CN109242511A - Bridge security source tracing method and system based on block chain - Google Patents

Bridge security source tracing method and system based on block chain Download PDF

Info

Publication number
CN109242511A
CN109242511A CN201810964134.3A CN201810964134A CN109242511A CN 109242511 A CN109242511 A CN 109242511A CN 201810964134 A CN201810964134 A CN 201810964134A CN 109242511 A CN109242511 A CN 109242511A
Authority
CN
China
Prior art keywords
block
bridge
information
block chain
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810964134.3A
Other languages
Chinese (zh)
Inventor
黄士源
于月
于万钧
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Institute of Technology
Original Assignee
Shanghai Institute of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Institute of Technology filed Critical Shanghai Institute of Technology
Priority to CN201810964134.3A priority Critical patent/CN109242511A/en
Publication of CN109242511A publication Critical patent/CN109242511A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • G06Q30/0185Product, service or business identity fraud
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/08Construction

Landscapes

  • Business, Economics & Management (AREA)
  • Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Economics (AREA)
  • Engineering & Computer Science (AREA)
  • Marketing (AREA)
  • General Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Human Resources & Organizations (AREA)
  • Tourism & Hospitality (AREA)
  • Primary Health Care (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Accounting & Taxation (AREA)
  • Development Economics (AREA)
  • Finance (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The present invention provides a kind of bridge security source tracing method and system based on block chain, this method, comprising: receives the inquiry request that user sends, includes: the terminal iidentification, identity information, content to be checked of user in the inquiry request;The user includes: construction party, monitoring party, administrative personnel;Determine search access right corresponding to the identity information in the inquiry request;According to the search access right, the information being recorded in target block is sent to the terminal of the user.The present invention can record a series of processes such as construction, examination, the maintenance of bridge by block, guarantee the authenticity of data, the data of record within a block can not distort, so that process more transparence of the bridge from construction to examination, guarantee bridge construction quality, relevant departments is facilitated to be supervised.

