CN112381648B - Block chain-based module intelligent start-stop control method - Google Patents

Block chain-based module intelligent start-stop control method Download PDF

Info

Publication number
CN112381648B
CN112381648B CN202011250753.XA CN202011250753A CN112381648B CN 112381648 B CN112381648 B CN 112381648B CN 202011250753 A CN202011250753 A CN 202011250753A CN 112381648 B CN112381648 B CN 112381648B
Authority
CN
China
Prior art keywords
block chain
certificate
module
uplink
blockchain
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011250753.XA
Other languages
Chinese (zh)
Other versions
CN112381648A (en
Inventor
林炀平
宋学武
徐铁兵
刘卫卫
柯叶翔
赵帅
张勇杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Gandao Intelligent Technology Co ltd
Original Assignee
Hangzhou Gandao Intelligent Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Gandao Intelligent Technology Co ltd filed Critical Hangzhou Gandao Intelligent Technology Co ltd
Priority to CN202011250753.XA priority Critical patent/CN112381648B/en
Publication of CN112381648A publication Critical patent/CN112381648A/en
Application granted granted Critical
Publication of CN112381648B publication Critical patent/CN112381648B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • H04L9/3268Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate validation, registration, distribution or revocation, e.g. certificate revocation list [CRL]

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Accounting & Taxation (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Finance (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • General Engineering & Computer Science (AREA)
  • Strategic Management (AREA)
  • Databases & Information Systems (AREA)
  • General Business, Economics & Management (AREA)
  • Marketing (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Computing Systems (AREA)
  • Technology Law (AREA)
  • Data Mining & Analysis (AREA)
  • Economics (AREA)
  • Development Economics (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The application discloses a module intelligent start-stop control method based on a block chain, which is applied to a block chain system, wherein a CA center, a chip service system, a block chain module and a block chain platform are deployed on the block chain system, and the method comprises the following steps: a merchant or a CA center proprietary to an operator issues an SDK certificate and simultaneously generates a pair of secret keys; the CA center transmits the registered SDK certificate and the key to the chip service system; the chip service system issues the corresponding SDK certificate and the key pair to the blockchain chip; the blockchain chip carries a certificate and sends an uplink request to the blockchain platform, and the blockchain platform performs certificate verification. The beneficial effects are that: whether the data can be uplink or not is controlled by controlling the SDK digital certificate; compared with the mode of cutting off the power supply or issuing instructions, the service life of the equipment is not affected, and the method is more efficient and convenient; and through the cooperative mode of the intelligent contract and the certificate, the mutual cross verification is performed to control whether the data can be uplink or not, so that the authenticity and the credibility of the data on the link are ensured.

