Step S206 runs intelligent contract notice security identifier manager to security identifier Shen if security identifier fails Please just carry out security identifier review.
The security identifier provided every time all has validity period, after validity period, needs to carry out safety to equipment again ID authentication, that is, security identifier review specifically can preset intelligent contract, it is specified that intelligent contract service condition is peace When full mark effective time reaches, runs intelligent contract notice security identifier manager and safety post is carried out to security identifier applicant Know review, review here can be divided into two aspects: on the one hand be to carry out review according to existing proceeding in error;On the other hand it is Equipment operating data is analyzed, to determine that, in the security identifier valid period, equipment whether there is violation operation action.
Equipment operating data is broadcast to security identifier management node by step S207, so that safety management side transports equipment Row data carry out review analysis, to determine equipment with the presence or absence of violation operation action.
Equipment operating data can be shared to safety by broadcast mode by the security identifier authentication platform based on block chain Management node is identified, security identifier manager carries out data analysis after getting equipment operating data, to equipment operating data, To determine equipment with the presence or absence of violation operation action.Security identifier manager can submit data by security identifier management node Data can be analyzed and be tied as a result, based on the security identifier authentication platform of block chain after receiving data analysis result by analysis Fruit enters chain and deposits card.
In the present embodiment, it to the execution of step S205 and step S206- step S207 sequence and is not specifically limited.
Equipment operating data is broadcast to security identifier management node and/or security identifier supervisory node by step S208, with Security identifier Valuation Standard is revised according to equipment operating data for security identifier manager;And/or for security identifier monitoring party Security control standard is revised according to equipment operating data.
Security identifier manager is responsible to define security identifier Valuation Standard, and security identifier monitoring party is responsible to define security control Standard, with the development of technology, corresponding security identifier Valuation Standard, security control standard should also change therewith, therefore, Equipment operating data can be broadcast to security identifier management node and/or safety by the security identifier authentication platform based on block chain Supervisory node is identified, security identifier manager revises safety post after getting equipment operating data, according to equipment operating data Know Valuation Standard;And/or security identifier monitoring party is revised according to equipment operating data and is pacified after getting equipment operating data Full supervision standard.
Information is paid in step S209, the insurance for receiving the security identifier applicant that insurance service node provides, and will insurance It pays information and enters chain and deposit card.
For production operations personnel such as mining, since operating environment has certain risk, security identifier applicant is logical Chang Huiwei is bought as personnel to be insured, and insurance service side is to provide the insurance company of insurance service, insurance service side and safety post After knowing applicant's signing insurance contract, insurance service side can pass through insurance service node and provide the insurance of security identifier applicant Information is paid, after receiving insurance and paying information, information is paid into insurance enters chain and deposit card.Wherein, insurance pays information and includes: Time, premium received, guarantee time, compensation content etc. are paid in insurance.
In a kind of optional embodiment of the present invention, due to storing equipment operating data into block chain, sending out When raw safety accident, data can be carried out and traced to the source, specifically, by equipment operating data be broadcast to security identifier management node and/ Or security identifier supervisory node, so that security identifier manager and/or security identifier monitoring party carry out according to equipment operating data Safety accident confirmation of responsibility.
In a kind of optional embodiment of the present invention, security identifier applicant is authenticating it to equipment progress safety sign Before, it needs first to carry out real-name authentication, specifically, the real-name authentication solicited message that security identifier application node provides is received, to reality Name certification request information is verified, if being proved to be successful, is completed real-name authentication processing, is fed back to security identifier application node real Name certification successfully response.
In a kind of optional embodiment of the present invention, security identifier Valuation Standard can be by upper management department liable system It is fixed, specifically, network is added in the corresponding node of upper management department, gives equipment operating data real-time broadcast to upper management portion The corresponding node of door, upper management department revise security identifier Valuation Standard according to equipment operating data.
The method provided according to that above embodiment of the present invention realizes the real time monitoring of equipment, promotes monitoring capacity, reduces Security risk, overcomes the problems such as data in security identifier management process can not be monitored in real time, can not be shared, each link is produced Raw data, which enter chain, which deposits the mode of card, can ensure the safeties of data, guarantee that the whole record data of security identifier certification can not It distorts and can trace to the source.
Fig. 3 shows the structural representation of the security identifier authentication device according to an embodiment of the invention based on block chain Figure.As shown in figure 3, the device includes: the first execution module 300, the second execution module 310.
First execution module 300, the security identifier authentication information provided suitable for receiving security identifier application node;Receive peace The preliminary hearing result that full mark management node provides;It receives security identifier and examines the examination as to substances result that detection node provides;And Receive the security identifier release information that security identifier management node provides;
