CN111460507A - Block chain-based security service system and application thereof in autonomous community - Google Patents

Block chain-based security service system and application thereof in autonomous community Download PDF

Info

Publication number
CN111460507A
CN111460507A CN202010281987.4A CN202010281987A CN111460507A CN 111460507 A CN111460507 A CN 111460507A CN 202010281987 A CN202010281987 A CN 202010281987A CN 111460507 A CN111460507 A CN 111460507A
Authority
CN
China
Prior art keywords
block chain
security service
service
safety service
safety
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010281987.4A
Other languages
Chinese (zh)
Inventor
张鑫
毛乃峥
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Anyunyin Tianjin Big Data Technology Co ltd
Original Assignee
Anyunyin Tianjin Big Data Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Anyunyin Tianjin Big Data Technology Co ltd filed Critical Anyunyin Tianjin Big Data Technology Co ltd
Priority to CN202010281987.4A priority Critical patent/CN111460507A/en
Publication of CN111460507A publication Critical patent/CN111460507A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6227Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/18Legal services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Bioethics (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Economics (AREA)
  • Strategic Management (AREA)
  • Databases & Information Systems (AREA)
  • Finance (AREA)
  • Tourism & Hospitality (AREA)
  • General Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Technology Law (AREA)
  • Marketing (AREA)
  • Primary Health Care (AREA)
  • Human Resources & Organizations (AREA)
  • Development Economics (AREA)
  • Medical Informatics (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The application discloses a safety service system based on a block chain technology, which comprises a public safety service platform and an intelligent contract device, wherein the public safety service platform is used for providing a safety service supplier to a safety service demander and at least comprises a user system, a training system, an examination system and a task issuing system, the intelligent contract device is used for providing an intelligent contract between the safety service supplier and the safety service demander, the intelligent contract is used for restricting the right and the obligation between the safety service supplier and the safety service demander, and the intelligent contract device is a device which is deployed on the Internet and supports the intelligent contract of the block chain. Through the established security service platform, a plurality of social service organizations or personal service organizations or individuals with a plurality of personal security requirements under the mode can freely select satisfactory service organizations or individuals according to the requirements of the customers, and a large number of personal security service requirements on the market can be met.