Description

Block chain-based module intelligent start-stop control method
Technical Field
The application relates to the field of intelligent start-stop of modules, in particular to an intelligent start-stop control method of a module based on a blockchain.
Background
At present, the blockchain module is generally integrated in equipment, when an operator or a merchant finds that the equipment has a problem or the data needing to be uplinked has a problem, the power supply of the equipment can be cut off, the blockchain module can be closed or other services such as data uploading can be prevented, the efficiency is low, and irrecoverable damage is easily caused to the operator or the merchant when the data with the problem is uploaded to the blockchain.
Patent CN110874741a discloses a contract management method, a blockchain system and a storage medium, wherein a start-stop management contract, a start-stop control contract and a start-stop business contract are deployed on the blockchain system, and the start-stop business contract is a peer contract of an intelligent contract, and the method comprises the following steps: when a start-stop management instruction is received through the start-stop management contract, controlling the running state of the start-stop business contract based on the start-stop management instruction through the start-stop management contract; when a service request for a start-stop service contract is received through the start-stop control contract, inquiring the running state of the start-stop service contract from the start-stop management contract through the start-stop control contract; when the running state of the service contract capable of being started and stopped is stopped, rejecting the service request through the start-stop control contract; and when the running state of the start-stop service contract is stop, calling the start-stop service contract through the start-stop control contract, and executing the service request.
The above patent discloses only intelligent contracts and start-stop management for contracts, and is not applied to specific blockchain modules, and does not mention how to control start-stop of the blockchain modules when the blockchain is in uplink, and if only the contracts are used for control, the contracts are tampered and replaced.
Disclosure of Invention
The technical problem that this application mainly solves is to provide a module intelligence opens and stops control method based on block chain, can open to stop intelligent control to the module.
In order to solve the technical problems, one technical scheme adopted by the application is as follows: the intelligent start-stop control method based on the module of the block chain is applied to a block chain system, wherein a private CA center, a chip service system, a block chain module and a block chain platform are deployed on the block chain system, and a chip is arranged on the block chain module; the method comprises the following steps:
a merchant or a CA center proprietary to an operator issues an SDK certificate and simultaneously generates a pair of secret keys;
the CA center transmits the registered SDK certificate and the key to the chip service system;
the chip service system issues the corresponding SDK certificate and the key pair to the blockchain chip;
the blockchain chip carries a certificate and sends an uplink request to the blockchain platform, and the blockchain platform performs certificate verification.
When a merchant or an operator finds that the equipment has a problem or the uplink data has a problem, the chip service system sends a request instruction for canceling the SDK certificate;
the merchant or the private CA center of the operator sends a revocation list push based on a request instruction for revoking the SDK certificate, and at the moment, the data being uplinked can cancel the uplink or can not be uplinked.
Whether the detection device has a problem or is disassembled is specifically:
and a vibration sensor is arranged at the key part of the equipment.
The detection of whether there is a problem with the uplink data is specifically:
and reading the abstract or the catalog before the data is uplink, judging and identifying, and identifying whether the data has problems or not.
Comprises a contract management module;
the blockchain chip sends a uplink request to the blockchain platform with a certificate, and the blockchain platform performs certificate verification, and meanwhile, the method further comprises the following steps:
the chip service system sends the instruction to the contract management module;
the contract management module automatically executes a data uplink function or a data stop uplink function through an instruction preset in advance by calling the intelligent contract of the instruction;
the blockchain platform receives the request and then determines whether the uplink can be performed by executing the latest intelligent contract.
The intelligent contract preset instructions comprise enabling module contracts and disabling module contracts.
And when the certificate verification passes, the contract management module calls the starting module contract, the blockchain platform executes the starting module contract, and the data collected by the blockchain module is controlled to be uplink.
And when the certificate verification is not passed, the contract management module calls the disabling chip contract, the blockchain platform executes the disabling chip contract and controls the data collected by the blockchain module to stop the uplink.
The CA center issues the SDK certificate through root.ca or root.priv.
The key pair is a public key and a private key, the public key is disclosed to all nodes in the blockchain system, and the private key is used for identity verification in each node.
The beneficial effects are that:
1. whether the data collected by the block chain module can be uplink or not is controlled by controlling the SDK digital certificate; compared with the prior art, the method for directly revoking the certificate on the SDK only by cutting off the power supply or issuing the instruction can more efficiently and conveniently prevent the collected data from being uplink on the premise of not influencing the service life of the equipment;
2. the data collected by the block chain module is controlled to be capable of being uplink or not through mutual cross verification in a mode of intelligent contract and certificate cooperation; by means of cross verification, the true credibility of the data before the uplink is ensured, and therefore the true credibility of the data on the link is ensured.
Drawings
FIG. 1 is a flow chart of a blockchain-based start/stop of a digital certificate control module;
FIG. 2 is a flowchart of a blockchain-based digital certificate and contract management module co-control module start-stop.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and fully with reference to the accompanying drawings, in which it is evident that the embodiments described are only some, but not all embodiments of the invention. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
For a better understanding of the present solution, some terms and processes are parsed by way of example below:
public key: is a public key that is public to all nodes and without any risk, the public key being used for confirmation of a receipt in a transaction, similar to a "payee" in a banking transaction. It is also often used to encrypt session keys, verify digital signatures, or encrypt data that can be decrypted with a corresponding private key.
Private key: refers to a key associated with an address, a string of 256-bit numbers that is known only to the private key owner, used for digital signing, confirming ownership of the transaction, similar to the "signature" in banking transactions.
Let A be the client and B be the server
Public key encryption
The encryption refers to encryption of other algorithm forms such as asymmetric algorithm encryption, symmetric algorithm encryption and the like on a piece of data; and assuming that A is a client and B is a server, the encryption process is that A and B carry out communication encryption, B needs to generate a pair of secret keys, B holds a private key for A, A uses the public key of B to encrypt the content to be transmitted, and then B receives ciphertext and decrypts the content through the private key of B.
Private key decryption