Second execution module 310 deposits card suitable for security identifier authentication information is entered chain, so that security identifier manager is to peace Full ID authentication information carries out preliminary hearing;Preliminary hearing result is entered into chain and deposits card, so that security identifier examines detection root according to preliminary hearing result Examination as to substances is carried out to security identifier applicant;Examination as to substances result is entered into chain and deposits card, so that security identifier manager is according to reality Matter examination result determines whether to provide security identifier;And security identifier release information is entered into chain and deposits card.
Optionally, the first execution module is further adapted for: receiving the equipment operating data that security identifier application node provides;
Second execution module is further adapted for: equipment operating data is stored into block chain.
Optionally, the first execution module is further adapted for: receiving security identifier monitoring party and carries out safe examine to equipment operating data The Safety Examination result provided after looking by security identifier supervisory node;
Second execution module is further adapted for: Safety Examination result being entered chain and deposits card.
Optionally, security identifier release information includes: security identifier effective time;
Device further include: notification module fails if being suitable for security identifier, runs intelligent contract notice security identifier management Side carries out security identifier review to security identifier applicant;
Third execution module, suitable for equipment operating data is broadcast to security identifier management node, for safety management side Review analysis is carried out to equipment operating data, to determine equipment with the presence or absence of violation operation action.
Optionally, device further include: the 4th execution module, suitable for equipment operating data is broadcast to security identifier management section Point and/or security identifier supervisory node, so that security identifier manager and/or security identifier monitoring party are according to equipment operating data Safety accident confirmation of responsibility is carried out, alternatively, so that security identifier manager revises security identifier certification according to equipment operating data Standard;And/or so that security identifier monitoring party revises security control standard according to equipment operating data.
Optionally, the first execution module is further adapted for: receiving the real-name authentication solicited message that security identifier application node provides;
Device further include: authentication module, suitable for being verified to real-name authentication solicited message;
6th execution module, if completing real-name authentication processing suitable for being proved to be successful, being fed back to security identifier application node Real-name authentication successfully responds.
Optionally, the first execution module is further adapted for: receiving the insurance for the security identifier applicant that insurance service node provides Pay information;
Second execution module is further adapted for: information is paid in insurance enters chain and deposit card.
The device provided according to that above embodiment of the present invention receives the security identifier certification that security identifier application node provides Information, and security identifier authentication information is entered into chain and deposits card, so that security identifier manager carries out in advance security identifier authentication information It examines;Receive the preliminary hearing that security identifier management node provides as a result, and preliminary hearing result entered into chain deposit card, so that security identifier examines inspection It surveys root and examination as to substances is carried out to security identifier applicant according to preliminary hearing result;It receives security identifier and examines the reality that detection node provides Matter examination result, and examination as to substances result is entered into chain and deposits card, so that security identifier manager is according to the determination of examination as to substances result No granting security identifier;The security identifier release information that security identifier management node provides is received, and security identifier granting is believed It ceases and deposits card into chain.Based on scheme provided by the invention, the real time monitoring of equipment is realized, it is hidden to promote monitoring capacity, reduction safety Suffer from, overcomes the problems such as data in security identifier management process can not be monitored in real time, can not be shared, the data that each link is generated The safeties of data can be ensured by entering chain and depositing the mode of card, guarantee the whole record data of security identifier certification can not distort and It can trace to the source.
The embodiment of the present application also provides a kind of nonvolatile computer storage media, computer storage medium be stored with to The safety based on block chain in above-mentioned any means embodiment can be performed in a few executable instruction, the computer executable instructions Identification authentication method.
Fig. 4 shows the structural schematic diagram according to an embodiment of the invention for calculating equipment, the specific embodiment of the invention The specific implementation for calculating equipment is not limited.
As shown in figure 4, the calculating equipment may include: processor (processor) 402, communication interface (Communications Interface) 404, memory (memory) 406 and communication bus 508.
Wherein:
Processor 402, communication interface 404 and memory 406 complete mutual communication by communication bus 408.
Communication interface 404, for being communicated with the network element of other equipment such as client or other servers etc..
Processor 402 can specifically execute the above-mentioned security identifier authenticating party based on block chain for executing program 410 Correlation step in method embodiment.
Specifically, program 410 may include program code, which includes computer operation instruction.
Processor 402 may be central processor CPU or specific integrated circuit ASIC (Application Specific Integrated Circuit), or be arranged to implement the integrated electricity of one or more of the embodiment of the present invention Road.The one or more processors that equipment includes are calculated, can be same type of processor, such as one or more CPU;It can also To be different types of processor, such as one or more CPU and one or more ASIC.
