CN106878318A - A kind of block chain real time polling cloud system - Google Patents
A kind of block chain real time polling cloud system Download PDFInfo
- Publication number
- CN106878318A CN106878318A CN201710121982.3A CN201710121982A CN106878318A CN 106878318 A CN106878318 A CN 106878318A CN 201710121982 A CN201710121982 A CN 201710121982A CN 106878318 A CN106878318 A CN 106878318A
- Authority
- CN
- China
- Prior art keywords
- authentication
- block chain
- clouds
- authentication module
- module
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000003860 storage Methods 0.000 claims abstract description 8
- 238000000034 method Methods 0.000 claims description 38
- 238000012795 verification Methods 0.000 claims description 22
- 230000008569 process Effects 0.000 claims description 20
- 238000004364 calculation method Methods 0.000 claims description 15
- 230000001010 compromised effect Effects 0.000 claims description 14
- 230000007246 mechanism Effects 0.000 claims description 14
- 238000004458 analytical method Methods 0.000 claims description 7
- 238000004891 communication Methods 0.000 claims description 7
- 230000008859 change Effects 0.000 claims description 3
- 230000000694 effects Effects 0.000 claims description 3
- 238000012423 maintenance Methods 0.000 claims 1
- 238000004519 manufacturing process Methods 0.000 abstract description 12
- 238000013461 design Methods 0.000 abstract description 8
- 238000005516 engineering process Methods 0.000 description 6
- 230000006399 behavior Effects 0.000 description 4
- 238000009826 distribution Methods 0.000 description 3
- 230000006870 function Effects 0.000 description 3
- 230000009286 beneficial effect Effects 0.000 description 2
- 230000006872 improvement Effects 0.000 description 2
- 230000004044 response Effects 0.000 description 2
- 241001269238 Data Species 0.000 description 1
- 238000013459 approach Methods 0.000 description 1
- 238000013475 authorization Methods 0.000 description 1
- 238000007630 basic procedure Methods 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 238000000205 computational method Methods 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 230000003362 replicative effect Effects 0.000 description 1
- 238000000682 scanning probe acoustic microscopy Methods 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/104—Peer-to-peer [P2P] networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0807—Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/52—Network services specially adapted for the location of the user terminal
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a kind of block chain real time polling cloud system, including:Client database, authentication module, request authentication module, transport module, the high in the clouds authentication module module, base station stored system, high in the clouds authentication module, base station poll exchange system;Workflow is:NFC is a unique electronic tag in the whole world ensured by rivest, shamir, adelman in invention, and false distinguishing checking can be carried out by regular handset simultaneously for for block chain user by the embedded NFC of block chain of particular design;After other VeChain block chain network information Stores, after being verified by the true and false, apply and the product information of distributed storage in special block chain will be read out in mobile terminal, these information can include all information of commodity design, production, logistics, sale etc., to reach the supply chain all-transparent to manufacturing enterprise, marketing channel, supervision department and final block chain user.
Description
Technical field
The present invention relates to a kind of field of anti-counterfeit technology, it is related to a kind of mode by using real-time adjustment to carry out real time polling cloud
End is used to realize the amount of calculation device of the load of network and node.
Background technology
The anti-counterfeiting technology for commonly using at present includes product unique package, Quick Response Code, RFID, NFC label, but these technologies
All be to improve fraud cost in the way of it is false proof come reach to a certain degree, and for Quick Response Code, RFID/NFC these numeral marks
Know, all can be in theory what is be replicated due to information is isolated, and the cost for replicating is very low, can not accomplish
It is false proof in complete meaning.Comparatively speaking, Vechain is based on block chain technology can accomplish can not distorting and safety for data
Property, so that realizes truly is false proof.False proof based on block chain technology is made up of three parts:Part I is by spy
The embedded NFC of block chain of different design, in this type of design, NFC is no longer electronic plaintext display label, but one
It is individual by rivest, shamir, adelman ensure the unique electronic tag in the whole world, simultaneously for for block chain user pass through common hand
Machine can carry out false distinguishing checking;Part II is block chain network information Store, after being verified by the true and false, mobile terminal application
The product information of distributed storage in special block chain will be read out, these information can include commodity design, production, thing
All information of stream, sale etc., to reach the supply to manufacturing enterprise, marketing channel, supervision department and final block chain user
Chain all-transparent;Part III is directed to merchandise control and the distribution platform of production enterprise, and this platform can cause production enterprise
Industry issue new product extremely easily and effectively, and increase the social public credibility of manufacturing enterprise.
But in block chain authentication, because block chain node needed password encryption before authentication is carried out
Private key is decrypted, it is necessary to be not intended in time authentication information is made a summary and is added to block chain before authentication completion
Whole network can be involved, and only needs to node associated therewith to add authentication;And the meeting before authentication terminates
Current authentication information summary is added into block and is broadcast in the whole network, it is necessary to all active nodes are added to this process,
This identity block is added in local high in the clouds, so as to reduce the load of network and the amount of calculation of node in this process.
The main object of the present invention be by a kind of block chain real time polling cloud system, using intelligentized method,
It is so as to reduce the amount of calculation of load and node that network is reduced during this and offline increased by way of superposition
Authentication trust degree.Therefore, it can be said that by it is this be achieved in that it is necessary.
The content of the invention
In view of this, the technical problem to be solved in the present invention is to provide a kind of block chain real time polling cloud system, is used for
Solution cannot come real time polling high in the clouds to the mode of real-time adjustment and be used to realize the amount of calculation device of the load of network and node
Problem.To reach the effect of above-mentioned technical proposal, the technical scheme is that:A kind of block chain real time polling cloud system,
Including:Client database, authentication module, request authentication module, transport module, high in the clouds authentication module module, base station are deposited
Storage system, high in the clouds authentication module, base station poll exchange system;
In P2P networks, base station poll exchange system receives the band of position and the identity information of block chain user;According to position
The block chain user high in the clouds that the block chain ID carried in region and identity information stored from base station stored system is put to recognize
In card information, go to inquire about the block chain ID correspondence high in the clouds authentication information of block chain user;
High in the clouds authentication module refers to the functional unit of administrative authentication information;Authentication module refers to authentication verification letter
The functional unit of breath;Request authentication module refers to sending authentication information to the function of high in the clouds authentication module from authentication module
Component;
High in the clouds authentication module collects all of block chain user high in the clouds authentication information under each region;According under each region
All of block chain user high in the clouds authentication information generation block chain user high in the clouds authentication information, be used to reduce certification it is concurrent when meter
Calculation amount, and memory block chain user high in the clouds authentication information is to high in the clouds authentication module;The band of position block chain user that will be inquired
High in the clouds authentication information is sent to block chain user;
Wherein, the band of position of all of block chain user and identity information under each region is collected to be specially:Take turns base station
Ask the authority that exchange system timing sends the band of position and identity information to all of block chain user to request authentication module
It is required that;
Authentication module sends authentication acquisition request to its local block chain user is in;Authentication mould
Block chain user under block directly returns to the band of position and the high in the clouds certification letter of oneself by transport module to high in the clouds authentication module
Breath;And in return information, according to high in the clouds authentication module module addition mark, prevent both sides from denying, and the block chain for returning is used
Family is added to the node in network, while block chain user is needed first from base station stored system downloads portion copy to number clients
According to storehouse, authentication is then proceeded by again;
Base station stored system memory locations region and high in the clouds authentication information include:By the band of position and high in the clouds authentication information with
Many helical structures are stored;Wherein, many helical structures include:Single linked list, and each are formed with the row that are designated of the band of position
Area identification is associated as well to a circular linked list, and circular linked list includes the high in the clouds authentication information for belonging to block chain user, so that shape
Into complete block chain;
Verification process is divided into request authentication module and high in the clouds authentication module two parts, asks authentication module to be recognized to high in the clouds first
Card module initiates connection request;High in the clouds authentication module may require that request authentication module sends over the identity information of oneself;
Authentication starts to produce key pair by ECDSA, obtains private key:Public key is calculated with private key,
And calculate PIN with by public key;Private key is carried out into ECDSA random hash and draws public key, with this
Simultaneously, it is impossible to allow public key to calculate private key, PIN is calculated by public key, and is provided as bit coin address, then by public affairs
Key carries out SHA256 Hash calculations, and identity request information is signed and encrypted with private key is put into all of block chain user's cloud
Hold in the identity chain of authentication information, identity chain is the different block chain user's ID authentication information shape of high in the clouds authentication module generation
Into block chain;Then obtain adding the PIN of high in the clouds authentication module by Hash calculation by public key, used bases64
Encoded;
Last-minute plea authentication module submits application request, including authentication voucher and digital signature to, using private key and cloud
End authentication module is signed to request, and signature is used as mark head;With the voucher of public key encryption block chain authenticating user identification,
Solicited message is transmitted by private network in the form of identifying head;
High in the clouds authentication module first divides public key after the ID authentication request for receiving request authentication module from identity chain
Separate out and, verify the validity of signature;Authentication failed message is not returned to if if certification, authentication terminates;Then verify
The validity of PIN, PIN include timestamp and verification and, if return authentication failed message, authentication
Terminate;If being verified, request authentication module can return to a message acknowledgment being verified, while asking authentication module meeting
The digital signature information of oneself is sent to by high in the clouds authentication module with the identity of request end, and broadcasts the summary of this transmission, bag
Include the random number of the summary of block chain authenticating user identification voucher, random number and last authentication, P2P nodes meetings
During this authentication added into high in the clouds authentication module by transport module, and then it is added to the client data in P2P networks
In storehouse;
High in the clouds authentication module is received after the request authentication information sent of authentication module to asking the identity of authentication module
Verified, if being verified, can also be returned to a message acknowledgment being verified, this checking is then broadcasted, in P2P networks
Node can will ask the block chain user name of authentication module to be also added in the block of high in the clouds;If certification node is to add net for the first time
Network, then need other nodes to network to ask to download the authentication high in the clouds safeguarded in P2P networks to node locally, above mistake
Even if journey block chain authenticating user identification both sides have the side can also not carry out online, it is only necessary to which high in the clouds authentication module is when reaching the standard grade
Authentication module is authenticated;
High in the clouds authentication module and the data of certification both sides can be intercepted during block chain authenticating user identification, to certification
Both sides are transparent;If illegal node is wanted to pretend to be the side of being certified to complete authentication, it is necessary to change the content in the block of high in the clouds, and
Again whole workloads of all blocks after this block are completed, due to the calculating of high in the clouds authentication module, is owned in network
Node all can participation certificates authentication procedures each time, prevent from distorting the proof of work machine of transaction record using chain transaction
System, and prevent certification from denying, distort, the behavior such as palm off to reach;
Base station poll exchange system includes access entity, Service Ticket, authentication mechanism, identity relying party, authentication domain
Component is operated;
Access entity refers to the object of certification request, and only certification is by just allowing and accessed object communication;Certification
Voucher is referred to before access entity and accessed object communication for proving the digital evidence of oneself identity;Authentication mechanism is referred to
The methods that Service Ticket is produced and verified;Identity relying party refers to its behavior operation and depends on authentication module result
The functional unit, it may be possible to authorized component;Authentication domain refers in same administration authority border
Authentication part;
Base station poll exchange system effect is that block chain user determines various uncertain in identity-based verification process
Factor, 3 classes are divided into by the element of trust of authentication:Ensure that Service Ticket is not compromised, be denoted as 1 class;Ensure Service Ticket not
It is forged, is denoted as 2 classes;Ensure that Service Ticket is not held as a hostage, be denoted as 3 classes;Block chain user body in identity-based verification process
Cause the influence degree of the generations such as compromised Service Ticket, forgery or abduction in part verification process because of certain uncertain factor, claim
It is NOCONFIDENCE, block chain user certain uncertain factor in identity-based verification process causes Service Ticket to be let out
The influence degree of the generations such as dew, forgery or abduction can represent that wherein x represents object with NOCONFIDENCE ()=(x, y, z)
1 class element of trust, y represents 2 class element of trusts of object, and z is represented the element of trust of 3 classes, is being based on by block chain user
Certain uncertain factor causes the influence degree of the generations such as compromised Service Ticket, forgery or abduction in authentication procedures
The several significant uncertain factor of NOCONFIDENCE (), analysis assumes block chain user in identity-based verification process
Uncertainty, then calculate authentication trust value, the credible of high in the clouds authentication is judged with degree of safety, confidence level
Degree;Degree of safety refers to the possibility that key object ensures that certification authority is not compromised, is not forged or is not held as a hostage, uses probability
To represent;Confidence level is the method trusted for quantificational expression;In authentication mode, can lead in fixed authentication domain
The degree of belief crossed between computing system entity represents the security of authentication mode, is equally represented with probability;Confidence level is divided into recognizes
Card voucher confidence level, authentication secret confidence level, digital entities confidence level, physical entity confidence level.
Brief description of the drawings
Fig. 1 is a kind of structural representation of block chain real time polling cloud system of the invention.
Specific embodiment
In order that the technical problems to be solved by the invention, technical scheme and beneficial effect become more apparent, below tie
Drawings and Examples are closed, the present invention will be described in detail.It should be noted that specific embodiment described herein is only used
To explain the present invention, it is not intended to limit the present invention, can realizes that the product of said function belongs to equivalent and improvement, includes
Within protection scope of the present invention.Specific method is as follows:
Embodiment one:As shown in Figure 1:In practice, base station poll exchange system receive block chain user the band of position and
Identity information;The area that block chain ID according to being carried in the band of position and identity information has been stored from base station stored system
In the authentication information of block chain user high in the clouds, go to inquire about the block chain ID correspondence high in the clouds authentication information of block chain user;
High in the clouds authentication module collects all of block chain user high in the clouds authentication information under each region;According under each region
All of block chain user high in the clouds authentication information generation block chain user high in the clouds authentication information, be used to reduce certification it is concurrent when meter
Calculation amount, and memory block chain user high in the clouds authentication information is to high in the clouds authentication module;The band of position block chain user that will be inquired
High in the clouds authentication information is sent to block chain user;
Wherein, the band of position of all of block chain user and identity information under each region is collected to be specially:Take turns base station
Ask the authority that exchange system timing sends the band of position and identity information to all of block chain user to request authentication module
It is required that;
Authentication module sends authentication acquisition request to its local block chain user is in;Authentication mould
Block chain user under block directly returns to the band of position and the high in the clouds certification letter of oneself by transport module to high in the clouds authentication module
Breath;And in return information, added according to the high in the clouds authentication module module and marked, prevent both sides from denying, and the block for returning
Chain user is added to the node in network, while block chain user is needed first from base station stored system downloads portion copy to client
In client database, authentication is then proceeded by again.
Base station stored system memory locations region and high in the clouds authentication information include:By the band of position and high in the clouds authentication information with
Many helical structures are stored;Wherein, many helical structures include:Single linked list, and each are formed with the row that are designated of the band of position
Area identification is associated as well to a circular linked list, and circular linked list includes the high in the clouds authentication information for belonging to block chain user, so that shape
Into complete block chain.
Authentication starts to produce key pair by ECDSA, obtains private key:Public key is calculated with private key,
And calculate PIN with by public key;Private key is carried out into ECDSA random hash and draws public key, with this
Simultaneously, it is impossible to allow public key to calculate private key, PIN is calculated by public key, it is provided as bit coin address.Public key is carried out
SHA256 Hash calculations;Identity request information is signed with private key.
Verification process is divided into request authentication module and high in the clouds authentication module two parts, asks authentication module to be recognized to high in the clouds first
Card module initiates connection request.High in the clouds authentication module may require that request authentication module sends over the identity information of oneself.It is real
In border as shown in Figure 1.Key is produced:Key pair is produced using ECDSA algorithms;By key to producing private key;Private key is by ECDSA
Calculate and produce public key K2, and encryption is put into identity chain, identity chain is the different block chain user of high in the clouds authentication module generation
The block that authentication information is formed, referred to as identity chain;Obtain adding the PIN of timestamp by Hash calculation by K2,
Then it is encoded with bases64;Submit application request to:Including authentication voucher and digital signature.Using private key pair
Request is signed, and this signature is mark head.With public key encryption authentication voucher, will be asked with identifying head type
Information is transmitted by private network, wherein the generation process of mark head is as follows.Produce a unique random number;By random number plus
Enter in request;High in the clouds authentication module receive request authentication module ID authentication request after, first by public key from identity chain
In separate, verify signature validity.Authentication failed message is not returned to if if certification, authentication terminates;Then
Verify the validity of PIN.PIN include timestamp and verification and.Authentication failed message is returned to, identity is recognized
Card terminates;If being verified, the request authentication module can return to a message acknowledgment being verified, while the request
The digital signature information of oneself can be sent to A by authentication module with the identity of request end, and flow is consistent with shown in Fig. 1;And according to
The principle as in chain transaction is added to bit coin block, this certification summary, including block chain authenticating user identification is broadcasted
This authentication can be added high in the clouds by the random number of the summary of voucher, random number and last authentication, nodes
In block, and then it is added in the high in the clouds in network.A is received after the authentication information that B sends according to authentication in practice
The order of the first step is verified to the identity of B, if being verified, can also return to a message acknowledgment being verified, then
This checking is broadcasted, can be also added to the block chain user name of B in the block of high in the clouds by nodes.If certification node is first
Secondary addition network, then need to the authentication high in the clouds safeguarded in network other nodes request download P2P networks to node sheet
Ground.Even if above procedure communicating pair has the side can also not carry out online, it is only necessary to communicate an other side when reaching the standard grade to please
Authenticating party is asked to be authenticated, this mode agrees with P2P network environment needs.The strick precaution of network attack refers to recognizing in identity
Attacker can intercept the data of certification both sides during card, the purpose to reach fraud system transparent to certification both sides.Bit body
Part certification prevents Replay Attack using the high in the clouds authentication module mechanism, can all be wrapped in the certification message that authentication authorization and accounting both sides send
The high in the clouds authentication module at close enough current time is included, and the high in the clouds authentication module of attacker will be relatively distant from
Current time.Man-in-the-middle attack in authentication refer in the middle of attacker certification both sides with the authenticating party at two ends and be certified
Side is authenticated respectively so that authenticating party and the side of being certified will not perceive the attacker of centre.In the present invention, password is will not
Transmit in any form in a network, so as to cannot be intercepted and captured by the 3rd people.If illegal node is wanted to pretend to be the side of being certified to come
Authentication is completed, it is necessary to change the content in the block of high in the clouds, and complete the whole of all blocks after this block again
Workload, this is a huge test for the computing capability of computer, is hardly possible realization in reality.Due to
Introduce high in the clouds mechanism, in network all nodes all can participation certificates authentication procedures each time, prevent from distorting using chain transaction
The proof of work mechanism of transaction record, that high in the clouds most long is safeguarded in a network come reach prevent certification from denying, distort, it is false
The behavior such as emit.The transaction of bit coin is no doubt reliable, but when being applied in authentication, also has some to ask in theory
Topic needs overcome and solve.First, before one-time identity authentication terminates, certification both sides all can by certification summary-advertisement to the whole network,
The problem for being so possible to broadcast storm occur when multiple nodes concurrently carry out authentication.On this problem, bit
Coin designer is exactly the size for reducing block for the solution that big the brought Denial of Service attack of trading volume is proposed
By block size from original without the upper limit, it is changed into having the upper limit, it means that the trading processing ability of bit coin only about per second 7
Pen, but the frequency of authentication should be higher with bit coin trading frequency in network, then in authentication, control
While authentication processed concurrent quantity, it should improve the threshold value of authentication per second, so as in controlling network
Broadcasting amount, reduces while broadcast causes excessive influence on network and also can guarantee that concurrent authentication quantity disclosure satisfy that network area
The demand of block chain user.Bit identity verification scheme is a kind of side for being directly compatible with block chain user name or Email and password
Case.In the present invention, when private key is stored, we are encrypted to prevent unexpected attack or threat using password.Bit identity
The most special place of authentication method is that password can be transmitted in a network by any way in no instance.Using this
Mechanism, block chain user still can be verified using block chain username and password, but be decrypted using password locally
Private key, is then gone to sign ID authentication request with private key.Key is produced to for authentication number based on ECDSA algorithms
Word is signed, and before authentication starts, the node being added in network needs first to download a high in the clouds copy to local data
In storehouse, authentication is then proceeded by again.The basic procedure of bit authentication is described, then to present system characteristic
Analyzed.Trust in invention in addition refers to that will not be led to by malefactor using certain technological means protection network platform
Crossing direct physical access means carries out malicious operation.Ensure that the credible most straightforward approach of the network platform is to login system
Block chain user carry out authentication, communicating pair needs the both sides to carry out two-way authentication before being communicated in the P2P networks.
The present invention carries out logic analysis carrying out formalized description to authentication to its security, finally calculates authentication
Confidence level, algorithm and step in this confidence level computing system is given below.Access entity refers to the object of certification request,
Only certification is by just allowing and accessed object communication.Service Ticket is used before referring to access entity and accessed object communication
To prove the digital evidence of oneself identity.Authentication mechanism refers to the methods that Service Ticket is produced and verified:High in the clouds certification
Module refers to the functional unit of administrative authentication voucher.Authentication module refers to the functional unit of authentication verification voucher.Body
Part relying party refers to the functional unit that its behavior operation depends on authentication module result, it may be possible to authorized component.
Authentication domain refers to an authentication part in same administration authority border.Authentication mechanism, high in the clouds
Authentication module, authentication module and access entity because its in the presence of uncertainty may influence whether identity authentication result can
Reliability.The uncertainty of wherein authentication mechanism shows as certification authority may be cracked, and such as some AESs are cracked, this
Certification authority will be caused compromised;The uncertainty of high in the clouds authentication module shows the tightness of management aspect, and management is not
The problems such as certainty may result in that Service Ticket is compromised, be forged;The uncertainty of authentication module is mainly manifested in
Whether information system and authentication protocol safe and reliable, this will cause Service Ticket be stolen leakage or be forged;Access entity
Uncertainty refers to that visitor is not necessarily reliable, the storage of certification authority whether safety etc., this will cause certification authority to be stolen to let out
Reveal, attacked or be held as a hostage.Various uncertain factors in identity-based verification process, by the element of trust of authentication point
It is following 3 class:Ensure that Service Ticket is not compromised, be denoted as 1 class.Ensure that Service Ticket is not forged, be denoted as 2 classes.Ensure certification
Voucher is not held as a hostage, and is denoted as 3 classes.The insincere factor is which kind of uncertain factor causes to recognize in key object in authentication procedures
The influence degree of the generations such as compromised voucher, forgery or abduction is demonstrate,proved, NOCONFIDENCE, the insincere factor of key object is denoted as
Can represent that wherein x represents the insincere factor of 1 class of object with NOCONFIDENCE ()=(x, y, z), Y represents the 2 of object
The insincere factor of class, z represents the insincere factor of 3 classes.But comprehensive several significant uncertain factors, analysis assumes theirs
Uncertainty, then calculates the trust value of authentication, can judge high in the clouds authentication with degree of safety, confidence level substantially
Confidence level.Degree of safety refers to the possibility that key object ensures that certification authority is not compromised, is not forged or is not held as a hostage, uses
Probability is represented.Confidence level is the method trusted for quantificational expression.In authentication mode, can in fixed authentication domain
To represent the security of authentication mode by the degree of belief between computing system entity, equally represented with probability.Confidence level point
It is Service Ticket confidence level, authentication secret confidence level, digital entities confidence level, physical entity confidence level.But due to high in the clouds and visitor
Communication between the end of family is influenceed by many uncertain factors, causes the result of authentication service not absolute confidence.
Embodiment two, as shown in Figure 1:In practice by from can with the authentication based on dynamic password and public-key cryptosystem
Reliability Analysis are calculated and authentication Analysis on confidence of the present invention based on high in the clouds is calculated, and both result of calculations are compared
Compared with advantage of the analysis present invention in terms of confidence level.Step is:Setting authentication mechanism, Service Ticket is by body after public key and encryption
Part mark and block chain user password composition;Dynamic password is randomly generated;By the block chain user password for comparing storage;High in the clouds
Authentication module:Distribution block chain ID is to access entity;Authentication module:The public key distributed using elliptic curve systems
Private key carries out key authentication, so authentication-access entity legitimacy;Request authentication module:Using public key encryption identity.
Authentication mechanism:Service Ticket is made up of identity after public key and encryption and block chain user password;Digital signature keys are by ECC
Algorithm is produced;By verifying digital signature validity and the whole network node participation certificates;High in the clouds authentication module:Identity information is not
It is single to be present in certain authentication server database, but all node local datas in being present in network in the form of the high in the clouds
Storehouse, and store be authentication voucher summary, useful identity information can't be revealed;Authentication module:Each
Node can serve as authentication module, is authenticated using digital signature authentication method;Request authentication module:Key by
ECDSA algorithms are produced, and private key is preserved by requests verification side with password encryption, needs to be decrypted with password during using private key signature.It is logical
Cross the confidence level result that uncertain factor system degree of belief computational methods utilized above draw to show, uncertain factor includes identity
Certain uncertain factor causes compromised Service Ticket, forgery or abduction etc., present system in key object in verification process
Authentication Reliability ratio now the existing authentication based on dynamic password and elliptic curve it is with a high credibility, also thus demonstrate,prove
The validity of bright present invention work.
The present invention can have the specific embodiment of various multi-forms, above by taking Fig. 1 as an example with reference to accompanying drawing to of the invention
Technical scheme explanation for example, the present invention will be described in detail.It should be noted that specific embodiment described herein
Only it is used to explain the present invention, is not intended to limit the present invention, can realizes that the product of said function belongs to equivalent and improvement,
It is included within protection scope of the present invention.
The beneficial effects of the invention are as follows:Part I is by the embedded NFC of block chain of particular design, in this design
In, NFC is no longer electronic plaintext display label, but the whole world by rivest, shamir, adelman guarantee is unique
Electronic tag, simultaneously for can carry out false distinguishing checking by regular handset for block chain user;Part II is
VeChain block chain network information Stores, after being verified by the true and false, mobile terminal application will be to distributed in special block chain
The product information of storage is read out, and these information can include all information of commodity design, production, logistics, sale etc., with
Reach the supply chain all-transparent to manufacturing enterprise, marketing channel, supervision department and final block chain user;Part III is directed to
The merchandise control of production enterprise and distribution platform, this platform will can cause that manufacturing enterprise's issue extremely easily and effectively is newly produced
Product, and increase the social public credibility of manufacturing enterprise.Therefore, it can be said that by it is this be achieved in that it is necessary.
Claims (1)
1. a kind of block chain real time polling cloud system, it is characterised in that:Including:Client database, authentication module, please
Ask authentication module, transport module, timestamp module, base station stored system, high in the clouds authentication module, base station poll exchange system;
In P2P networks, the base station poll exchange system receives the band of position and the identity information of block chain user;According to institute
State the area that the mark of the block chain user carried in the band of position and identity information has been stored from the base station stored system
In the information of block chain user, the block chain ID for inquiring about the block chain user is gone to correspond to high in the clouds authentication information, and handle is looked into
The result ask returns to the block chain user, obtains the high in the clouds authentication information of the block chain user, while the base station
To in the client database, the copy includes query process, inquiry mode, inquiry ground to a copy of storage system storage
Location, query time information;
The high in the clouds authentication module refers to the functional unit of administrative authentication information;The authentication module refers to checking and recognizes
The functional unit of card information;The request authentication module refers to sending authentication information to the cloud from the authentication module
Hold the functional unit of authentication module;
The high in the clouds authentication module collects all of block under each region that the base station poll exchange system is managed
The high in the clouds authentication information of chain user;According to all of block under each region that the base station poll exchange system is managed
Chain user high in the clouds authentication information generation block chain user high in the clouds authentication information array, be used to reduce certification it is concurrent when amount of calculation,
And store block chain user high in the clouds authentication information array to the high in the clouds authentication module;Block chain user is inquired by described
The band of position of high in the clouds authentication information is sent to the block chain user, notifies that the block chain user comes into corresponding base
Stand the compass of competency of poll exchange system;
Wherein, the high in the clouds authentication module collects the base station poll exchange system and manages all of area under each region
The step of block chain user high in the clouds authentication information, is specially:
The base station poll exchange system timing sends the position area to all of block chain user to request authentication module
Domain and the jurisdictions mandate of identity information;
The authentication module sends authentication acquisition request to its local described block chain user is in;
The block chain user under the authentication module is by the transport module directly to the high in the clouds authentication module
Return to the band of position and the high in the clouds authentication information of oneself;And in return information, according to the high in the clouds authentication module module
Addition mark, prevents both sides from denying, and the block chain user for returning is added to the node in network, while the block chain
User needs first from a copy of the base station stored system downloads to the client database, then start again into
Row authentication;
The base station stored system stores the band of position and high in the clouds authentication information to be included:The band of position and identity are believed
Breath is stored with many helical structures;Wherein, many helical structures include:Form single with the row that are designated of the band of position
Chained list, and each area identification is associated as well to a circular linked list, the circular linked list is included and belongs to the block chain user's
The high in the clouds authentication information, so as to form complete block chain;
Verification process is divided into described request authentication module and described high in the clouds authentication module two parts, request authentication module described first
Connection request is initiated to the high in the clouds authentication module;The high in the clouds authentication module may require that it is described request authentication module by oneself
Identity information is sended over;
The authentication starts to produce key pair by ECDSA, obtains private key;Public key is calculated with private key,
And calculate PIN with by public key;Private key is carried out into ECDSA random hash and draws public key, with this
Simultaneously, it is impossible to allow public key to calculate private key, it is described that PIN is calculated by public key, and bit coin address is provided as, then
Public key is carried out into SHA256 Hash calculations, identity request information is signed and encrypted with private key is put into all of block chain use
In the identity chain of family high in the clouds authentication information, the identity chain is that the different block chain of the high in the clouds authentication module generation is used
The block chain that family authentication information is formed;Then obtain adding the individual of the high in the clouds authentication module by Hash calculation by public key
Identification code, it is encoded with bases64;
The last request authentication module submits application request, including authentication voucher and digital signature, the high in the clouds certification to
Module is signed to request, and the signature is used as mark head;With block chain authenticating user identification voucher described in public key encryption,
Solicited message is transmitted by private network in the form of the mark head;
The high in the clouds authentication module receive it is described request authentication module ID authentication request after, first by public key from identity chain
In separate, verify signature validity;Authentication failed message is not returned to if if certification, authentication terminates;Then
Verify PIN validity, the PIN include timestamp and verification with, if authentication failed, authentication
Terminate;If being verified, the request authentication module can return to a message acknowledgment being verified, while the request is recognized
The digital signature information of oneself can be sent to the high in the clouds authentication module by card module with the identity of request end, and broadcast this hair
The summary for sending, including block chain authenticating user identification voucher summary, the random number of random number and last authentication, P2P
During this authentication can be added the high in the clouds authentication module by nodes by the transport module, and then it is added to
In the client database in P2P networks;
The high in the clouds authentication module asks certification mould after receiving the authentication information that the request authentication module is sent to described
The identity of block is verified, if being verified, can also return to a message acknowledgment being verified, and then broadcasts this checking,
Can be also added to the block chain user name of the request authentication module in the block of high in the clouds by P2P nodes;If certification node
It is to add network for the first time, then need the authentication high in the clouds for downloading maintenance in P2P networks to network other nodes request to arrive
Node is local, even if the above procedure block chain authenticating user identification both sides have the side can also not carry out online, it is only necessary to
The high in the clouds authentication module is authenticated when reaching the standard grade to the authentication module;
The high in the clouds authentication module and the data of certification both sides can be intercepted during the block chain authenticating user identification, it is right
Certification both sides are transparent;If illegal node is wanted to pretend to be the side of being certified to complete authentication, it is necessary to change the corresponding block in high in the clouds
In content, and whole calculation process of all blocks after this block are completed again, due to the high in the clouds authentication module
Calculating, in network all nodes all can participation certificates authentication procedures each time, prevent from distorting transaction note using chain transaction
The proof of work mechanism of record, and prevent certification from denying, distort, the behavior such as palm off to reach;
The base station poll exchange system includes access entity, Service Ticket, authentication mechanism, identity relying party, authentication domain
Component is operated;
The access entity refers to the object of certification request, and only certification is by just allowing and accessed object communication;
The Service Ticket is referred to before access entity and accessed object communication for proving the digital evidence of oneself identity;
The authentication mechanism refers to the methods that Service Ticket is produced and verified;
The identity relying party refers to the functional unit that its behavior operation depends on authentication module result, it may be possible to
Authorized component;
The authentication domain refers to an authentication part in same administration authority border;
Base station poll exchange system effect be the block chain user determine in identity-based verification process it is various not
Determine factor, the element of trust of authentication is divided into 3 classes:Ensure that the Service Ticket is not compromised, be denoted as 1 class;Ensure institute
State Service Ticket not to be forged, be denoted as 2 classes;Ensure that the Service Ticket is not held as a hostage, be denoted as 3 classes;The block chain user exists
Because certain uncertain factor causes compromised Service Ticket, forgery or kidnaps in authentication procedures in identity-based verification process
Deng the influence degree of generation, referred to as NOCONFIDENCE, the block chain user described in identity-based verification process certain
Uncertain factor causes that Service Ticket is compromised, forge or the influence degree of generation such as kidnap can use NOCONFIDENCE ()
=(x, y, z) represents that wherein x represents 1 class element of trust of object, and y represents 2 class element of trusts of object, and z represents the letter of 3 classes
Appoint element, Service Ticket quilt is caused by the block chain user certain uncertain factor described in identity-based verification process
The several significant uncertain factor of influence degrees NOCONFIDENCE () of generation such as leakage, forgery or abduction, analysis is assumed
Uncertainty of the block chain user in identity-based verification process, then calculates the trust value of authentication, with safety
Degree, confidence level judge the confidence level of high in the clouds authentication;
The degree of safety refers to the possibility that key object ensures that certification authority is not compromised, is not forged or is not held as a hostage,
Represented with probability;The confidence level is the method trusted for quantificational expression;In authentication mode, in fixed authentication
The security of authentication mode can be represented in domain by the degree of belief between computing system entity, is equally represented with probability;Institute
State confidence level and be divided into Service Ticket confidence level, authentication secret confidence level, digital entities confidence level, physical entity confidence level.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710121982.3A CN106878318B (en) | 2017-03-03 | 2017-03-03 | Block chain real-time polling cloud system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710121982.3A CN106878318B (en) | 2017-03-03 | 2017-03-03 | Block chain real-time polling cloud system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106878318A true CN106878318A (en) | 2017-06-20 |
CN106878318B CN106878318B (en) | 2020-01-07 |
Family
ID=59169605
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710121982.3A Active CN106878318B (en) | 2017-03-03 | 2017-03-03 | Block chain real-time polling cloud system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106878318B (en) |
Cited By (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107295002A (en) * | 2017-07-12 | 2017-10-24 | 联动优势科技有限公司 | The method and server of a kind of high in the clouds data storage |
CN107786553A (en) * | 2017-10-23 | 2018-03-09 | 江苏通付盾科技有限公司 | Identity identifying method, server and system based on proof of work |
CN108376336A (en) * | 2018-02-11 | 2018-08-07 | 思力科(深圳)电子科技有限公司 | It is suitble to the RFID label chip and its control method of block chain application |
CN108900531A (en) * | 2018-07-31 | 2018-11-27 | 温州市图盛科技有限公司 | A kind of data confidentiality tool suitable for electric power enterprise internal network |
CN109033859A (en) * | 2018-08-03 | 2018-12-18 | 苏州市千尺浪信息科技服务有限公司 | A kind of information security storage system based on block chain technology |
CN109087063A (en) * | 2018-07-23 | 2018-12-25 | 浪潮软件股份有限公司 | A kind of whole process electronization supervision and check method based on block chain |
CN109218268A (en) * | 2017-07-05 | 2019-01-15 | 中国银联股份有限公司 | Safety data interactive system and method based on block chain structure |
CN109327482A (en) * | 2018-12-18 | 2019-02-12 | 陕西医链区块链集团有限公司 | P2P communication introduces the data transfer mode of the anti-fake and asymmetrical encryption of authentication |
CN109360008A (en) * | 2018-11-20 | 2019-02-19 | 吴祥富 | Product anti-counterfeiting electronic label and product anti-counterfeiting certification update method and system |
WO2019047631A1 (en) * | 2017-09-07 | 2019-03-14 | 京信通信系统(中国)有限公司 | Blockchain-based micro-base station communication management method, system and device |
CN109544182A (en) * | 2018-11-20 | 2019-03-29 | 孟凡富 | Product false proof verification method and system |
CN109639714A (en) * | 2019-01-02 | 2019-04-16 | 浙江师范大学 | A kind of Internet of Things identity registration and verification method based on block chain |
CN110290108A (en) * | 2019-05-17 | 2019-09-27 | 深圳市网心科技有限公司 | Data processing method, system and related equipment in a block chain network |
CN110348847A (en) * | 2018-04-04 | 2019-10-18 | 触信(厦门)智能科技有限公司 | A kind of information transmitting methods based on panorama VR block chain |
CN110517045A (en) * | 2019-10-22 | 2019-11-29 | 百度在线网络技术(北京)有限公司 | Block chain data processing method, device, equipment and storage medium |
CN110610418A (en) * | 2018-06-15 | 2019-12-24 | 翟红鹰 | Transaction state query method, system, device and storage medium based on block chain |
CN111553710A (en) * | 2020-04-08 | 2020-08-18 | 深圳壹账通智能科技有限公司 | Enterprise data processing method, device, equipment and storage medium based on block chain |
CN112311779A (en) * | 2020-10-22 | 2021-02-02 | 腾讯科技(深圳)有限公司 | Data access control method and device applied to block chain system |
CN113015995A (en) * | 2018-11-13 | 2021-06-22 | 社理透高头 | Contract terminal and contract signing method using block chain mode of digital content original confirmation key |
CN115118465A (en) * | 2022-06-13 | 2022-09-27 | 北京寰宇天穹信息技术有限公司 | Cloud edge-side cooperative zero trust access control method and system based on trusted label |
CN116205735A (en) * | 2023-02-27 | 2023-06-02 | 平安科技(深圳)有限公司 | Block chain-based transaction polling method, device, equipment and medium |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101411134A (en) * | 2006-03-31 | 2009-04-15 | 高通股份有限公司 | Memory management for high speed media access control |
CN105323064A (en) * | 2014-07-01 | 2016-02-10 | 柯呈翰 | System and method for adding real-time file dynamic tags and encryption online |
CN106372940A (en) * | 2016-08-31 | 2017-02-01 | 江苏通付盾科技有限公司 | Identity authentication method based on block chain network, server and terminal device |
US20170061398A1 (en) * | 2014-06-19 | 2017-03-02 | Jim Austin Joseph | Cryptographic currency block chain based voting system |
-
2017
- 2017-03-03 CN CN201710121982.3A patent/CN106878318B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101411134A (en) * | 2006-03-31 | 2009-04-15 | 高通股份有限公司 | Memory management for high speed media access control |
US20170061398A1 (en) * | 2014-06-19 | 2017-03-02 | Jim Austin Joseph | Cryptographic currency block chain based voting system |
CN105323064A (en) * | 2014-07-01 | 2016-02-10 | 柯呈翰 | System and method for adding real-time file dynamic tags and encryption online |
CN106372940A (en) * | 2016-08-31 | 2017-02-01 | 江苏通付盾科技有限公司 | Identity authentication method based on block chain network, server and terminal device |
Cited By (31)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109218268A (en) * | 2017-07-05 | 2019-01-15 | 中国银联股份有限公司 | Safety data interactive system and method based on block chain structure |
CN107295002B (en) * | 2017-07-12 | 2020-06-19 | 联动优势科技有限公司 | Cloud data storage method and server |
CN107295002A (en) * | 2017-07-12 | 2017-10-24 | 联动优势科技有限公司 | The method and server of a kind of high in the clouds data storage |
WO2019047631A1 (en) * | 2017-09-07 | 2019-03-14 | 京信通信系统(中国)有限公司 | Blockchain-based micro-base station communication management method, system and device |