Description

Bridge security source tracing method and system based on block chain
Technical field
The present invention relates to technical field of data processing, and in particular, to bridge security source tracing method based on block chain and System.
Background technique
Important component of the bridge as highway, be directly related to the safety of driving with it is unimpeded.However, various countries in recent years The bridge collapse accident occurred in succession causes the highest attention of national governments and world's science of bridge building circle.Science of bridge building structure peace The problems such as full property and reliability and its technology being related to, all have become world today's bridge circle focus of attention.
Block chain is a kind of shared account book technology, is used as bottom architecture, has distributed, open and clear property, can not usurp The characteristics of modified, collective's maintenance and secret protection.Block chain technology uses the chain structure storing data with timestamp, increases Time dimension makes data have extremely strong verifiability and trackability.Successively ring ring connects each block in block chain, shape At a longest main chain of the block since most to current block, to have recorded the complete information of block data, Neng Gouti For the function of tracing to the source of block chain data, arbitrary data can be traced to source by this chain structure.
Summary of the invention
For the defects in the prior art, the object of the present invention is to provide a kind of bridge security sides of tracing to the source based on block chain Method and system.
In a first aspect, the embodiment of the present invention provides a kind of bridge security source tracing method based on block chain, comprising:
Receive the inquiry request that user sends, include: in the inquiry request terminal iidentification of user, identity information, to The content of inquiry;The user includes: construction party, monitoring party, administrative personnel;
Determine search access right corresponding to the identity information in the inquiry request;
According to the search access right, the information being recorded in target block is sent to the terminal of the user.
Optionally, before receiving the inquiry request that user sends, further includes:
Construct block chain network, wherein the participation node in the block chain network includes: bridge responsible person, raw material Supplier, construction personnel, inspector, maintenance personnel;
In the construction, examination, maintenance phase of bridge, the different bridge information for participating in nodes and uploading are received, and by the bridge Beam information is recorded in target block;The bridge information includes: variety of raw material, manufacturer, supplier, specification, product The quality certification, construction personnel's name, commencement date, inspector's name, date of inspection and receipt, check and acceptance result, maintenance personnel's name, maintenance Date, maintenance result;
Wherein, hash value, the timestamp, previous block of current goal block are had recorded in the block head of the target block Hash value.
Optionally, described to receive the different bridge information for participating in node and uploading, and the bridge information is recorded in target In block, comprising:
Public key, the identity information of all participation nodes publication in the block chain network are received, and by the public key, body Part information package is at original block;Wherein, had recorded in the block head of the original block current original block hash value, when Between stamp, previous block hash value;
All participation nodes original block being sent in the block chain network;
All participation nodes in the block chain network are obtained to the verification result of the original block;
If the verification result of the original block is to pass through, the private key encryption that different participation nodes pass through itself is received The bridge information is recorded in target block by bridge information.
Optionally, according to the search access right, the information being recorded in target block, packet are sent to the user terminal It includes:
To the terminal of user send the participation node of content to be checked described in typing public key and the target block, So that the terminal of user is decrypted the information being recorded in target block according to the private key of itself.
Optionally, the inquiry request that user sends is received, comprising:
User terminal by scan for inquiries two dimensional code, or on official website register account number mode, trace to the source to bridge security Platform sends inquiry request.
Second aspect, the embodiment of the present invention provides a kind of bridge security traceability system based on block chain, using first party Based on the bridge security source tracing method of block chain described in any one of face, comprising: data Layer, network layer, common recognition layer, contract Layer and application layer;Wherein:
Timestamp is added for being packaged to the block generated in block chain network in the data Layer within a block, and According to preset Encryption Algorithm, record the information in block;
The network layer, for being arranged and executing to the administrative mechanisms for participating in node all in block chain network, the pipe Reason mechanism includes: the information publication, information reception and Information Authentication completed to node is participated in;
The common recognition layer, for encapsulating to the common recognition algorithms for participating in node all in block chain network;
The contract layer, for being embedded in the relevant laws and regulations and management rules of bridge in the block of block chain network;
The application layer is supported for providing application to all participation nodes.Compared with prior art, the present invention has such as Under the utility model has the advantages that
Bridge security source tracing method and system provided by the invention based on block chain, can recorde the construction of bridge, tests A series of processes such as receipts, maintenance are participated in by the identity using Internet of Things, sensor, RFID technique by all engineerings Person (construction party, inspector, maintenance person etc.) records data in real time within a block, guarantees the authenticity of data, record is within a block Data can not distort so that bridge from construction to examination process more transparence, guarantee bridge construction quality, Relevant departments are facilitated to be supervised.
Detailed description of the invention
Upon reading the detailed description of non-limiting embodiments with reference to the following drawings, other feature of the invention, Objects and advantages will become more apparent upon:
Fig. 1 is the principle architecture diagram that the bridge security based on block chain is traced to the source;
Fig. 2 is the schematic illustration of elliptic curve encryption algorithm.
Specific embodiment
The present invention is described in detail combined with specific embodiments below.Following embodiment will be helpful to the technology of this field Personnel further understand the present invention, but the invention is not limited in any way.It should be pointed out that the ordinary skill of this field For personnel, without departing from the inventive concept of the premise, several changes and improvements can also be made.These belong to the present invention Protection scope.
Bridge security, which is traced to the source, can be mainly reflected in four aspects:
1) raw material itself specifically include that variety of raw material, manufacturer, supplier, specification, work certificate, transport Storing process etc., for example build reinforcing bar used in bridge, grade can generally use Q345 or more, to the impact flexibility of reinforcing bar, Fatigue behaviour require it is all very high, including reinforcing bar transport, should prevent in storing process corrosion, pollution and deformation etc. require into Row real-time tracing and record;
2) work progress specifically includes that name, time, step of operator etc.;
3) course of receiving, specifically include that inspector, reception time, check and accept conclusion etc.;
4) maintenance record specifically includes that maintenance personnel, curing time, maintenance result etc..
The participant of bridge construction mainly includes three classes:
1) source-information of raw material can construction party: be checked.
2) letter such as raw material information, work progress information, course of receiving information and maintenance record can management side: be inquired Breath.
3) source-information, each link information in work progress, the course of receiving of raw material can administrative personnel: be inquired In information and maintenance record information.Different participants can inquire corresponding information according to the permission of oneself.
Specifically, Fig. 1 is the principle architecture diagram that the bridge security based on block chain is traced to the source, as shown in Figure 1, construction department, Respective construction archives are recorded in block chain by acceptance check department, maintenance department by block chain network.Then, construction party, prison Reason side, administrative personnel can pass through block chain query to entire bridge construction, examination, the data for conserving the stage.
In addition, the bridge security traceability system provided by the invention based on block chain, may include: data Layer, network layer, Common recognition layer, contract layer and application layer;Wherein: the data Layer, for being sealed to the block generated in block chain network Dress, is added timestamp, and according to preset Encryption Algorithm, record the information in block within a block;The network layer, is used for It is arranged and executes to the administrative mechanisms for participating in node all in block chain network, the administrative mechanism includes: to complete to save participation The information publication of point, information receives and Information Authentication;The common recognition layer saves participations all in block chain network for encapsulating The common recognition algorithm of point;The contract layer, for being embedded in the relevant laws and regulations and management rules of bridge in the block of block chain network; The application layer is supported for providing application to all participation nodes.
Specifically, bottom data is recorded from manufacturer, contact method, product quality certificate of raw material etc., The data of data Layer are packaged according to the format of block, and timestamp is added to data block, is remembered data by Encryption Algorithm Record is added in block chain.Network layer is by peer to peer network mechanism, data authentication mechanism, network insertion management, using distribution Formula networking mechanism makes data distribution in different node databases.The common recognition some common recognition algorithms of layer predominant package, introduce relevant Block chain is added as node is participated in common recognition mechanism, national government supervision department, construction party, masses etc..Contract layer will " country's prison Pipe regulations ", the laws and regulations such as " Regulations on Quality Management of Construction Projects " are embedded in block chain in the form of intelligent contract.Application layer Node with information is participated in supervision department, masses etc. the supportings such as to trace to the source.
Bridge security source tracing method and system provided by the invention based on block chain, can process of construction to bridge into It has gone effective management, has had recorded the key message in each stage in process of construction, can not only find the problem in time, Er Qiefa Existing problem can trace back to specific time and person liable, save the cost of processing problem, improve the effect of accident investigation solution Rate.The problem in process of construction is found and solved by a series of measures, is realized the raising of bridge quality safety, is being built Also helping in the process enhances each sense of duty for participating in unit, so that process of construction is more transparent.
Specifically, the timestamp in block chain is when obtaining the participation node that record is weighed to cover in active data area build Between stab, show the write time of block data.Therefore, each block on block chain is arranged successively sequentially in time.When Between stamp can be used as the existence proof of block data, form the database that can not be distorted, can not forge, mentioned for tracing to the source for bridge For more acurrate transparent information.
Specifically, the rivest, shamir, adelman that block chain applies to is to meet security requirement and data origin authentication need It asks.Rivest, shamir, adelman refers to uses two asymmetrical passwords: public key and private key during encryption and decryption.Work as ginseng After the one of cipher key encryption information of node, only can just it be unlocked with another corresponding key.Public key is to owner's public affairs It opens, and private key is secrecy, corresponding private key can not be extrapolated by public key, which ensures that the safeties of information.Meeting simultaneously Certain rule is set in information document, when participating in node visit bridge information, needs to input its key, system can basis Its permission possessed shows its visible information.
Bridge responsible person, raw material supplier, construction party, inspector, maintenance person etc. participate in node can be on block chain Carry out typing or query information.When participation node A, which wants Safety query participation node B, is recorded in the information on block chain, The Encryption Algorithm of use is ECC elliptic curve encryption algorithm.Fig. 2 is the schematic illustration of elliptic curve encryption algorithm, such as Fig. 2 institute Show, node A establishes elliptic curve Ep (a, b), chooses G on curve and as basic point, selects k as private key, and passes through operation K=kG Corresponding public key is obtained, elliptic curve Ep (a, b), G, K are then sent to node B, the information that node B will be encrypted passes through coding As the point M on elliptic curve.Then node B selects a random number r, and C1=M+rK, C2=are calculated on Ep (a, b) rG;Then C1 and C2 are sent to node A by node B.Node A is decrypted information with the private key k of oneself after receiving information: C1-kC2=M+r*K-k*r*G=M obtains the information that node B is recorded on block chain.When the node H of not no permission wants to look into When asking information, Ep (a, b), K, G, C1, C2 can only see, and can not obtain the information content.
Bridge responsible person can also form effective constraint and incentive mechanism with contract intelligent in block chain, formulate former The contracts in relation to bridge quality regulation such as specification, work certificate, the raw material material utilization amount of material simplify supervision flow, than If the bar gauge of offer is not suitable for bridge construction, contract terminates automatically, and responsible person can be notified at the first time, significantly Reduce the probability of bridge security major accident generation.Intelligent contract is a set of promise defined in digital form, promises to undertake control Digital asset and contain contract participant agreement right and duty, executed automatically by computer system.
It should be noted that the step in the bridge security source tracing method based on block chain provided by the invention, it can To be achieved using corresponding module, device, unit in the bridge security traceability system based on block chain etc., this field The technical solution that technical staff is referred to the system realizes the step process of the method, that is, the implementation in the system Example can be regarded as realizing the preference of the method, and it will not be described here.
One skilled in the art will appreciate that in addition to realizing system provided by the invention in a manner of pure computer readable program code And its other than each device, completely can by by method and step carry out programming in logic come so that system provided by the invention and its Each device is in the form of logic gate, switch, specific integrated circuit, programmable logic controller (PLC) and embedded microcontroller etc. To realize identical function.So system provided by the invention and its every device are considered a kind of hardware component, and it is right The device for realizing various functions for including in it can also be considered as the structure in hardware component;It can also will be for realizing each The device of kind function is considered as either the software module of implementation method can be the structure in hardware component again.
Specific embodiments of the present invention are described above.It is to be appreciated that the invention is not limited to above-mentioned Particular implementation, those skilled in the art can make a variety of changes or modify within the scope of the claims, this not shadow Ring substantive content of the invention.In the absence of conflict, the feature in embodiments herein and embodiment can any phase Mutually combination.

Claims (6)

1. a kind of bridge security source tracing method based on block chain characterized by comprising
The inquiry request that user sends is received, includes: the terminal iidentification of user in the inquiry request, identity information, to be checked Content;The user includes: construction party, monitoring party, administrative personnel;
Determine search access right corresponding to the identity information in the inquiry request;
According to the search access right, the information being recorded in target block is sent to the terminal of the user.
2. the bridge security source tracing method according to claim 1 based on block chain, which is characterized in that receiving user's hair Before the inquiry request sent, further includes:
Construct block chain network, wherein the participation node in the block chain network includes: bridge responsible person, raw material supply Quotient, construction personnel, inspector, maintenance personnel;
In the construction, examination, maintenance phase of bridge, the different bridge information for participating in node and uploading are received, and the bridge is believed Breath is recorded in target block;The bridge information includes: variety of raw material, manufacturer, supplier, specification, product qualification Card, construction personnel's name, commencement date, inspector's name, date of inspection and receipt, check and acceptance result, maintenance personnel's name, maintenance day Phase, maintenance result;
Wherein, the hash value of current goal block, timestamp, previous block are had recorded in the block head of the target block Hash value.
3. the bridge security source tracing method according to claim 2 based on block chain, which is characterized in that the reception is different The bridge information that node uploads is participated in, and the bridge information is recorded in target block, comprising:
Public key, the identity information of all participation nodes publication in the block chain network are received, and the public key, identity are believed Breath is packaged into original block;Wherein, hash value, the time of current original block are had recorded in the block head of the original block The hash value of stamp, previous block;
All participation nodes original block being sent in the block chain network;
All participation nodes in the block chain network are obtained to the verification result of the original block;
If the verification result of the original block is to pass through, bridge of the different participation nodes by the private key encryption of itself is received The bridge information is recorded in target block by information.
4. the bridge security source tracing method according to claim 3 based on block chain, which is characterized in that according to the inquiry Permission sends the information being recorded in target block to the user terminal, comprising:
To the public key of the participation node of content to be checked and the target block described in the transmission typing of the terminal of user, so that The terminal for obtaining user is decrypted the information being recorded in target block according to the private key of itself.
5. according to claim 1 based on the bridge security source tracing method of block chain described in -4, which is characterized in that receive user's hair The inquiry request sent, comprising:
User terminal by scan for inquiries two dimensional code, or on official website register account number mode, trace to the source platform to bridge security Send inquiry request.
6. a kind of bridge security traceability system based on block chain, which is characterized in that using described in any one of claim 1-5 The bridge security source tracing method based on block chain, comprising: data Layer, network layer, common recognition layer, contract layer and application layer;Its In:
Timestamp is added for being packaged to the block generated in block chain network in the data Layer within a block, and according to Preset Encryption Algorithm, records the information in block;
The network layer, for being arranged and executing to the administrative mechanisms for participating in node all in block chain network, the supervisor System includes: the information publication, information reception and Information Authentication completed to node is participated in;
The common recognition layer, for encapsulating to the common recognition algorithms for participating in node all in block chain network;
The contract layer, for being embedded in the relevant laws and regulations and management rules of bridge in the block of block chain network;
The application layer is supported for providing application to all participation nodes.
CN201810964134.3A 2018-08-22 2018-08-22 Bridge security source tracing method and system based on block chain Pending CN109242511A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810964134.3A CN109242511A (en) 2018-08-22 2018-08-22 Bridge security source tracing method and system based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810964134.3A CN109242511A (en) 2018-08-22 2018-08-22 Bridge security source tracing method and system based on block chain

Publications (1)

Publication Number Publication Date
CN109242511A true CN109242511A (en) 2019-01-18

Family

ID=65068727

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810964134.3A Pending CN109242511A (en) 2018-08-22 2018-08-22 Bridge security source tracing method and system based on block chain

Country Status (1)

Country Link
CN (1) CN109242511A (en)

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110175819A (en) * 2019-05-29 2019-08-27 贵州电网有限责任公司 A kind of online multiple person cooperational routine matter individuation service system and operating method
CN110300102A (en) * 2019-06-17 2019-10-01 中电科大数据研究院有限公司 A kind of Internet of Things safety access system and method based on block chain
CN110941533A (en) * 2019-11-20 2020-03-31 腾讯科技(深圳)有限公司 Monitoring method, monitoring device and computer readable storage medium
CN111079171A (en) * 2019-11-11 2020-04-28 重庆邮电大学 Block chain-based medical data privacy protection method and storage medium
CN111103304A (en) * 2019-12-31 2020-05-05 重庆大学 Bridge engineering wisdom detecting system based on block chain technique
CN111125774A (en) * 2020-03-26 2020-05-08 杭州产链数字科技有限公司 Engineering safety supervision traceability system and method based on block chain intelligent contract
CN111143874A (en) * 2019-12-16 2020-05-12 广州粤建三和软件股份有限公司 Hoisting equipment monitoring method and system based on block chain and storage medium
CN111178762A (en) * 2019-12-30 2020-05-19 杭州产链数字科技有限公司 Block chain-based construction engineering quality acceptance system and method
CN111245861A (en) * 2020-02-07 2020-06-05 上海应用技术大学 Power data storage and sharing method
CN111242653A (en) * 2020-04-24 2020-06-05 杭州趣链科技有限公司 RFID (radio frequency identification) and blockchain-based evidence-storing and tracing method, equipment and storage medium
CN111526024A (en) * 2020-05-06 2020-08-11 国网安徽省电力有限公司信息通信分公司 Building construction monitoring implementation method based on block chain
CN111611292A (en) * 2020-04-22 2020-09-01 淮阴工学院 Supply chain management and control method for assembly type building component
CN111724279A (en) * 2020-06-08 2020-09-29 江苏荣泽信息科技股份有限公司 Information management system of roads and affiliated facilities in urban area based on block chain
CN112152815A (en) * 2020-09-22 2020-12-29 广州粤建三和软件股份有限公司 Block chain-based deep foundation pit monitoring method, system, equipment and storage medium
CN113434902A (en) * 2021-06-30 2021-09-24 华中科技大学 Construction safety monitoring management system and method based on block chain
CN113762752A (en) * 2021-08-30 2021-12-07 中国建筑第七工程局有限公司 Construction quality tracing system based on block chain
CN117035740A (en) * 2023-08-21 2023-11-10 广西科学院 Bridge structure detection monitoring and maintenance data traceability system based on block chain

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107909372A (en) * 2017-10-25 2018-04-13 复旦大学 A kind of agricultural product source tracing method based on block chain technology
CN108305083A (en) * 2018-02-11 2018-07-20 张国忠 A kind of commodity source tracing method and system based on block chain
CN108364181A (en) * 2018-01-08 2018-08-03 广州中国科学院计算机网络信息中心 Source tracing method and system based on block chain and Internet of Things mark

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107909372A (en) * 2017-10-25 2018-04-13 复旦大学 A kind of agricultural product source tracing method based on block chain technology
CN108364181A (en) * 2018-01-08 2018-08-03 广州中国科学院计算机网络信息中心 Source tracing method and system based on block chain and Internet of Things mark
CN108305083A (en) * 2018-02-11 2018-07-20 张国忠 A kind of commodity source tracing method and system based on block chain

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
吕芙蓉 等: "基于区块链技术构建我国农产品质量安全追溯体系的研究", 《农村金融研究》 *
李明佳 等: "基于区块链的食品安全溯源体系设计", 《HTTPS://KNS.CNKI.NET/KXREADER/DETAIL?ALIGN=LT&TIMESTAMP=637613535141960368&DBCODE=CJFD&TABLENAME=CJFDLAST2019&FILENAME=SPKX201903041&RESULT=1&SIGN=OBEMDG9KFDFEBQ%2BQUQ0SR%2BTSTUG%3D》 *
袁勇 等: "区块链技术发展现状与展望", 《自动化学报》 *

Cited By (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110175819A (en) * 2019-05-29 2019-08-27 贵州电网有限责任公司 A kind of online multiple person cooperational routine matter individuation service system and operating method
CN110300102A (en) * 2019-06-17 2019-10-01 中电科大数据研究院有限公司 A kind of Internet of Things safety access system and method based on block chain
CN111079171A (en) * 2019-11-11 2020-04-28 重庆邮电大学 Block chain-based medical data privacy protection method and storage medium
CN110941533A (en) * 2019-11-20 2020-03-31 腾讯科技(深圳)有限公司 Monitoring method, monitoring device and computer readable storage medium
CN111143874A (en) * 2019-12-16 2020-05-12 广州粤建三和软件股份有限公司 Hoisting equipment monitoring method and system based on block chain and storage medium
CN111178762A (en) * 2019-12-30 2020-05-19 杭州产链数字科技有限公司 Block chain-based construction engineering quality acceptance system and method
CN111103304A (en) * 2019-12-31 2020-05-05 重庆大学 Bridge engineering wisdom detecting system based on block chain technique
CN111245861B (en) * 2020-02-07 2022-01-25 上海应用技术大学 Power data storage and sharing method
CN111245861A (en) * 2020-02-07 2020-06-05 上海应用技术大学 Power data storage and sharing method
CN111125774A (en) * 2020-03-26 2020-05-08 杭州产链数字科技有限公司 Engineering safety supervision traceability system and method based on block chain intelligent contract
CN111611292A (en) * 2020-04-22 2020-09-01 淮阴工学院 Supply chain management and control method for assembly type building component
CN111242653A (en) * 2020-04-24 2020-06-05 杭州趣链科技有限公司 RFID (radio frequency identification) and blockchain-based evidence-storing and tracing method, equipment and storage medium
CN111526024A (en) * 2020-05-06 2020-08-11 国网安徽省电力有限公司信息通信分公司 Building construction monitoring implementation method based on block chain
CN111724279A (en) * 2020-06-08 2020-09-29 江苏荣泽信息科技股份有限公司 Information management system of roads and affiliated facilities in urban area based on block chain
CN111724279B (en) * 2020-06-08 2022-07-22 江苏荣泽信息科技股份有限公司 Information management system of roads and affiliated facilities in urban area based on block chain
CN112152815A (en) * 2020-09-22 2020-12-29 广州粤建三和软件股份有限公司 Block chain-based deep foundation pit monitoring method, system, equipment and storage medium
CN113434902A (en) * 2021-06-30 2021-09-24 华中科技大学 Construction safety monitoring management system and method based on block chain
CN113434902B (en) * 2021-06-30 2022-04-12 华中科技大学 Construction safety monitoring management system and method based on block chain
CN113762752A (en) * 2021-08-30 2021-12-07 中国建筑第七工程局有限公司 Construction quality tracing system based on block chain
CN117035740A (en) * 2023-08-21 2023-11-10 广西科学院 Bridge structure detection monitoring and maintenance data traceability system based on block chain
CN117035740B (en) * 2023-08-21 2024-04-19 广西科学院 Construction method of bridge structure detection monitoring and maintenance data traceability system

Similar Documents

Publication Publication Date Title
CN109242511A (en) Bridge security source tracing method and system based on block chain
Yang et al. A trusted blockchain-based traceability system for fruit and vegetable agricultural products
CN109523683B (en) Anonymous electronic voting method based on block chain technology
Huang et al. Drugledger: A practical blockchain system for drug traceability and regulation
CN112073484B (en) GDPR compliance supervision method and system based on alliance chain
CN107391944A (en) A kind of electronic health record shared system based on block chain
CN111861425B (en) Individual resume sharing system based on block chain
WO2019227602A1 (en) Blockchain-based sleeve grouting quality tracing method and system, and collection terminal
CN109729093A (en) A kind of digital publishing rights register technique based on block chain
CN105893042A (en) Intelligent contract implementation method based on block chain
CN110197082A (en) Data processing method, data processing equipment and computer system
Li et al. Toward vehicular digital forensics from decentralized trust: An accountable, privacy-preserving, and secure realization
CN112073440B (en) Internet of things information recording method and system
CN110729028A (en) Health data processing method and device, electronic equipment and storage medium
CN106101092A (en) A kind of information evaluation processing method and first instance
CN112508587A (en) Tracing code generation method and device based on block chain
Chentouf et al. Security and privacy in smart city: a secure e-voting system based on blockchain
Panwar et al. Sampl: Scalable auditability of monitoring processes using public ledgers
CN112231772B (en) User behavior supervision method, device, equipment and medium based on block chain
CN113779594A (en) Data distribution sharing method and system based on block chain
CN113065849A (en) Resume management method based on block chain
Li et al. Quantum Secure Undeniable Signature for Blockchain-Enabled Cold-Chain Logistics System.
CN116318901A (en) Privacy and verifiable internet of things data aggregation method integrating blockchain
CN115729994A (en) Integrated big data application system and method for public data development and utilization
CN112259190B (en) Medical information trusted circulation method, device and system based on block chain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190118