Memory 406, for storing program 410.Memory 406 may include high speed RAM memory, it is also possible to further include Nonvolatile memory (non-volatile memory), for example, at least a magnetic disk storage.
Program 410 specifically can be used for so that processor 402 execute in above-mentioned any means embodiment based on block chain Security identifier authentication method.The specific implementation of each step may refer to the above-mentioned security identifier based on block chain in program 410 Corresponding description in corresponding steps and the unit in embodiment is authenticated, this will not be repeated here.Those skilled in the art can be clear Recognize to Chu, for convenience and simplicity of description, the equipment of foregoing description and the specific work process of module, can refer to aforementioned Corresponding process description in embodiment of the method, details are not described herein.
The embodiment of the present application also provides a kind of security identifier Verification Systems based on block chain, which includes: safety It identifies application node, security identifier management node, security identifier and examines detection node, security identifier supervisory node, insurance service Node and security identifier authentication platform based on block chain;
Wherein, the security identifier authentication platform based on block chain includes: that processor, memory, communication interface and communication are total Line, processor, memory and communication interface complete mutual communication by communication bus;
Memory makes processor execute above-mentioned any means implementation for storing an at least executable instruction, executable instruction The security identifier authentication method based on block chain in example.
Algorithm and display are not inherently related to any particular computer, virtual system, or other device provided herein. Various general-purpose systems can also be used together with teachings based herein.As described above, it constructs required by this kind of system Structure be obvious.In addition, the present invention is also not directed to any particular programming language.It should be understood that can use various Programming language realizes summary of the invention described herein, and the description done above to language-specific is to disclose this hair Bright preferred forms.
In the instructions provided here, numerous specific details are set forth.It is to be appreciated, however, that implementation of the invention Example can be practiced without these specific details.In some instances, well known method, structure is not been shown in detail And technology, so as not to obscure the understanding of this specification.
Similarly, it should be understood that in order to simplify the disclosure and help to understand one or more of the various inventive aspects, Above in the description of exemplary embodiment of the present invention, each feature of the invention is grouped together into single implementation sometimes In example, figure or descriptions thereof.However, the disclosed method should not be interpreted as reflecting the following intention: i.e. required to protect Shield the present invention claims features more more than feature expressly recited in each claim.More precisely, as following Claims reflect as, inventive aspect is all features less than single embodiment disclosed above.Therefore, Thus the claims for following specific embodiment are expressly incorporated in the specific embodiment, wherein each claim itself All as a separate embodiment of the present invention.
Those skilled in the art will understand that can be carried out adaptively to the module in the equipment in embodiment Change and they are arranged in one or more devices different from this embodiment.It can be the module or list in embodiment Member or component are combined into a module or unit or component, and furthermore they can be divided into multiple submodule or subelement or Sub-component.Other than such feature and/or at least some of process or unit exclude each other, it can use any Combination is to all features disclosed in this specification (including adjoint claim, abstract and attached drawing) and so disclosed All process or units of what method or apparatus are combined.Unless expressly stated otherwise, this specification is (including adjoint power Benefit require, abstract and attached drawing) disclosed in each feature can carry out generation with an alternative feature that provides the same, equivalent, or similar purpose It replaces.
In addition, it will be appreciated by those of skill in the art that although some embodiments described herein include other embodiments In included certain features rather than other feature, but the combination of the feature of different embodiments mean it is of the invention Within the scope of and form different embodiments.For example, in the following claims, embodiment claimed is appointed Meaning one of can in any combination mode come using.
Various component embodiments of the invention can be implemented in hardware, or to run on one or more processors Software module realize, or be implemented in a combination thereof.It will be understood by those of skill in the art that can be used in practice Microprocessor or digital signal processor (DSP) realize the safety post recognition according to an embodiment of the present invention based on block chain Demonstrate,prove some or all functions of some or all components in equipment.The present invention is also implemented as executing institute here Some or all device or device programs of the method for description are (for example, computer program and computer program produce Product).It is such to realize that program of the invention can store on a computer-readable medium, or can have one or more The form of signal.Such signal can be downloaded from an internet website to obtain, and perhaps be provided on the carrier signal or to appoint What other forms provides.
It should be noted that the above-mentioned embodiments illustrate rather than limit the invention, and ability Field technique personnel can be designed alternative embodiment without departing from the scope of the appended claims.In the claims, Any reference symbol between parentheses should not be configured to limitations on claims.Word "comprising" does not exclude the presence of not Element or step listed in the claims.Word "a" or "an" located in front of the element does not exclude the presence of multiple such Element.The present invention can be by means of including the hardware of several different elements and being come by means of properly programmed computer real It is existing.In the unit claims listing several devices, several in these devices can be through the same hardware branch To embody.The use of word first, second, and third does not indicate any sequence.These words can be explained and be run after fame Claim.