Description

Block chain-based security service system and application thereof in autonomous community
Technical Field
The invention belongs to the field of application of a block chain technology, and relates to a safety service system based on a block chain and application thereof in an autonomous community.
Background
The security service is different from the common online shopping transaction, and in order to obtain the personalized security service, in addition to paying the economic cost and providing the personal basic information, the demander has to expose some privacy secret related to the security guarantee to the intermediary and the server, and the information is guaranteed not to be leaked to become an important concern whether the security service supply and demand parties can achieve the transaction. On the other hand, the social security service providers and individuals are one of the objects of great interest to the demanders as to whether the professional qualification of the security service providers or individuals is counterfeit, while on the other hand, there are many small and medium-sized security service organizations or individuals engaged in the security service, which suffer from no client resources, and the social demanders cannot fully trust the professional degree of the small and medium-sized security service organizations or individuals engaged in the security service, which causes spatial misalignment between the supply and demand parties.
Disclosure of Invention
Problem (A)
As for the problem of the lack of the private security service platform in the background art, the applicant thinks that a security service platform can be created, in which a plurality of social service organizations or individuals (such as security service companies and individuals dedicated to security services) serve a plurality of private security requirement organizations or individuals, and clients can freely select a satisfactory service organization or individual according to their own requirements, but this involves an important problem in terms of how to implement security service contracts between service organizations or individuals and clients without compromising privacy, and how to accurately and infallibly convey security service information grasped by security service organizations or individuals to the next service organization or the individual, which becomes very important for security services.
In order to solve the above technical problems, on one hand, a general platform of a security service organization needs to be constructed, organization or individual information for developing security service business is collected on the platform, the platform performs real name authentication and business level test on the organization or individual of the security service business to provide for corresponding clients to perform screening, and on the other hand, the security service information generated in the security service process belongs to private information of the clients, the platform cannot be involved and stored, and is encrypted and distributed in a block chain information platform through a block chain technology.
The solution of the technical problem mainly depends on the block chain technology, and the block chain is a novel application mode of computer technologies such as distributed data storage, point-to-point transmission, a consensus mechanism, an encryption algorithm and the like. The method is essentially a decentralized database, uses a block chain technology in the security service process, and has two functions, namely, a security service demander signs a contract signed by an organization or an individual providing security service business and provides a public key to a node on the block chain, and the node on the block chain performs system verification on the contract signed by the individual according to the provided public key to determine the correctness of the contract. On the other hand, the organization or the individual who provides the security service business encrypts the contract of the security service and the information collected and generated in the service process by using the public key of the security service demander, and the security service demander can decrypt the information by using the private key, store the decrypted information locally and further supply the information to the next security service organization or the individual. The contract and the security service information which are encrypted by the public key are stored in the block chain, and in order to enable each node in the block chain to have the incentive to carry out the encrypted contract and security service information recording, the general certificate reward is introduced. The voucher can be exchanged for a commodity and then mortgage and replaced at a pawn. According to the method and the system, a block chain technology is used, and the problems of asymmetric information and the like of the two parties of the existing security service mechanism or the individual are solved by calling the uplink data, so that the trust cost is greatly reduced, and the efficiency of security service is improved.
(II) technical content
For the application, a safety service system based on the block chain technology is built, and an employer with safety requirements and a service provider or an individual providing safety service are connected together, so that the technical problem can be perfectly solved.
Specifically, the invention provides a safety service system based on a blockchain technology, which comprises a public safety service platform and an intelligent contract device, wherein the public safety service platform is used for providing a safety service provider to a safety service demander and at least comprises a user system, a training system, an examination system and a task issuing system, the intelligent contract device is used for providing an intelligent contract between the safety service provider and the safety service demander, the intelligent contract is used for restricting the right and the obligation between the safety service provider and the safety service demander, and the intelligent contract device is a device supporting the blockchain intelligent contract and is deployed on the Internet.
The user system is used for registering a security service provider and a full-service demander;
the training system is used for issuing or organizing training business of safety service providers for user registration;
the examination system is used for carrying out examination certification on a safety service provider trained by the training system, and the examiner can obtain a certificate of practice of a safety security guard on duty;
the task issuing system is used for issuing safety service requirements by safety service provider demanders registered in the system, and comprises a task issuing party unit and an order receiving party unit, wherein the task issuing party unit at least comprises modules for issuing tasks, reminding tasks, scheduling tasks, status tasks, evaluating tasks, compensating and the like, and the order receiving party unit at least comprises modules for my tasks, received tasks, evaluating management and the like;
the security service provider comprises an organization or an individual who can provide security services, and the security service demander comprises an organization or an individual who needs to receive security services.
The training system comprises online training and offline training, wherein the online training comprises processes of identity binding, course learning, progress management, industry-setting management and the like;
the examination system comprises the processes of registration, examination, evidence obtaining and the like;
the recruitment system comprises the processes of information check, recruiter information, work information finding and the like for enterprises and individuals.
The construction and execution of the intelligent contract are described in detail below.
1. The security service provider and the security service demander participate together to make an intelligent contract
(1) Firstly, a security service provider and a security service demander must register as a user of a block chain, and the block chain is returned to the security service provider and the security service demander by a pair of public keys and private keys; the public key is used as an account address of a security service provider and a security service demander on a blockchain, and the private key is used as a unique key for operating the account.
(2) Two or more than two safety service providers and safety service demanders agree a commitment according to the needs, and the commitment comprises the rights and obligations of both parties; these rights and obligations program the machine language in an electronic manner; the participants use respective private keys to sign; to ensure the validity of the contract.
(3) The signed intelligent contract is transmitted into the blockchain network according to the promised content and the information collected and generated in the service process.
2. Contracts are flooded across the P2P network and stored in block chains
(1) The contracts are diffused in the whole block chain network in a mode of P2P, and each node receives one contract; the verification node in the block chain can firstly store the received contract into the memory, wait for a new round of consensus time and trigger consensus and processing of the contract.
(2) When the consensus time is up, the verification node packs all contracts stored in the latest period of time into a contract set (set), calculates the Hash value of the contract set, and finally assembles the Hash value of the contract set into a block structure to be diffused to the whole network; after receiving the block structure, other verification nodes take out the Hash of the contract set contained in the block structure and compare the Hash with the contract set stored by the other verification nodes; simultaneously sending a contract set approved by the user to other verification nodes; through such multiple rounds of sending and comparing; all the verification nodes eventually agree on the latest contract set within a specified time.
(3) The newly agreed contract set is spread across the network in blocks, each block containing the following information: the Hash value of the current block, the Hash value of the previous block, the timestamp when consensus is achieved, and other description information; the most important information of the block chain in the same time is a set of contracts with agreed consensus; and the nodes receiving the contract set verify each contract, and the verified contract is finally written into the block chain, wherein the verified content is mainly whether the private key signature of the contract participant is matched with the account.
3. Intelligent contract automatic execution for blockchain construction
(1) The intelligent contracts can regularly check the state of the automaton and traverse the state machine, the affairs and the triggering conditions contained in each contract one by one; pushing the transaction meeting the condition to a queue to be verified, and waiting for consensus; transactions that do not meet the trigger condition will continue to be deposited on the blockchain.
(2) The latest round of verified transactions can be diffused to each verification node, and the verification nodes firstly carry out signature verification to ensure the validity of the transactions as common block chain transactions or transactions; the transaction passing the verification enters a to-be-identified set, and after most verification nodes achieve the identification, the transaction is successfully executed and the user is informed.
(3) After the transaction is successfully executed, the state opportunity of the intelligent contract judges the state of the contract, and when all the transactions included in the contract are sequentially executed, the state opportunity marks the state of the contract as complete and removes the contract from the latest block; otherwise, the mark is marked as in progress, and the mark is continuously stored in the latest block to wait for the next round of processing until the processing is finished; the whole transaction and state processing is automatically completed by an intelligent contract system arranged in the bottom layer of the block chain, and the whole process is transparent and cannot be tampered.
Has the advantages that:
1. through the established security service platform, a plurality of social service organizations or individuals (such as security service companies and individuals working on security services) serve a plurality of private security requirement organizations or individuals under the mode, and clients can freely select the satisfied service organizations or individuals according to the requirements of the clients, so that a large number of private security service requirements on the market can be met.
2. In the security service process, the blockchain technology is used, and the two roles are that on one hand, a security service demander signs a contract signed with an organization or an individual providing security service business, and provides a public key to a node on the blockchain, and the node on the blockchain performs system verification on the signed contract according to the provided public key to determine the correctness of the contract. On the other hand, the organization or the individual who provides the security service business encrypts the contract of the security service and the information collected and generated in the service process by using the public key of the security service demander, and the security service demander can decrypt the information by using the private key, store the decrypted information locally and further supply the information to the next security service organization or the individual. The contract and the security service information which are encrypted by the public key are stored in the block chain, so that the security service contract between a service organization or an individual and a client is ensured to be executed without discount on the premise of ensuring privacy, and the security service information mastered by the security service organization or the individual can be accurately transmitted to the next service organization or the individual without tampering.
Detailed Description
In order to make the technical means, the creation characteristics, the achievement purposes and the effects of the invention easy to understand, the invention is further explained below.
Example 1: the invention provides a safety service system based on a block chain technology, which comprises a public safety service platform and intelligent contract equipment, wherein the public safety service platform is used for providing a safety service provider to a safety service demander and at least comprises a user system, a training system, an examination system and a task issuing system, the intelligent contract equipment is used for providing an intelligent contract between the safety service provider and the safety service demander, the intelligent contract is used for restricting the right and the obligation between the safety service provider and the safety service demander, and the intelligent contract equipment is equipment which is deployed on the Internet and supports the intelligent contract of the block chain.
Example 2: the embodiment 2 is that the safety service system based on the block chain technology is applied to the public community autonomous system, the safety service in the public community autonomous system in the system is completely controlled by the safety service system based on the block chain technology, and the structure of the public community autonomous system comprises a data layer, a network layer, a consensus layer, an excitation layer, a contract layer and an application layer from bottom to top.
1) And (6) a data layer. The chain structure of the bottom layer data block is packaged, and related technologies such as asymmetric public and private key data encryption technology and time stamp are used, and the chain structure is the bottom layer data mechanism in the whole block chain technology.
2) And (4) a network layer. Including a distributed networking mechanism, a data propagation mechanism, a data verification mechanism and the like, the adoption of the networking technology of the complete P2P means that the blockchain has an automatic networking function.
3) And (4) a consensus layer. Various consensus mechanism algorithms of the network nodes are mainly packaged. The consensus algorithm is the core technology of the block chain technology, because the consensus algorithm determines who to bill, and the mode of choice of the biller affects the security and reliability of the whole system.
4) And an excitation layer. The economic factors are integrated into the block chain technology system, and mainly comprise a general evidence issuing and distributing mechanism of economic incentive and the like.
5) And (4) a contract layer. Various scripts, algorithms and intelligent contracts are mainly packaged, and are the basis of the programmable characteristic of the block chain.
6) And (5) an application layer. Various application scenarios and cases of the blockchain are encapsulated, for example, various blockchain applications built on an ethernet workshop are deployed on an application layer, and so-called programmable currency and programmable finance are built on the application layer.

Claims (9)

1. A safety service system based on block chain technology is characterized in that: the intelligent contract system comprises a public safety service platform and intelligent contract equipment, wherein the public safety service platform is used for providing a safety service supplier to a safety service demander and at least comprises a user system, a training system, an examination system and a task issuing system, the intelligent contract equipment is used for providing an intelligent contract between the safety service supplier and the safety service demander, the intelligent contract is used for restricting the right and the obligation between the safety service supplier and the safety service demander, and the intelligent contract equipment is equipment which is deployed on the Internet and supports a blockchain intelligent contract.
2. A block chain technology-based security service system according to claim 1, wherein: the user system is used for registering a security service provider and a security service demander.
3. A block chain technology-based security service system according to claim 1, wherein: the training system is used for issuing or organizing training businesses of safety service providers for user registration.
4. A block chain technology-based security service system according to claim 1, wherein: the examination system is used for carrying out examination certification on a safety service provider trained through the training system, and the examiner can obtain a certificate for the security guards to perform work on duty.
5. A block chain technology-based security service system according to claim 1, wherein: the task issuing system is used for issuing safety service requirements by safety service provider demanders registered in the system, and comprises a task issuing party unit and an order receiving party unit, wherein the task issuing party unit at least comprises modules for issuing tasks, reminding tasks, scheduling tasks, status tasks, evaluating tasks, compensating fees and the like, and the order receiving party unit at least comprises modules for my tasks, received tasks, evaluating management and the like.
6. A block chain technology-based security service system according to claim 1, wherein: the security service provider comprises an organization or an individual who can provide security services, and the security service demander comprises an organization or an individual who needs to receive security services.
7. A block chain technology-based security service system according to claim 3, wherein: the training system comprises online training and offline training, wherein the online training comprises identity binding, course learning, progress management and end-of-business management processes.
8. A block chain technology-based security service system according to claim 4, wherein: the examination system comprises the processes of registration, examination and evidence obtaining.
9. Use of a security service system according to any of claims 1-8 in an autonomous community, characterized in that: the security service in the autonomous community is completely controlled by a security service system based on a block chain technology, and the structure of the public community autonomous system consists of a data layer, a network layer, a consensus layer, an excitation layer, a contract layer and an application layer from bottom to top;
1) the data layer encapsulates a chain structure of a bottom data block, and related technologies such as asymmetric public and private key data encryption technology, time stamp and the like, which are data mechanisms at the bottom layer in the whole block chain technology;
2) the network layer comprises a distributed networking mechanism, a data propagation mechanism, a data verification mechanism and the like, and the networking technology of complete P2P is adopted, so that the block chain has an automatic networking function;
3) the consensus layer mainly encapsulates various consensus mechanism algorithms of the network nodes, and the consensus mechanism algorithms are core technologies of the block chain technology, so that the user can determine who to perform accounting at all, and the selection mode of an accounting person can influence the safety and reliability of the whole system;
4) the incentive layer integrates economic factors into a block chain technology system and mainly comprises a certificate issuing and distributing mechanism of economic incentive and the like;
5) the contract layer mainly encapsulates various scripts, algorithms and intelligent contracts and is the basis of the programmable characteristic of the block chain;
6) the application layer encapsulates various application scenes and cases of the block chain; for example, various blockchain applications built on an ethernet workshop are deployed on an application layer, and so-called programmable currency and programmable finance are built on the application layer.
CN202010281987.4A 2020-04-11 2020-04-11 Block chain-based security service system and application thereof in autonomous community Pending CN111460507A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010281987.4A CN111460507A (en) 2020-04-11 2020-04-11 Block chain-based security service system and application thereof in autonomous community

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010281987.4A CN111460507A (en) 2020-04-11 2020-04-11 Block chain-based security service system and application thereof in autonomous community

Publications (1)

Publication Number Publication Date
CN111460507A true CN111460507A (en) 2020-07-28

Family

ID=71684652

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010281987.4A Pending CN111460507A (en) 2020-04-11 2020-04-11 Block chain-based security service system and application thereof in autonomous community

Country Status (1)

Country Link
CN (1) CN111460507A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112907217A (en) * 2021-03-10 2021-06-04 杭州宇链科技有限公司 Block chain-based security service system
CN114722431A (en) * 2022-04-11 2022-07-08 北京神州邦邦技术服务有限公司 Method and device for monitoring generic IT service process based on block chain and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101882249A (en) * 2009-05-08 2010-11-10 北京正辰科技发展有限责任公司 oppoLMS (Learning Management System)
CN102324074A (en) * 2011-10-28 2012-01-18 山东城通科技有限公司 Informatization application cluster platform of small and medium enterprises
CN109002527A (en) * 2018-07-13 2018-12-14 江苏开放大学(江苏城市职业学院) A method of its management online exam of network test system and utilization based on block chain
CN109949033A (en) * 2018-11-15 2019-06-28 陕西医链区块链集团有限公司 Block chain-based secure transaction system and method
CN110414270A (en) * 2019-08-01 2019-11-05 谈建中 A kind of personal data protection system and method based on block chain

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101882249A (en) * 2009-05-08 2010-11-10 北京正辰科技发展有限责任公司 oppoLMS (Learning Management System)
CN102324074A (en) * 2011-10-28 2012-01-18 山东城通科技有限公司 Informatization application cluster platform of small and medium enterprises
CN109002527A (en) * 2018-07-13 2018-12-14 江苏开放大学(江苏城市职业学院) A method of its management online exam of network test system and utilization based on block chain
CN109949033A (en) * 2018-11-15 2019-06-28 陕西医链区块链集团有限公司 Block chain-based secure transaction system and method
CN110414270A (en) * 2019-08-01 2019-11-05 谈建中 A kind of personal data protection system and method based on block chain

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112907217A (en) * 2021-03-10 2021-06-04 杭州宇链科技有限公司 Block chain-based security service system
CN114722431A (en) * 2022-04-11 2022-07-08 北京神州邦邦技术服务有限公司 Method and device for monitoring generic IT service process based on block chain and storage medium

Similar Documents

Publication Publication Date Title
CN110599181B (en) Data processing method, device and equipment based on block chain and storage medium
CN108737361B (en) Data verification method based on block chain
CN106878396B (en) Method, device and system for processing trade information
Zhang et al. An IoT electric business model based on the protocol of bitcoin
Al Kawasmi et al. Bitcoin‐based decentralized carbon emissions trading infrastructure model
US20210027404A1 (en) System and method of reputation management and contract monitoring using blockchain
WO2019015474A1 (en) Management method, apparatus and system for increasing security of commercial paper exchange
CN110443701A (en) The logical card management method of one kind, supply chain financial system and electronic equipment
Ha et al. DeM-CoD: novel access-control-based cash on delivery mechanism for decentralized marketplace
CN110333948A (en) Virtual resource allocation method and apparatus based on block chain
CN110458700A (en) The logical card generation method of one kind, supply chain financial system and electronic equipment
CN111369730B (en) Voting processing method and device based on block chain
CN113065775A (en) Bidding system based on block chain
CN110246005A (en) Rent method and device based on block chain
CN110599348B (en) Method, device, equipment and storage medium for stock right incentive
CN110728494A (en) Real estate service handling method, real estate property information system and real estate property information device
CN114549194A (en) Right asset management service platform based on block chain and implementation method thereof
CN108352010A (en) Method and system for administrative authentication services client data
CN111339550A (en) Comment information credibility method based on block chain technology
CN112232828A (en) Power grid data transaction method and system
CN111460507A (en) Block chain-based security service system and application thereof in autonomous community
CN112862303A (en) Crowdsourcing quality evaluation system and method based on block chain
CN114693241A (en) Block chain-based electronic resume system and implementation method thereof
CN110347750A (en) Data processing method and device based on block chain
KR102061448B1 (en) Method, apparatus and program for providing blockchain based project administration service

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20200728