Decryption is to analyze encrypted data by a relevant logic operation to become data before encryption.
Private key signature
Signing means that relevant characters are added to data, such as generating a data abstract and the like, and then signature verification is carried out, wherein the signing aims at preventing information from being tampered; a sends a message to B, A calculates the message digest of the message, then encrypts the message digest using its own private key, and the encrypted message digest is the signature (A encrypts the message digest with its own private key to become the signature).
For example:
public key signature verification
B after receiving the message, it will also use the same method as A to extract the message abstract, then use A's public key to decrypt the signature, and compare with the message abstract calculated by oneself, if the same, it indicates that the message is A sent to B, at the same time, A cannot deny the fact that it sent the message to B (B uses A's public key to decrypt the signature file, called "signature verification")
Referring to fig. 1 to 2, fig. 1 is a flowchart of a start-stop of a control module of a blockchain-based digital certificate, and fig. 2 is a flowchart of a start-stop of a control module of a blockchain-based digital certificate and a contract management module cooperatively according to an embodiment of the present application. An embodiment of the present application provides a module intelligent start-stop control method based on blockchain,
the system is applied to a block chain system, wherein a CA center, a chip service system, a block chain module and a block chain platform are deployed on the block chain system, and a chip is arranged on the block chain module;
the method comprises the following steps:
s1, a merchant or a CA center proprietary to an operator issues an SDK certificate and a key pair is generated at the same time;
it should be noted that, the private CA center uses the toolkit opensl to generate a key file through fixed attribute data, generates a root certificate according to the key file, generates a uplink certificate according to the root certificate, and verifies the root certificate in the later stage, in some embodiments of the present application, the CA center issues the SDK certificate through root.
S2, the CA center transmits the registered SDK certificate and the key to the chip service system;
s3, the chip service system issues the corresponding SDK certificate and key pair to the blockchain chip, and specifically, the certificate issuing and public and private key transmission are carried out through an internal server and an internal network;
s4, the blockchain chip sends a uplink request to the blockchain platform with a certificate, the blockchain platform performs certificate verification, the blockchain platform can be a Hyperchain blockchain or ant chain platform and other platforms capable of realizing the functions of the blockchain platform, specifically, authentication between a terminal and a server is completed through an authentication process inside the chip, and then the request can pass.
In some embodiments, the blockchain chip sends a request to the blockchain platform with a certificate, and the blockchain platform performs certificate verification and simultaneously sends an instruction to the contract management module by the chip service system;
the contract management module automatically executes a data uplink function or a data stop uplink function through an instruction preset in advance by calling an intelligent contract of the instruction, wherein the intelligent contract is about a computer protocol aiming at informationized propagation, verification or contract execution;
the blockchain platform receives the request and then determines whether the uplink can be performed by executing the latest intelligent contract.
In some embodiments, the smart contract pre-set instructions include enabling a module contract and disabling a module contract.
In some embodiments, the blockchain platform receives a request to perform certificate verification, when the certificate verification passes, the contract management module invokes the enable module contract, the blockchain platform executes the enable module contract, the data collected by the blockchain module is controlled to perform uplink, specifically, the uplink request contains the ID of the device, when the server sends the related request through the operating system or the interface, the contract automatically executes and verifies the related device ID, and once the device ID passes the verification, the uplink can be performed.
In some embodiments, the blockchain platform receives a request for certificate verification, and when the certificate verification is not passed, the contract management module invokes a disable-chip contract, the blockchain platform executes the disable-chip contract, and the data collected by the blockchain module is controlled to stop the uplink.
S5, when a merchant or an operator finds that equipment has a problem or uplink data has a problem, the chip service system sends a request instruction for canceling the SDK certificate, and particularly the service end has an operation function, namely an operation service interface, and can send the cancellation instruction through the background of the server;
the private CA center of a merchant or an operator sends a revocation list push based on a request instruction for revoking an SDK certificate, and supposes that the revocation list contains a uplink certificate, when a chip transmits to a bottom layer blockchain platform, the chip is uplinked through the uplink certificate, the piece of chip cannot complete the uplink, the system can return a field that the certificate is overdue and cannot be uploaded, at the moment, the uplink data can be canceled or cannot be uplinked, because the uplink needs the blockchain platform to check the digital certificate, when the certificate is absent, the data collected by a module from a device cannot be uplinked, and therefore the system can timely respond without cutting off a power supply when the fact that the device with the blockchain module is detached or the uplink data is detected to be abnormal is ensured.
In some embodiments, detecting whether the device is problematic or is disassembled is specifically:
vibration sensors are arranged on key parts of the equipment, such as detachable parts of a shell, a chassis and the like of the washing machine, a control box of the intelligent wardrobe and the like, and the vibration sensors are arranged to detect whether the equipment is detached or not.
In some embodiments, detecting whether there is a problem with the data of the uplink is specifically:
and reading the abstract or the catalog before the data is uplink, judging and identifying, and identifying whether the data has problems or not.
The beneficial effects are that:
1. whether the data collected by the block chain module can be uplink or not is controlled by controlling the SDK digital certificate; compared with the prior art, the method for directly revoking the certificate on the SDK only by cutting off the power supply or issuing the instruction can more efficiently and conveniently prevent the collected data from being uplink on the premise of not influencing the service life of the equipment;
2. the data collected by the block chain module is controlled to be capable of being uplink or not through mutual cross verification in a mode of intelligent contract and certificate cooperation; by means of cross verification, the true credibility of the data before the uplink is ensured, and therefore the true credibility of the data on the link is ensured.
It should be noted that the terms "comprising" and "having," and any variations thereof, in the embodiments of the present application are intended to cover non-exclusive inclusion. For example, a process, method, system, article, or apparatus that comprises a list of steps or elements is not limited to only those listed steps or elements but may include other elements not listed or inherent to such process, method, article, or apparatus.
The foregoing description is only illustrative of the present invention and is not intended to limit the scope of the invention, and all equivalent structures or equivalent processes or direct or indirect application in other related technical fields are included in the scope of the present invention.