CN107786553A (en) * | 2017-10-23 | 2018-03-09 | 江苏通付盾科技有限公司 | Identity identifying method, server and system based on proof of work |
CN108376336B (en) * | 2018-02-11 | 2021-02-05 | 莫冰 | RFID tag chip suitable for block chain application and control method thereof |
CN108376336A (en) * | 2018-02-11 | 2018-08-07 | 思力科(深圳)电子科技有限公司 | It is suitble to the RFID label chip and its control method of block chain application |
CN110348847A (en) * | 2018-04-04 | 2019-10-18 | 触信(厦门)智能科技有限公司 | A kind of information transmitting methods based on panorama VR block chain |
CN110610418A (en) * | 2018-06-15 | 2019-12-24 | 翟红鹰 | Transaction state query method, system, device and storage medium based on block chain |
CN109087063A (en) * | 2018-07-23 | 2018-12-25 | 浪潮软件股份有限公司 | A kind of whole process electronization supervision and check method based on block chain |
CN108900531A (en) * | 2018-07-31 | 2018-11-27 | 温州市图盛科技有限公司 | A kind of data confidentiality tool suitable for electric power enterprise internal network |
CN109033859A (en) * | 2018-08-03 | 2018-12-18 | 苏州市千尺浪信息科技服务有限公司 | A kind of information security storage system based on block chain technology |
CN113015995A (en) * | 2018-11-13 | 2021-06-22 | 社理透高头 | Contract terminal and contract signing method using block chain mode of digital content original confirmation key |
CN113015995B (en) * | 2018-11-13 | 2024-06-07 | 社理透高头 | Blockchain-based contract terminal and contract signing method for confirming keys using digital content originals |
CN109544182A (en) * | 2018-11-20 | 2019-03-29 | 孟凡富 | Product false proof verification method and system |
CN109360008A (en) * | 2018-11-20 | 2019-02-19 | 吴祥富 | Product anti-counterfeiting electronic label and product anti-counterfeiting certification update method and system |
CN109544182B (en) * | 2018-11-20 | 2021-05-14 | 孟凡富 | Product anti-counterfeiting verification method and system |
CN109327482A (en) * | 2018-12-18 | 2019-02-12 | 陕西医链区块链集团有限公司 | P2P communication introduces the data transfer mode of the anti-fake and asymmetrical encryption of authentication |
CN109639714B (en) * | 2019-01-02 | 2021-06-15 | 浙江师范大学 | A blockchain-based IoT identity registration and verification method |
CN109639714A (en) * | 2019-01-02 | 2019-04-16 | 浙江师范大学 | A kind of Internet of Things identity registration and verification method based on block chain |
CN110290108A (en) * | 2019-05-17 | 2019-09-27 | 深圳市网心科技有限公司 | Data processing method, system and related equipment in a block chain network |
CN110517045A (en) * | 2019-10-22 | 2019-11-29 | 百度在线网络技术(北京)有限公司 | Block chain data processing method, device, equipment and storage medium |
CN111553710A (en) * | 2020-04-08 | 2020-08-18 | 深圳壹账通智能科技有限公司 | Enterprise data processing method, device, equipment and storage medium based on block chain |
WO2021203590A1 (en) * | 2020-04-08 | 2021-10-14 | 深圳壹账通智能科技有限公司 | Blockchain-based enterprise data processing method and apparatus, device, and storage medium |
CN111553710B (en) * | 2020-04-08 | 2022-09-02 | 深圳壹账通智能科技有限公司 | Enterprise data processing method, device, equipment and storage medium based on block chain |
CN112311779A (en) * | 2020-10-22 | 2021-02-02 | 腾讯科技(深圳)有限公司 | Data access control method and device applied to block chain system |
CN112311779B (en) * | 2020-10-22 | 2023-06-30 | 腾讯科技(深圳)有限公司 | Data access control method and device applied to block chain system |
CN115118465A (en) * | 2022-06-13 | 2022-09-27 | 北京寰宇天穹信息技术有限公司 | Cloud edge-side cooperative zero trust access control method and system based on trusted label |
CN115118465B (en) * | 2022-06-13 | 2023-11-28 | 北京寰宇天穹信息技术有限公司 | Cloud edge end cooperative zero trust access control method and system based on trusted label |
CN116205735A (en) * | 2023-02-27 | 2023-06-02 | 平安科技(深圳)有限公司 | Block chain-based transaction polling method, device, equipment and medium |
CN116205735B (en) * | 2023-02-27 | 2025-09-02 | 平安科技(深圳)有限公司 | Blockchain-based transaction polling method, device, equipment, and medium |
Also Published As
Publication number | Publication date |
---|---|
CN106878318B (en) | 2020-01-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106878318A (en) | A kind of block chain real time polling cloud system | |
CN112487778B (en) | Multi-user online signing system and method | |
CN111046352B (en) | A blockchain-based identity information security authorization system and method | |
EP3661120B1 (en) | Method and apparatus for security authentication | |
CN106789090B (en) | Blockchain-based public key infrastructure system and semi-random joint certificate signature method | |
JP3595109B2 (en) | Authentication device, terminal device, authentication method in those devices, and storage medium | |
CN103679436B (en) | A kind of electronic contract security system and method based on biological information identification | |
CN108768652B (en) | Coalition block chain bottom layer encryption method capable of resisting quantum attack | |
Babu et al. | Robust authentication protocol for dynamic charging system of electric vehicles | |
US20190305955A1 (en) | Push notification authentication | |
CN104798083B (en) | Method and system for authenticating access requests | |
CN112953727A (en) | Internet of things-oriented equipment anonymous identity authentication method and system | |
CN111464980A (en) | Electronic evidence obtaining device and method based on block chain in Internet of vehicles environment | |
Roh et al. | A study on electronic voting system using private blockchain. | |
CN113472521A (en) | Block chain-based real-name digital identity management method, signature device and verification device | |
JP2005223924A (en) | Opinion registration application for universal pervasive transaction framework | |
CN110309663B (en) | Privacy authentication method and system based on block chain | |
CN104767731A (en) | Identity authentication protection method of Restful mobile transaction system | |
CN105207776A (en) | Fingerprint authentication method and system | |
CN113468570A (en) | Private data sharing method based on intelligent contract | |
CN109687965A (en) | The real name identification method of subscriber identity information in a kind of protection network | |
Kravitz | Transaction immutability and reputation traceability: Blockchain as a platform for access controlled iot and human interactivity | |
CN114091009B (en) | Method for establishing safety link by using distributed identity mark | |
CN110505055A (en) | Based on unsymmetrical key pond to and key card outer net access identity authentication method and system | |
Wang et al. | An Efficient Data Sharing Scheme for Privacy Protection Based on Blockchain and Edge Intelligence in 6G‐VANET |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB03 | Change of inventor or designer information | ||
CB03 | Change of inventor or designer information |
Inventor after: Lu Yang Inventor before: Qian Dejun |
|
TA01 | Transfer of patent application right | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20170920 Address after: 200040, 4 floor, building 546, 4 Yuyuan Road, Jingan District, Shanghai Applicant after: Shanghai chain Mdt InfoTech Ltd Address before: 200131 Shanghai Fengxian District Shanghai free trade experimentation area, plus Road 39, 1, four, 39 parts Applicant before: Qian Dejun |
|
GR01 | Patent grant | ||
GR01 | Patent grant |