Claims (11)

1. a kind of security identifier authentication method based on block chain, which is characterized in that the described method includes:
The security identifier authentication information that security identifier application node provides is received, and the security identifier authentication information is entered into chain and is deposited Card, so that security identifier manager carries out preliminary hearing to security identifier authentication information;
Receive the preliminary hearing that security identifier management node provides as a result, and the preliminary hearing result entered into chain deposit card, for security identifier Examine that detection root carries out examination as to substances to security identifier applicant according to preliminary hearing result;
Receive the examination as to substances that security identifier examines that detection node provides as a result, and the examination as to substances result entered into chain deposit card, So that the security identifier manager determines whether to provide security identifier according to examination as to substances result;
The security identifier release information that the security identifier management node provides is received, and the security identifier release information is entered Chain deposits card.
2. the method according to claim 1, wherein depositing card the security identifier release information is entered chain Afterwards, the method also includes: receive the equipment operating data that security identifier application node provides, and by the equipment operating data It stores into block chain.
3. according to the method described in claim 2, it is characterized in that, the equipment operating data is stored into block chain it Afterwards, the method also includes: receive security identifier monitoring party to equipment operating data carry out Safety Examination after pass through security identifier The Safety Examination that supervisory node provides is as a result, and entering chain for the Safety Examination result and depositing card.
4. according to the method in claim 2 or 3, which is characterized in that the security identifier release information includes: security identifier Effective time;
The method also includes: if security identifier fails, intelligent contract notice security identifier manager is run to security identifier Applicant carries out security identifier review;
Equipment operating data is broadcast to security identifier management node, so that safety management side carries out review to equipment operating data Analysis, to determine equipment with the presence or absence of violation operation action.
5. according to the method in claim 2 or 3, which is characterized in that store by the equipment operating data to block chain In after, the method also includes: by equipment operating data be broadcast to security identifier management node and/or security identifier supervision section Point, so that security identifier manager and/or security identifier monitoring party carry out safety accident confirmation of responsibility according to equipment operating data, Alternatively, so that security identifier manager revises security identifier Valuation Standard according to equipment operating data;And/or for security identifier Monitoring party revises security control standard according to equipment operating data.
6. method according to any one of claim 1-3, which is characterized in that provided receiving security identifier application node Security identifier authentication information before, the method also includes:
The real-name authentication solicited message that security identifier application node provides is received, the real-name authentication solicited message is tested Card completes real-name authentication processing if being proved to be successful, and Xiang Suoshu security identifier application node feedback real-name authentication is successfully rung It answers.
7. method according to any one of claim 1-3, which is characterized in that the method also includes: receive insurance clothes Information is paid in the insurance for the security identifier applicant that business node provides, and the insurance paid information enters chain and deposit card.
8. a kind of security identifier authentication device based on block chain, which is characterized in that described device includes:
First execution module, the security identifier authentication information provided suitable for receiving security identifier application node;Receive security identifier The preliminary hearing result that management node provides;It receives security identifier and examines the examination as to substances result that detection node provides;And receive institute The security identifier release information of security identifier management node offer is provided;
Second execution module deposits card suitable for the security identifier authentication information is entered chain, so that security identifier manager is to safety ID authentication information carries out preliminary hearing;The preliminary hearing result is entered into chain and deposits card, so that security identifier examines that detection root evidence concludes in advance Fruit carries out examination as to substances to security identifier applicant;The examination as to substances result is entered into chain and deposits card, for the security identifier pipe Factually matter examination result determines whether to provide security identifier reason root;And the security identifier release information is entered into chain and deposits card.
9. a kind of calculating equipment characterized by comprising processor, memory, communication interface and communication bus, the processing Device, the memory and the communication interface complete mutual communication by the communication bus;
The memory executes the processor as right is wanted for storing an at least executable instruction, the executable instruction Ask the corresponding operation of security identifier authentication method described in any one of 1-7 based on block chain.
10. a kind of computer storage medium, which is characterized in that be stored with an at least executable instruction, institute in the storage medium Stating executable instruction makes processor execute such as the security identifier authenticating party of any of claims 1-7 based on block chain The corresponding operation of method.
11. a kind of security identifier Verification System based on block chain, which is characterized in that the system comprises: security identifier application Node, security identifier management node, security identifier examine detection node, security identifier supervisory node, insurance service node and Security identifier authentication platform based on block chain;
The security identifier authentication platform based on block chain includes: processor, memory, communication interface and communication bus, institute It states processor, the memory and the communication interface and completes mutual communication by the communication bus;
The memory executes the processor as right is wanted for storing an at least executable instruction, the executable instruction Ask the corresponding operation of security identifier authentication method described in any one of 1-7 based on block chain.
CN201811492806.1A 2018-12-07 2018-12-07 Security identifier authentication method and device based on block chain Withdrawn CN109615397A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811492806.1A CN109615397A (en) 2018-12-07 2018-12-07 Security identifier authentication method and device based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811492806.1A CN109615397A (en) 2018-12-07 2018-12-07 Security identifier authentication method and device based on block chain

Publications (1)

Publication Number Publication Date
CN109615397A true CN109615397A (en) 2019-04-12

Family

ID=66008358

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811492806.1A Withdrawn CN109615397A (en) 2018-12-07 2018-12-07 Security identifier authentication method and device based on block chain

Country Status (1)

Country Link
CN (1) CN109615397A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111784103A (en) * 2020-05-22 2020-10-16 上海飞鱼医疗科技有限公司 Reagent quality full-process management system based on block chain technology

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108206760A (en) * 2016-12-16 2018-06-26 南京联成科技发展股份有限公司 A kind of safe O&M framework of industrial control system
US20180189887A1 (en) * 2018-01-02 2018-07-05 Validareum Inc. Cryptographic currency for financial data management, digital and digitalized cross-asset identification and unique digital asset identifier generation, asset valuation and financial risk management
CN108280328A (en) * 2018-01-31 2018-07-13 北京安妮全版权科技发展有限公司 Method and device is really weighed based on digital signature and the copyright of time service
CN108540335A (en) * 2017-12-20 2018-09-14 深圳市轱辘车联数据技术有限公司 The management method and managing device of device analysis report
CN108549825A (en) * 2018-03-14 2018-09-18 中链科技有限公司 A kind of file deposits card, verification and the means of proof and device
CN108632259A (en) * 2018-04-17 2018-10-09 济南浪潮高新科技投资发展有限公司 A kind of mist calculate node device authentication system and method based on block chain
CN108810007A (en) * 2018-06-26 2018-11-13 东北大学秦皇岛分校 A kind of Internet of Things security architecture
CN108876374A (en) * 2018-06-29 2018-11-23 全链通有限公司 The network identity certificate authentication method and system of block chain

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108206760A (en) * 2016-12-16 2018-06-26 南京联成科技发展股份有限公司 A kind of safe O&M framework of industrial control system
CN108540335A (en) * 2017-12-20 2018-09-14 深圳市轱辘车联数据技术有限公司 The management method and managing device of device analysis report
US20180189887A1 (en) * 2018-01-02 2018-07-05 Validareum Inc. Cryptographic currency for financial data management, digital and digitalized cross-asset identification and unique digital asset identifier generation, asset valuation and financial risk management
CN108280328A (en) * 2018-01-31 2018-07-13 北京安妮全版权科技发展有限公司 Method and device is really weighed based on digital signature and the copyright of time service
CN108549825A (en) * 2018-03-14 2018-09-18 中链科技有限公司 A kind of file deposits card, verification and the means of proof and device
CN108632259A (en) * 2018-04-17 2018-10-09 济南浪潮高新科技投资发展有限公司 A kind of mist calculate node device authentication system and method based on block chain
CN108810007A (en) * 2018-06-26 2018-11-13 东北大学秦皇岛分校 A kind of Internet of Things security architecture
CN108876374A (en) * 2018-06-29 2018-11-23 全链通有限公司 The network identity certificate authentication method and system of block chain

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111784103A (en) * 2020-05-22 2020-10-16 上海飞鱼医疗科技有限公司 Reagent quality full-process management system based on block chain technology
CN111784103B (en) * 2020-05-22 2024-05-07 上海飞鱼医疗科技有限公司 Reagent quality whole-flow management system based on blockchain technology

Similar Documents

Publication Publication Date Title
Pasdar et al. Connect api with blockchain: A survey on blockchain oracle implementation
CN109690539A (en) Self-cleaning token pool
CN109040073B (en) Method, device, medium and equipment for detecting access of abnormal behaviors of world wide web
CN106789844B (en) Malicious user identification method and device
Demir et al. Security smells in smart contracts
CN110866822B (en) Wind control management method and device for securitization of assets, electronic equipment and storage medium
CN108292346A (en) The extracts physical access control policy from static rights and Access Events
CN107784094A (en) Monetary fund system automation liquidation method, device, equipment and storage medium
KR102063131B1 (en) CENTRALIZED MANAGEMENT METHOD FOR SaaS SOLUTION
US20230067556A1 (en) Systems and methods for tokenization, management, trading, settlement, and retirement of renewable energy attributes
CN112907244A (en) Data processing method, device and equipment based on block chain and readable storage medium
CN103440460A (en) Application system change validation method and system
CN109615397A (en) Security identifier authentication method and device based on block chain
CN112330355B (en) Method, device, equipment and storage medium for processing consumption coupon transaction data
CN111881147B (en) Processing method and device of computing task, storage medium and processor
CN116501610B (en) Method, device, equipment and medium for testing market transaction system
CN111027977A (en) Data verification method and device and electronic equipment
CN107154930B (en) Method and system for testing vulnerability
CN107451828A (en) Publish in instalments disconnected more processing method, electronic equipment and the computer-readable storage medium of books
CN113129003A (en) Two-dimensional code payment control method and device
Xue et al. Applying smart contracts in online dispute resolutions on a large scale and its regulatory implications
CN112465628A (en) Data verification method and device, electronic equipment and storage medium
CN116452158B (en) Method, device, equipment and medium for managing index of random extraction of suppliers
CN114880369A (en) Risk credit granting method and system based on weak data technology
CN111882436A (en) Data processing method, device and equipment based on block chain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20210122

Address after: 215163 No. 9 Xuesen Road, Science and Technology City, Suzhou High-tech Zone, Jiangsu Province

Applicant after: Suzhou Lang run innovation intellectual property operation Co.,Ltd.

Address before: 100034 4008, 4 floor, 9 building, 56 half moon street, Xicheng District, Beijing.

Applicant before: SINOCHAIN TECHNOLOGY Co.,Ltd.

WW01 Invention patent application withdrawn after publication
WW01 Invention patent application withdrawn after publication

Application publication date: 20190412