Claims (6)

1. The utility model provides a module intelligence start-stop control method based on block chain, its characterized in that is applied to the block chain system, the private CA center, chip service system, block chain module, block chain platform are arranged on the block chain system, be provided with the chip in the block chain module the method includes:
a merchant or a CA center proprietary to an operator issues an SDK certificate and simultaneously generates a pair of secret keys;
the CA center transmits the registered SDK certificate and the key to the chip service system;
the chip service system issues the corresponding SDK certificate and the key pair to the blockchain chip;
the block chain chip carries a certificate and sends an uplink request to the block chain platform, and the block chain platform performs certificate verification;
comprises a contract management module;
the blockchain chip sends a uplink request to the blockchain platform with a certificate, and the blockchain platform performs certificate verification, and meanwhile, the method further comprises the following steps:
the chip service system sends the instruction to the contract management module;
the contract management module automatically executes a data uplink function or a data stop uplink function through an instruction preset in advance by calling the intelligent contract of the instruction;
the block chain platform receives the request and then judges whether the uplink can be carried out or not by executing the latest intelligent contract;
the intelligent contract preset instructions comprise an enabling module contract and a disabling module contract;
the block chain platform receives the request to carry out certificate verification, when the certificate verification passes, the contract management module calls the starting module contract, the block chain platform executes the starting module contract, and the data collected by the block chain module is controlled to be uplink;
and when the certificate verification is not passed, the contract management module calls the disabling chip contract, the blockchain platform executes the disabling chip contract and controls the data collected by the blockchain module to stop the uplink.
2. The blockchain-based module intelligent start-stop control method of claim 1, wherein when a merchant or an operator finds that a device has a problem or uplink data has a problem, a chip service system sends a request instruction for canceling an SDK certificate;
the merchant or the private CA center of the operator sends a revocation list push based on a request instruction for revoking the SDK certificate, and at the moment, the data being uplinked can cancel the uplink or can not be uplinked.
3. The blockchain-based module intelligent start-stop control method of claim 2, wherein detecting whether the device has a problem or is disassembled is specifically:
and a vibration sensor is arranged at the key part of the equipment.
4. The intelligent start-stop control method of a block chain based module according to claim 2, wherein detecting whether there is a problem with the uplink data is specifically:
and reading the abstract or the catalog before the data is uplink, judging and identifying, and identifying whether the data has problems or not.
5. The blockchain-based module intelligent start-stop control method of any of claims 1-4, wherein the CA center issues the SDK certificate through root.
6. The blockchain-based module intelligent start-stop control method of any of claims 1-4, wherein the key pair is a public key and a private key.
CN202011250753.XA 2020-11-11 2020-11-11 Block chain-based module intelligent start-stop control method Active CN112381648B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011250753.XA CN112381648B (en) 2020-11-11 2020-11-11 Block chain-based module intelligent start-stop control method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011250753.XA CN112381648B (en) 2020-11-11 2020-11-11 Block chain-based module intelligent start-stop control method

Publications (2)

Publication Number Publication Date
CN112381648A CN112381648A (en) 2021-02-19
CN112381648B true CN112381648B (en) 2024-04-05

Family

ID=74579700

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011250753.XA Active CN112381648B (en) 2020-11-11 2020-11-11 Block chain-based module intelligent start-stop control method

