CN109242511A - Bridge security source tracing method and system based on block chain - Google Patents
Bridge security source tracing method and system based on block chain Download PDFInfo
- Publication number
- CN109242511A CN109242511A CN201810964134.3A CN201810964134A CN109242511A CN 109242511 A CN109242511 A CN 109242511A CN 201810964134 A CN201810964134 A CN 201810964134A CN 109242511 A CN109242511 A CN 109242511A
- Authority
- CN
- China
- Prior art keywords
- block
- bridge
- information
- block chain
- user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 36
- 238000010276 construction Methods 0.000 claims abstract description 30
- 238000012423 maintenance Methods 0.000 claims abstract description 21
- 238000012544 monitoring process Methods 0.000 claims abstract description 3
- 239000002994 raw material Substances 0.000 claims description 12
- 230000007246 mechanism Effects 0.000 claims description 10
- 238000012795 verification Methods 0.000 claims description 4
- 238000007689 inspection Methods 0.000 claims description 2
- 230000005540 biological transmission Effects 0.000 claims 1
- 238000012797 qualification Methods 0.000 claims 1
- 230000008569 process Effects 0.000 abstract description 12
- 238000005516 engineering process Methods 0.000 description 4
- 230000003014 reinforcing effect Effects 0.000 description 3
- 238000010586 diagram Methods 0.000 description 2
- 239000000463 material Substances 0.000 description 2
- 238000012545 processing Methods 0.000 description 2
- 241000208340 Araliaceae Species 0.000 description 1
- 235000005035 Panax pseudoginseng ssp. pseudoginseng Nutrition 0.000 description 1
- 235000003140 Panax quinquefolius Nutrition 0.000 description 1
- 230000007797 corrosion Effects 0.000 description 1
- 238000005260 corrosion Methods 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 235000008434 ginseng Nutrition 0.000 description 1
- 238000003780 insertion Methods 0.000 description 1
- 230000037431 insertion Effects 0.000 description 1
- 238000011835 investigation Methods 0.000 description 1
- 230000006855 networking Effects 0.000 description 1
- 230000008093 supporting effect Effects 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/018—Certifying business or products
- G06Q30/0185—Product, service or business identity fraud
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/08—Construction
Landscapes
- Business, Economics & Management (AREA)
- Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Economics (AREA)
- Engineering & Computer Science (AREA)
- Marketing (AREA)
- General Physics & Mathematics (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Human Resources & Organizations (AREA)
- Tourism & Hospitality (AREA)
- Primary Health Care (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Entrepreneurship & Innovation (AREA)
- Accounting & Taxation (AREA)
- Development Economics (AREA)
- Finance (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The present invention provides a kind of bridge security source tracing method and system based on block chain, this method, comprising: receives the inquiry request that user sends, includes: the terminal iidentification, identity information, content to be checked of user in the inquiry request;The user includes: construction party, monitoring party, administrative personnel;Determine search access right corresponding to the identity information in the inquiry request;According to the search access right, the information being recorded in target block is sent to the terminal of the user.The present invention can record a series of processes such as construction, examination, the maintenance of bridge by block, guarantee the authenticity of data, the data of record within a block can not distort, so that process more transparence of the bridge from construction to examination, guarantee bridge construction quality, relevant departments is facilitated to be supervised.
Description
Technical field
The present invention relates to technical field of data processing, and in particular, to bridge security source tracing method based on block chain and
System.
Background technique
Important component of the bridge as highway, be directly related to the safety of driving with it is unimpeded.However, various countries in recent years
The bridge collapse accident occurred in succession causes the highest attention of national governments and world's science of bridge building circle.Science of bridge building structure peace
The problems such as full property and reliability and its technology being related to, all have become world today's bridge circle focus of attention.
Block chain is a kind of shared account book technology, is used as bottom architecture, has distributed, open and clear property, can not usurp
The characteristics of modified, collective's maintenance and secret protection.Block chain technology uses the chain structure storing data with timestamp, increases
Time dimension makes data have extremely strong verifiability and trackability.Successively ring ring connects each block in block chain, shape
At a longest main chain of the block since most to current block, to have recorded the complete information of block data, Neng Gouti
For the function of tracing to the source of block chain data, arbitrary data can be traced to source by this chain structure.
Summary of the invention
For the defects in the prior art, the object of the present invention is to provide a kind of bridge security sides of tracing to the source based on block chain
Method and system.
In a first aspect, the embodiment of the present invention provides a kind of bridge security source tracing method based on block chain, comprising:
Receive the inquiry request that user sends, include: in the inquiry request terminal iidentification of user, identity information, to
The content of inquiry;The user includes: construction party, monitoring party, administrative personnel;
Determine search access right corresponding to the identity information in the inquiry request;
According to the search access right, the information being recorded in target block is sent to the terminal of the user.
Optionally, before receiving the inquiry request that user sends, further includes:
Construct block chain network, wherein the participation node in the block chain network includes: bridge responsible person, raw material
Supplier, construction personnel, inspector, maintenance personnel;
In the construction, examination, maintenance phase of bridge, the different bridge information for participating in nodes and uploading are received, and by the bridge
Beam information is recorded in target block;The bridge information includes: variety of raw material, manufacturer, supplier, specification, product
The quality certification, construction personnel's name, commencement date, inspector's name, date of inspection and receipt, check and acceptance result, maintenance personnel's name, maintenance
Date, maintenance result;
Wherein, hash value, the timestamp, previous block of current goal block are had recorded in the block head of the target block
Hash value.
Optionally, described to receive the different bridge information for participating in node and uploading, and the bridge information is recorded in target
In block, comprising:
Public key, the identity information of all participation nodes publication in the block chain network are received, and by the public key, body
Part information package is at original block;Wherein, had recorded in the block head of the original block current original block hash value, when
Between stamp, previous block hash value;
All participation nodes original block being sent in the block chain network;
All participation nodes in the block chain network are obtained to the verification result of the original block;
If the verification result of the original block is to pass through, the private key encryption that different participation nodes pass through itself is received
The bridge information is recorded in target block by bridge information.
Optionally, according to the search access right, the information being recorded in target block, packet are sent to the user terminal
It includes:
To the terminal of user send the participation node of content to be checked described in typing public key and the target block,
So that the terminal of user is decrypted the information being recorded in target block according to the private key of itself.
Optionally, the inquiry request that user sends is received, comprising:
User terminal by scan for inquiries two dimensional code, or on official website register account number mode, trace to the source to bridge security
Platform sends inquiry request.
Second aspect, the embodiment of the present invention provides a kind of bridge security traceability system based on block chain, using first party
Based on the bridge security source tracing method of block chain described in any one of face, comprising: data Layer, network layer, common recognition layer, contract
Layer and application layer;Wherein:
Timestamp is added for being packaged to the block generated in block chain network in the data Layer within a block, and
According to preset Encryption Algorithm, record the information in block;
The network layer, for being arranged and executing to the administrative mechanisms for participating in node all in block chain network, the pipe
Reason mechanism includes: the information publication, information reception and Information Authentication completed to node is participated in;
The common recognition layer, for encapsulating to the common recognition algorithms for participating in node all in block chain network;
The contract layer, for being embedded in the relevant laws and regulations and management rules of bridge in the block of block chain network;
The application layer is supported for providing application to all participation nodes.Compared with prior art, the present invention has such as
Under the utility model has the advantages that
Bridge security source tracing method and system provided by the invention based on block chain, can recorde the construction of bridge, tests
A series of processes such as receipts, maintenance are participated in by the identity using Internet of Things, sensor, RFID technique by all engineerings
Person (construction party, inspector, maintenance person etc.) records data in real time within a block, guarantees the authenticity of data, record is within a block
Data can not distort so that bridge from construction to examination process more transparence, guarantee bridge construction quality,
Relevant departments are facilitated to be supervised.
Detailed description of the invention
Upon reading the detailed description of non-limiting embodiments with reference to the following drawings, other feature of the invention,
Objects and advantages will become more apparent upon:
Fig. 1 is the principle architecture diagram that the bridge security based on block chain is traced to the source;
Fig. 2 is the schematic illustration of elliptic curve encryption algorithm.
Specific embodiment
The present invention is described in detail combined with specific embodiments below.Following embodiment will be helpful to the technology of this field
Personnel further understand the present invention, but the invention is not limited in any way.It should be pointed out that the ordinary skill of this field
For personnel, without departing from the inventive concept of the premise, several changes and improvements can also be made.These belong to the present invention
Protection scope.
Bridge security, which is traced to the source, can be mainly reflected in four aspects:
1) raw material itself specifically include that variety of raw material, manufacturer, supplier, specification, work certificate, transport
Storing process etc., for example build reinforcing bar used in bridge, grade can generally use Q345 or more, to the impact flexibility of reinforcing bar,
Fatigue behaviour require it is all very high, including reinforcing bar transport, should prevent in storing process corrosion, pollution and deformation etc. require into
Row real-time tracing and record;
2) work progress specifically includes that name, time, step of operator etc.;
3) course of receiving, specifically include that inspector, reception time, check and accept conclusion etc.;
4) maintenance record specifically includes that maintenance personnel, curing time, maintenance result etc..
The participant of bridge construction mainly includes three classes:
1) source-information of raw material can construction party: be checked.
2) letter such as raw material information, work progress information, course of receiving information and maintenance record can management side: be inquired
Breath.
3) source-information, each link information in work progress, the course of receiving of raw material can administrative personnel: be inquired
In information and maintenance record information.Different participants can inquire corresponding information according to the permission of oneself.
Specifically, Fig. 1 is the principle architecture diagram that the bridge security based on block chain is traced to the source, as shown in Figure 1, construction department,
Respective construction archives are recorded in block chain by acceptance check department, maintenance department by block chain network.Then, construction party, prison
Reason side, administrative personnel can pass through block chain query to entire bridge construction, examination, the data for conserving the stage.
In addition, the bridge security traceability system provided by the invention based on block chain, may include: data Layer, network layer,
Common recognition layer, contract layer and application layer;Wherein: the data Layer, for being sealed to the block generated in block chain network
Dress, is added timestamp, and according to preset Encryption Algorithm, record the information in block within a block;The network layer, is used for
It is arranged and executes to the administrative mechanisms for participating in node all in block chain network, the administrative mechanism includes: to complete to save participation
The information publication of point, information receives and Information Authentication;The common recognition layer saves participations all in block chain network for encapsulating
The common recognition algorithm of point;The contract layer, for being embedded in the relevant laws and regulations and management rules of bridge in the block of block chain network;
The application layer is supported for providing application to all participation nodes.
Specifically, bottom data is recorded from manufacturer, contact method, product quality certificate of raw material etc.,
The data of data Layer are packaged according to the format of block, and timestamp is added to data block, is remembered data by Encryption Algorithm
Record is added in block chain.Network layer is by peer to peer network mechanism, data authentication mechanism, network insertion management, using distribution
Formula networking mechanism makes data distribution in different node databases.The common recognition some common recognition algorithms of layer predominant package, introduce relevant
Block chain is added as node is participated in common recognition mechanism, national government supervision department, construction party, masses etc..Contract layer will " country's prison
Pipe regulations ", the laws and regulations such as " Regulations on Quality Management of Construction Projects " are embedded in block chain in the form of intelligent contract.Application layer
Node with information is participated in supervision department, masses etc. the supportings such as to trace to the source.
Bridge security source tracing method and system provided by the invention based on block chain, can process of construction to bridge into
It has gone effective management, has had recorded the key message in each stage in process of construction, can not only find the problem in time, Er Qiefa
Existing problem can trace back to specific time and person liable, save the cost of processing problem, improve the effect of accident investigation solution
Rate.The problem in process of construction is found and solved by a series of measures, is realized the raising of bridge quality safety, is being built
Also helping in the process enhances each sense of duty for participating in unit, so that process of construction is more transparent.
Specifically, the timestamp in block chain is when obtaining the participation node that record is weighed to cover in active data area build
Between stab, show the write time of block data.Therefore, each block on block chain is arranged successively sequentially in time.When
Between stamp can be used as the existence proof of block data, form the database that can not be distorted, can not forge, mentioned for tracing to the source for bridge
For more acurrate transparent information.
Specifically, the rivest, shamir, adelman that block chain applies to is to meet security requirement and data origin authentication need
It asks.Rivest, shamir, adelman refers to uses two asymmetrical passwords: public key and private key during encryption and decryption.Work as ginseng
After the one of cipher key encryption information of node, only can just it be unlocked with another corresponding key.Public key is to owner's public affairs
It opens, and private key is secrecy, corresponding private key can not be extrapolated by public key, which ensures that the safeties of information.Meeting simultaneously
Certain rule is set in information document, when participating in node visit bridge information, needs to input its key, system can basis
Its permission possessed shows its visible information.
Bridge responsible person, raw material supplier, construction party, inspector, maintenance person etc. participate in node can be on block chain
Carry out typing or query information.When participation node A, which wants Safety query participation node B, is recorded in the information on block chain,
The Encryption Algorithm of use is ECC elliptic curve encryption algorithm.Fig. 2 is the schematic illustration of elliptic curve encryption algorithm, such as Fig. 2 institute
Show, node A establishes elliptic curve Ep (a, b), chooses G on curve and as basic point, selects k as private key, and passes through operation K=kG
Corresponding public key is obtained, elliptic curve Ep (a, b), G, K are then sent to node B, the information that node B will be encrypted passes through coding
As the point M on elliptic curve.Then node B selects a random number r, and C1=M+rK, C2=are calculated on Ep (a, b)
rG;Then C1 and C2 are sent to node A by node B.Node A is decrypted information with the private key k of oneself after receiving information:
C1-kC2=M+r*K-k*r*G=M obtains the information that node B is recorded on block chain.When the node H of not no permission wants to look into
When asking information, Ep (a, b), K, G, C1, C2 can only see, and can not obtain the information content.
Bridge responsible person can also form effective constraint and incentive mechanism with contract intelligent in block chain, formulate former
The contracts in relation to bridge quality regulation such as specification, work certificate, the raw material material utilization amount of material simplify supervision flow, than
If the bar gauge of offer is not suitable for bridge construction, contract terminates automatically, and responsible person can be notified at the first time, significantly
Reduce the probability of bridge security major accident generation.Intelligent contract is a set of promise defined in digital form, promises to undertake control
Digital asset and contain contract participant agreement right and duty, executed automatically by computer system.
It should be noted that the step in the bridge security source tracing method based on block chain provided by the invention, it can
To be achieved using corresponding module, device, unit in the bridge security traceability system based on block chain etc., this field
The technical solution that technical staff is referred to the system realizes the step process of the method, that is, the implementation in the system
Example can be regarded as realizing the preference of the method, and it will not be described here.
One skilled in the art will appreciate that in addition to realizing system provided by the invention in a manner of pure computer readable program code
And its other than each device, completely can by by method and step carry out programming in logic come so that system provided by the invention and its
Each device is in the form of logic gate, switch, specific integrated circuit, programmable logic controller (PLC) and embedded microcontroller etc.
To realize identical function.So system provided by the invention and its every device are considered a kind of hardware component, and it is right
The device for realizing various functions for including in it can also be considered as the structure in hardware component;It can also will be for realizing each
The device of kind function is considered as either the software module of implementation method can be the structure in hardware component again.
Specific embodiments of the present invention are described above.It is to be appreciated that the invention is not limited to above-mentioned
Particular implementation, those skilled in the art can make a variety of changes or modify within the scope of the claims, this not shadow
Ring substantive content of the invention.In the absence of conflict, the feature in embodiments herein and embodiment can any phase
Mutually combination.
Claims (6)
1. a kind of bridge security source tracing method based on block chain characterized by comprising
The inquiry request that user sends is received, includes: the terminal iidentification of user in the inquiry request, identity information, to be checked
Content;The user includes: construction party, monitoring party, administrative personnel;
Determine search access right corresponding to the identity information in the inquiry request;
According to the search access right, the information being recorded in target block is sent to the terminal of the user.
2. the bridge security source tracing method according to claim 1 based on block chain, which is characterized in that receiving user's hair
Before the inquiry request sent, further includes:
Construct block chain network, wherein the participation node in the block chain network includes: bridge responsible person, raw material supply
Quotient, construction personnel, inspector, maintenance personnel;
In the construction, examination, maintenance phase of bridge, the different bridge information for participating in node and uploading are received, and the bridge is believed
Breath is recorded in target block;The bridge information includes: variety of raw material, manufacturer, supplier, specification, product qualification
Card, construction personnel's name, commencement date, inspector's name, date of inspection and receipt, check and acceptance result, maintenance personnel's name, maintenance day
Phase, maintenance result;
Wherein, the hash value of current goal block, timestamp, previous block are had recorded in the block head of the target block
Hash value.
3. the bridge security source tracing method according to claim 2 based on block chain, which is characterized in that the reception is different
The bridge information that node uploads is participated in, and the bridge information is recorded in target block, comprising:
Public key, the identity information of all participation nodes publication in the block chain network are received, and the public key, identity are believed
Breath is packaged into original block;Wherein, hash value, the time of current original block are had recorded in the block head of the original block
The hash value of stamp, previous block;
All participation nodes original block being sent in the block chain network;
All participation nodes in the block chain network are obtained to the verification result of the original block;
If the verification result of the original block is to pass through, bridge of the different participation nodes by the private key encryption of itself is received
The bridge information is recorded in target block by information.
4. the bridge security source tracing method according to claim 3 based on block chain, which is characterized in that according to the inquiry
Permission sends the information being recorded in target block to the user terminal, comprising:
To the public key of the participation node of content to be checked and the target block described in the transmission typing of the terminal of user, so that
The terminal for obtaining user is decrypted the information being recorded in target block according to the private key of itself.
5. according to claim 1 based on the bridge security source tracing method of block chain described in -4, which is characterized in that receive user's hair
The inquiry request sent, comprising:
User terminal by scan for inquiries two dimensional code, or on official website register account number mode, trace to the source platform to bridge security
Send inquiry request.
6. a kind of bridge security traceability system based on block chain, which is characterized in that using described in any one of claim 1-5
The bridge security source tracing method based on block chain, comprising: data Layer, network layer, common recognition layer, contract layer and application layer;Its
In:
Timestamp is added for being packaged to the block generated in block chain network in the data Layer within a block, and according to
Preset Encryption Algorithm, records the information in block;
The network layer, for being arranged and executing to the administrative mechanisms for participating in node all in block chain network, the supervisor
System includes: the information publication, information reception and Information Authentication completed to node is participated in;
The common recognition layer, for encapsulating to the common recognition algorithms for participating in node all in block chain network;
The contract layer, for being embedded in the relevant laws and regulations and management rules of bridge in the block of block chain network;
The application layer is supported for providing application to all participation nodes.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810964134.3A CN109242511A (en) | 2018-08-22 | 2018-08-22 | Bridge security source tracing method and system based on block chain |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810964134.3A CN109242511A (en) | 2018-08-22 | 2018-08-22 | Bridge security source tracing method and system based on block chain |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109242511A true CN109242511A (en) | 2019-01-18 |
Family
ID=65068727
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810964134.3A Pending CN109242511A (en) | 2018-08-22 | 2018-08-22 | Bridge security source tracing method and system based on block chain |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109242511A (en) |
Cited By (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110175819A (en) * | 2019-05-29 | 2019-08-27 | 贵州电网有限责任公司 | A kind of online multiple person cooperational routine matter individuation service system and operating method |
CN110300102A (en) * | 2019-06-17 | 2019-10-01 | 中电科大数据研究院有限公司 | A kind of Internet of Things safety access system and method based on block chain |
CN110941533A (en) * | 2019-11-20 | 2020-03-31 | 腾讯科技(深圳)有限公司 | Monitoring method, monitoring device and computer readable storage medium |
CN111079171A (en) * | 2019-11-11 | 2020-04-28 | 重庆邮电大学 | Block chain-based medical data privacy protection method and storage medium |
CN111103304A (en) * | 2019-12-31 | 2020-05-05 | 重庆大学 | Bridge engineering wisdom detecting system based on block chain technique |
CN111125774A (en) * | 2020-03-26 | 2020-05-08 | 杭州产链数字科技有限公司 | Engineering safety supervision traceability system and method based on block chain intelligent contract |
CN111143874A (en) * | 2019-12-16 | 2020-05-12 | 广州粤建三和软件股份有限公司 | Hoisting equipment monitoring method and system based on block chain and storage medium |
CN111178762A (en) * | 2019-12-30 | 2020-05-19 | 杭州产链数字科技有限公司 | Block chain-based construction engineering quality acceptance system and method |
CN111245861A (en) * | 2020-02-07 | 2020-06-05 | 上海应用技术大学 | Power data storage and sharing method |
CN111242653A (en) * | 2020-04-24 | 2020-06-05 | 杭州趣链科技有限公司 | RFID (radio frequency identification) and blockchain-based evidence-storing and tracing method, equipment and storage medium |
CN111526024A (en) * | 2020-05-06 | 2020-08-11 | 国网安徽省电力有限公司信息通信分公司 | Building construction monitoring implementation method based on block chain |
CN111611292A (en) * | 2020-04-22 | 2020-09-01 | 淮阴工学院 | Supply chain management and control method for assembly type building component |
CN111724279A (en) * | 2020-06-08 | 2020-09-29 | 江苏荣泽信息科技股份有限公司 | Information management system of roads and affiliated facilities in urban area based on block chain |
CN112152815A (en) * | 2020-09-22 | 2020-12-29 | 广州粤建三和软件股份有限公司 | Block chain-based deep foundation pit monitoring method, system, equipment and storage medium |
CN113434902A (en) * | 2021-06-30 | 2021-09-24 | 华中科技大学 | Construction safety monitoring management system and method based on block chain |
CN113762752A (en) * | 2021-08-30 | 2021-12-07 | 中国建筑第七工程局有限公司 | Construction quality tracing system based on block chain |
CN117035740A (en) * | 2023-08-21 | 2023-11-10 | 广西科学院 | Bridge structure detection monitoring and maintenance data traceability system based on block chain |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107909372A (en) * | 2017-10-25 | 2018-04-13 | 复旦大学 | A kind of agricultural product source tracing method based on block chain technology |
CN108305083A (en) * | 2018-02-11 | 2018-07-20 | 张国忠 | A kind of commodity source tracing method and system based on block chain |
CN108364181A (en) * | 2018-01-08 | 2018-08-03 | 广州中国科学院计算机网络信息中心 | Source tracing method and system based on block chain and Internet of Things mark |
-
2018
- 2018-08-22 CN CN201810964134.3A patent/CN109242511A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107909372A (en) * | 2017-10-25 | 2018-04-13 | 复旦大学 | A kind of agricultural product source tracing method based on block chain technology |
CN108364181A (en) * | 2018-01-08 | 2018-08-03 | 广州中国科学院计算机网络信息中心 | Source tracing method and system based on block chain and Internet of Things mark |
CN108305083A (en) * | 2018-02-11 | 2018-07-20 | 张国忠 | A kind of commodity source tracing method and system based on block chain |
Non-Patent Citations (3)
Title |
---|
吕芙蓉 等: "基于区块链技术构建我国农产品质量安全追溯体系的研究", 《农村金融研究》 * |
李明佳 等: "基于区块链的食品安全溯源体系设计", 《HTTPS://KNS.CNKI.NET/KXREADER/DETAIL?ALIGN=LT&TIMESTAMP=637613535141960368&DBCODE=CJFD&TABLENAME=CJFDLAST2019&FILENAME=SPKX201903041&RESULT=1&SIGN=OBEMDG9KFDFEBQ%2BQUQ0SR%2BTSTUG%3D》 * |
袁勇 等: "区块链技术发展现状与展望", 《自动化学报》 * |
Cited By (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110175819A (en) * | 2019-05-29 | 2019-08-27 | 贵州电网有限责任公司 | A kind of online multiple person cooperational routine matter individuation service system and operating method |
CN110300102A (en) * | 2019-06-17 | 2019-10-01 | 中电科大数据研究院有限公司 | A kind of Internet of Things safety access system and method based on block chain |
CN111079171A (en) * | 2019-11-11 | 2020-04-28 | 重庆邮电大学 | Block chain-based medical data privacy protection method and storage medium |
CN110941533A (en) * | 2019-11-20 | 2020-03-31 | 腾讯科技(深圳)有限公司 | Monitoring method, monitoring device and computer readable storage medium |
CN111143874A (en) * | 2019-12-16 | 2020-05-12 | 广州粤建三和软件股份有限公司 | Hoisting equipment monitoring method and system based on block chain and storage medium |
CN111178762A (en) * | 2019-12-30 | 2020-05-19 | 杭州产链数字科技有限公司 | Block chain-based construction engineering quality acceptance system and method |
CN111103304A (en) * | 2019-12-31 | 2020-05-05 | 重庆大学 | Bridge engineering wisdom detecting system based on block chain technique |
CN111245861B (en) * | 2020-02-07 | 2022-01-25 | 上海应用技术大学 | Power data storage and sharing method |
CN111245861A (en) * | 2020-02-07 | 2020-06-05 | 上海应用技术大学 | Power data storage and sharing method |
CN111125774A (en) * | 2020-03-26 | 2020-05-08 | 杭州产链数字科技有限公司 | Engineering safety supervision traceability system and method based on block chain intelligent contract |
CN111611292A (en) * | 2020-04-22 | 2020-09-01 | 淮阴工学院 | Supply chain management and control method for assembly type building component |
CN111242653A (en) * | 2020-04-24 | 2020-06-05 | 杭州趣链科技有限公司 | RFID (radio frequency identification) and blockchain-based evidence-storing and tracing method, equipment and storage medium |
CN111526024A (en) * | 2020-05-06 | 2020-08-11 | 国网安徽省电力有限公司信息通信分公司 | Building construction monitoring implementation method based on block chain |
CN111724279A (en) * | 2020-06-08 | 2020-09-29 | 江苏荣泽信息科技股份有限公司 | Information management system of roads and affiliated facilities in urban area based on block chain |
CN111724279B (en) * | 2020-06-08 | 2022-07-22 | 江苏荣泽信息科技股份有限公司 | Information management system of roads and affiliated facilities in urban area based on block chain |
CN112152815A (en) * | 2020-09-22 | 2020-12-29 | 广州粤建三和软件股份有限公司 | Block chain-based deep foundation pit monitoring method, system, equipment and storage medium |
CN113434902A (en) * | 2021-06-30 | 2021-09-24 | 华中科技大学 | Construction safety monitoring management system and method based on block chain |
CN113434902B (en) * | 2021-06-30 | 2022-04-12 | 华中科技大学 | Construction safety monitoring management system and method based on block chain |
CN113762752A (en) * | 2021-08-30 | 2021-12-07 | 中国建筑第七工程局有限公司 | Construction quality tracing system based on block chain |
CN117035740A (en) * | 2023-08-21 | 2023-11-10 | 广西科学院 | Bridge structure detection monitoring and maintenance data traceability system based on block chain |
CN117035740B (en) * | 2023-08-21 | 2024-04-19 | 广西科学院 | Construction method of bridge structure detection monitoring and maintenance data traceability system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109242511A (en) | Bridge security source tracing method and system based on block chain | |
Yang et al. | A trusted blockchain-based traceability system for fruit and vegetable agricultural products | |
CN109523683B (en) | Anonymous electronic voting method based on block chain technology | |
Huang et al. | Drugledger: A practical blockchain system for drug traceability and regulation | |
CN112073484B (en) | GDPR compliance supervision method and system based on alliance chain | |
CN107391944A (en) | A kind of electronic health record shared system based on block chain | |
CN111861425B (en) | Individual resume sharing system based on block chain | |
WO2019227602A1 (en) | Blockchain-based sleeve grouting quality tracing method and system, and collection terminal | |
CN109729093A (en) | A kind of digital publishing rights register technique based on block chain | |
CN105893042A (en) | Intelligent contract implementation method based on block chain | |
CN110197082A (en) | Data processing method, data processing equipment and computer system | |
Li et al. | Toward vehicular digital forensics from decentralized trust: An accountable, privacy-preserving, and secure realization | |
CN112073440B (en) | Internet of things information recording method and system | |
CN110729028A (en) | Health data processing method and device, electronic equipment and storage medium | |
CN106101092A (en) | A kind of information evaluation processing method and first instance | |
CN112508587A (en) | Tracing code generation method and device based on block chain | |
Chentouf et al. | Security and privacy in smart city: a secure e-voting system based on blockchain | |
Panwar et al. | Sampl: Scalable auditability of monitoring processes using public ledgers | |
CN112231772B (en) | User behavior supervision method, device, equipment and medium based on block chain | |
CN113779594A (en) | Data distribution sharing method and system based on block chain | |
CN113065849A (en) | Resume management method based on block chain | |
Li et al. | Quantum Secure Undeniable Signature for Blockchain-Enabled Cold-Chain Logistics System. | |
CN116318901A (en) | Privacy and verifiable internet of things data aggregation method integrating blockchain | |
CN115729994A (en) | Integrated big data application system and method for public data development and utilization | |
CN112259190B (en) | Medical information trusted circulation method, device and system based on block chain |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190118 |