Country Status (1)

Country Link
CN (1) CN112381648B (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106789090A (en) * 2017-02-24 2017-05-31 陈晶 Public key infrastructure system and semi-random participating certificate endorsement method based on block chain
CN106972931A (en) * 2017-02-22 2017-07-21 中国科学院数据与通信保护研究教育中心 A kind of method of certificate transparence in PKI
CN108390891A (en) * 2018-03-28 2018-08-10 电子科技大学天府协同创新中心 Information protecting method based on privately owned block chain
CN109547219A (en) * 2019-01-18 2019-03-29 杭州秘猿科技有限公司 Information collection and the method and apparatus for being submitted to block chain network
CN109921910A (en) * 2019-03-21 2019-06-21 平安科技(深圳)有限公司 Verification method and device, storage medium, the electronic device of certificate status
WO2020011288A2 (en) * 2019-10-16 2020-01-16 Alipay (Hangzhou) Information Technology Co., Ltd. Implementing a blockchain-based web service
CN110874741A (en) * 2019-10-10 2020-03-10 北京海益同展信息科技有限公司 Contract management method, block chain system and storage medium

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106972931A (en) * 2017-02-22 2017-07-21 中国科学院数据与通信保护研究教育中心 A kind of method of certificate transparence in PKI
CN106789090A (en) * 2017-02-24 2017-05-31 陈晶 Public key infrastructure system and semi-random participating certificate endorsement method based on block chain
CN108390891A (en) * 2018-03-28 2018-08-10 电子科技大学天府协同创新中心 Information protecting method based on privately owned block chain
CN109547219A (en) * 2019-01-18 2019-03-29 杭州秘猿科技有限公司 Information collection and the method and apparatus for being submitted to block chain network
CN109921910A (en) * 2019-03-21 2019-06-21 平安科技(深圳)有限公司 Verification method and device, storage medium, the electronic device of certificate status
CN110874741A (en) * 2019-10-10 2020-03-10 北京海益同展信息科技有限公司 Contract management method, block chain system and storage medium
WO2020011288A2 (en) * 2019-10-16 2020-01-16 Alipay (Hangzhou) Information Technology Co., Ltd. Implementing a blockchain-based web service
CN111213128A (en) * 2019-10-16 2020-05-29 支付宝(杭州)信息技术有限公司 Implementing blockchain based web services

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
基于区块链技术的证书认证系统研究与实现;祁辉 等;《滁州学院学报》;第22卷(第5期);37-42+51 *

Also Published As

Publication number Publication date
CN112381648A (en) 2021-02-19

Similar Documents

Publication Publication Date Title
CN101873331B (en) Safety authentication method and system
CN113099443B (en) Equipment authentication method, device, equipment and system
CN108347729B (en) Network is sliced interior method for authenticating, slice authentication agent entity and session management entity
EP3780484B1 (en) Cryptographic operation and working key creation method and cryptographic service platform and device
AU2020396746B2 (en) Provisioning method and terminal device
CN102868531B (en) Networked transaction certification system and method
CN106713237A (en) Encryption method of vehicle-mounted terminal and center platform communication
CN114448727B (en) Information processing method and system based on industrial internet identification analysis system
CN110381075B (en) Block chain-based equipment identity authentication method and device
WO2018113337A1 (en) Method and system for establishing secure communication environment for wearable device
CN101500224A (en) Multi-application management server for telecommunication smart card, multi-application management method and system
CN111131416A (en) Business service providing method and device, storage medium and electronic device
CN106411926A (en) Data encryption communication method and system
CN110838919B (en) Communication method, storage method, operation method and device
CN115396121A (en) Security authentication method for security chip OTA data packet and security chip device
CN106790080A (en) Secure communication of network method and apparatus between operation system and electronic certificate system
CN115835194B (en) NB-IOT terminal safety access system and access method
CN107155184B (en) WIFI module with secure encryption chip and communication method thereof
CN113612852A (en) Communication method, device, equipment and storage medium based on vehicle-mounted terminal
CN117081736A (en) Key distribution method, key distribution device, communication method, and communication device
CN111064693B (en) Block chain-based household appliance Internet of things user privacy protection method
CN103281324A (en) Safety communication method for Android client side
CN105471896A (en) Agent method, device and system based on SSL (Secure Sockets Layer)
CN113922974B (en) Information processing method and system, front end, server side and storage medium
CN112381648B (en) Block chain-based module intelligent start-stop control method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant