CN108510288A - Authentication method during art sales - Google Patents

Authentication method during art sales Download PDF

Info

Publication number
CN108510288A
CN108510288A CN201810156361.3A CN201810156361A CN108510288A CN 108510288 A CN108510288 A CN 108510288A CN 201810156361 A CN201810156361 A CN 201810156361A CN 108510288 A CN108510288 A CN 108510288A
Authority
CN
China
Prior art keywords
block
information
node
network address
rule
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201810156361.3A
Other languages
Chinese (zh)
Inventor
覃士忠
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuhan Kang Huiran Information Technology Consulting Co Ltd
Original Assignee
Wuhan Kang Huiran Information Technology Consulting Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuhan Kang Huiran Information Technology Consulting Co Ltd filed Critical Wuhan Kang Huiran Information Technology Consulting Co Ltd
Priority to CN201810156361.3A priority Critical patent/CN108510288A/en
Publication of CN108510288A publication Critical patent/CN108510288A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • G06Q30/0185Product, service or business identity fraud
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0601Electronic shopping [e-shopping]
    • G06Q30/0609Buyer or seller confidence or verification
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/60Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources

Abstract

Authentication method during a kind of art sales, includes the following steps:The art work is scanned, art work identification feature information is parsed from scanning result;Art work identification feature information is subjected to type division, and configures the corresponding identification description information of variety classes characteristic information;Art work identification feature information, species characteristic information, identification description information are converted to original character string information by the mapping relations for establishing identification description information and species characteristic information;The block for art sales certification is generated based on time scheduling rule, block is written using original character string information as raw information.

Description

Authentication method during art sales
Technical field
The present invention relates to art work digitlization transaction technology field, more particularly to authenticating party during a kind of art sales Method.
Background technology
During art sales, there is two insoluble problems, first be the art work the true and false discrimination ask Topic;Second be in the process of circulation can not into line trace and identification the problem of.Both of these problems become what the art work smoothly circulated It hinders.
Block chain technology is decentralization, have to be suitable for skill as a kind of anonymous, decentralization technology, essence Certification in art product process of exchange, however such as bit coin in reality, the calculation power for digging mine is excessively concentrated, the mine factory collection of ranking several former The one third or so of whole calculation power is suffered, this present situation has violated the original idea of block chain technology so that existing block chain skill Art can not adapt to art sales certification very well.
Invention content
In view of this, authentication method during a kind of art sales of present invention offer.
Authentication method during a kind of art sales, includes the following steps:
The art work is scanned, art work identification feature information is parsed from scanning result;
Art work identification feature information is subjected to type division, and configures the corresponding identification description of variety classes characteristic information Information;
The mapping relations for establishing identification description information and species characteristic information, art work identification feature information, type is special Reference breath, identification description information are converted to original character string information;
The block for art sales certification is generated based on time scheduling rule, using original character string information as original Block is written in information.
During art sales of the present invention in authentication method,
It is described to further include later using original character string information as raw information write-in block:
After the art work merchandise each time, both parties' information, transaction value information, loco information are converted For the character string information that circulates;
Block is written into as circulation information in circulation character string information.
During art sales of the present invention in authentication method,
It is described to further include later using circulation character string information as circulation information write-in block:
When the art work is merchandised, read block Central Plains beginning information, circulation information to the historical transactional information of the art work, True and false information is authenticated.
During art sales of the present invention in authentication method,
Described generated based on time scheduling rule is included the following steps for the block of art sales certification:
Block generates allocation rule, calculates power recognition rule in block generating process in S01, configuration block chain;
S02, block sum in allocation rule generation block chain is generated by block, and by block sum according to network address Section is allocated each network address section of acquisition and corresponds to block pond;
The block generation request of S03, receiving node, whether the block of decision node generates asks corresponding request time full Foot presets cooling time, and step S04 is jumped to when meeting, and the block for otherwise refusing node generates request;
S04, allocation rule is generated according to preset block, calculates power recognition rule generation block.
During art sales of the present invention in authentication method,
The step S04 includes:
The block generation request of S1, receiving node, determine the network address section where the node of request, and judge place net It corresponds to whether block pond reaches the upper limit in network address field, step S4 is jumped to when reaching the upper limit, otherwise jump to step S2;
S2, judge whether the node of request occurs calculating power exception by calculating power recognition rule, jumped when power exception is calculated in appearance Step S4 is gone to, step S3 is otherwise jumped to;
S3, new block is generated according to default block create-rule information, and terminated;
S4, the block for refusing node generate request.
During art sales of the present invention in authentication method,
Judge whether the node of request occurs calculating power including extremely by calculating power recognition rule in the step S2:
S21, it is sent to node and calculates power test program, and the calculation power test result of receiving node feedback;
S22, judge whether the node of request occurs calculating power exception according to calculation power test result.
During art sales of the present invention in authentication method,
Further include before the step S21:
The mutual exclusion rule that each network address section interior nodes generate block chain is configured according to network address section;
Corresponding node, which is configured, according to mutual exclusion rule calculates power adjustment rule;
Correspondingly, the step S22 includes:
S221, judge whether the node of request meets mutual exclusion rule, when meeting mutual exclusion rule, jump to step S3;It is no Then jump to step S222;
S222, the calculation power that the node entry that power adjustment rule adjustment is asked is calculated according to node influence coefficient;
S223, the calculation power for influencing the node of the request after coefficient is adjusted by calculating power, and judge the request after adjustment Node calculation power whether calculate power exception.
During art sales of the present invention in authentication method,
Block sum is allocated each network address section of acquisition according to network address section in the step S02 and corresponds to area Block pond includes:
Network address is divided into the network address section of different levels;
Block sum divide according to the network address section of different levels and obtains each hierarchical network address field correspondence Block pond.
During art sales of the present invention in authentication method,
It is described according to network address section configure each network address section interior nodes and generate the mutual exclusion rule of block chain include:
According to the network address section configuration node of different levels different levels network address section standard request rate;
The mutual exclusion rule of block chain is generated according to standard request rate.
During art sales of the present invention in authentication method,
The step S21 includes:
S211, it is sent to node and calculates power test program, the calculation power test program includes floating-point operation, node unique identification Code obtains program;
The calculation power test result of the feedback of S222, receiving node, the calculation power test result include floating-point operation result, section Point unique identifier;In addition
The step S3 includes:
Using the calculation power of the node of the request after adjustment as contribution margin according to generation new block.
Advantageous effects:Authentication method compared with the existing technology, can be realized during the art sales of the present invention: The identification information and Transaction Information of the art work are authenticated by block, substantially increase the credibility of certification;In addition pass through The block of decision node, which generates, asks whether corresponding request time meets default cooling time, avoids certain some section in network Point is constantly dug mine;Allocation rule is generated by block and generates block sum in block chain, and by block sum according to net Network address field is allocated each network address section of acquisition and corresponds to block pond, can carry out forcing to be distributed dividing according to region to block Match, avoids because the calculation power for digging mine is excessively concentrated, the generation of the most of block of mine factory monopolization of ranking several former so that pass through area Block is more reliable to the certification of art sales process.
Description of the drawings
Fig. 1 is authentication method flow chart during art sales provided in an embodiment of the present invention.
Specific implementation mode
As shown in Figure 1, in embodiments of the present invention, authentication method during a kind of art sales includes the following steps:
The art work is scanned, art work identification feature information is parsed from scanning result.
In the present embodiment, the art work can be jewelry, calligraphy and painting or porcelain etc..Each art work identification feature is believed Breath can be different, such as calligraphy and painting, and art work identification feature information may include using the color of ink, type, the place of production of paper, Quality, lines, font type, vigour of style in writing feature etc..Art work identification feature information is the unique identifier of art work itself Information.
Art work identification feature information is subjected to type division, and configures the corresponding identification description of variety classes characteristic information Information.
Optionally, such as by being divided into the color of ink, type black information is used, the place of production of paper, quality, lines is divided For paper information, font type, vigour of style in writing feature are divided into written information, specific type division can be more or less.Configuration The corresponding identification description information of variety classes characteristic information is a big improvement of the present embodiment, and the identification description information is auxiliary The tutorial message for understanding art work identification feature information can contribute to ordinary user and differentiate to the true and false of the art work.Existing In technology, this type of information there is no to assist, the form differentiated often by expert is identified, even masonry certificate, often The characteristic of masonry itself is only described, and for how to be identified, it does not often record, especially for painting and calligraphy, porcelain The equal arts work, the gateway often differentiated are more.
The mapping relations for establishing identification description information and species characteristic information, art work identification feature information, type is special Reference breath, identification description information are converted to original character string information;
The block for art sales certification is generated based on time scheduling rule, using original character string information as original Block is written in information.
The block for being used for art sales certification is generated based on time scheduling rule by configuring, and is avoided because digging the calculation of mine Power is excessively concentrated, the generation of the most of block of mine factory monopolization of ranking several former so that by block to art sales process Certification it is more reliable.
During art sales of the present invention in authentication method,
It is described to further include later using original character string information as raw information write-in block:
After the art work merchandise each time, both parties' information, transaction value information, loco information are converted For the character string information that circulates;
Block is written into as circulation information in circulation character string information.
During art sales of the present invention in authentication method,
It is described to further include later using circulation character string information as circulation information write-in block:
When the art work is merchandised, read block Central Plains beginning information, circulation information to the historical transactional information of the art work, True and false information is authenticated.
During art sales of the present invention in authentication method,
Described generated based on time scheduling rule is included the following steps for the block of art sales certification:
Block generates allocation rule, calculates power recognition rule in block generating process in S01, configuration block chain.
In the prior art, the allocation rule generated without block is gone yuan often by power size is calculated to determine generation Node contribution margin, although the determination of contribution margin there are many mode, does not have distribution mechanism;And simple passes through calculation power Size determines contribution margin so that large-scale mortar businesses concentrate a large amount of high-performance computers or server to be far longer than The calculation power of common computer is to obtain more blocks.This step, can be right by generating allocation rule, calculating power recognition rule It distinguishes to generate and be allocated, and the mine factory running that profession digs mine can be limited to a certain extent, improve its operating cost.
S02, block sum in allocation rule generation block chain is generated by block, and by block sum according to network address Section is allocated each network address section of acquisition and corresponds to block pond;
Optionally, block sum is allocated according to network address section and can carries out segmentation division by IP address with 1., Can also 2. IP address in such a way that MAC Address is combined or 3. pass through backbone network, IP Address in LAN distribution rule Then determine.
Optionally,
Block sum is allocated each network address section of acquisition according to network address section in the step S02 and corresponds to area Block pond includes:
Network address is divided into the network address section of different levels;
Block sum divide according to the network address section of different levels and obtains each hierarchical network address field correspondence Block pond.
In a preferred embodiment of the invention, by the way that network address to be divided into the network address section of different levels, and it is final Divide and obtain each hierarchical network address field and correspond to block pond, for example allocation rule is as follows:
First level network address section A, B, C, and limit the transformation that A, B, C correspond to block in block pond.
Further, in the second level network address section, A is divided into a1, a2, a3, and limits a1, a2, a3 correspondence The transformation of block in block pond, and can connect and be finely divided.
Preferred embodiment through the invention not only needs the requirement for meeting block pond in this hierarchical network address field, also needs The hierarchical network address field for meeting this hierarchical network address field or more corresponds to the requirement in block pond so that block generate when pair In limitation more the having levels property of quantity.
Optionally,
It is described according to network address section configure each network address section interior nodes and generate the mutual exclusion rule of block chain include:
According to the network address section configuration node of different levels different levels network address section standard request rate;
The mutual exclusion rule of block chain is generated according to standard request rate.
In a preferred embodiment of the invention, standard request rate is that the node asked in the hierarchical network address field accounts for all sections The ratio value of point, standard request rate are to generate the mutual exclusion rule of block chain.
The block generation request of S03, receiving node, whether the block of decision node generates asks corresponding request time full Foot presets cooling time, and step S04 is jumped to when meeting, and the block for otherwise refusing node generates request;
Optionally, the set-up mode that cooling time is set in the step S03 can be fixed cooling time, or floating Dynamic cooling time, floating length cooling time and the number of blocks that the node generates are proportional.
S04, allocation rule is generated according to preset block, calculates power recognition rule generation block.
Optionally, the step S04 includes:
The block generation request of S1, receiving node, determine the network address section where the node of request, and judge place net It corresponds to whether block pond reaches the upper limit in network address field, step S4 is jumped to when reaching the upper limit, otherwise jump to step S2;
S2, judge whether the node of request occurs calculating power exception by calculating power recognition rule, jumped when power exception is calculated in appearance Step S4 is gone to, step S3 is otherwise jumped to;
Optionally,
Judge whether the node of request occurs calculating power including extremely by calculating power recognition rule in the step S2:
S21, it is sent to node and calculates power test program, and the calculation power test result of receiving node feedback;
S22, judge whether the node of request occurs calculating power exception according to calculation power test result.
Optionally,
Further include before the step S21:
The mutual exclusion rule that each network address section interior nodes generate block chain is configured according to network address section;
Corresponding node, which is configured, according to mutual exclusion rule calculates power adjustment rule.
Optionally, configuring corresponding node calculation power adjustment rule according to mutual exclusion rule includes:
θ=δ12*...δn, wherein θ is that node calculates power Tuning function, δ1For node this level network address section Standard request rate, δ2For node the network address section of last layer grade standard request rate, and so on, n be node where Total level of network address section.
Optionally,
The step S21 includes:
S211, it is sent to node and calculates power test program, the calculation power test program includes floating-point operation, node unique identification Code obtains program;
The calculation power test result of the feedback of S222, receiving node, the calculation power test result include floating-point operation result, section Point unique identifier.
Correspondingly, the step S22 includes:
S221, judge whether the node of request meets mutual exclusion rule, when meeting mutual exclusion rule, jump to step S3;It is no Then jump to step S222;
S222, the calculation power that the node entry that power adjustment rule adjustment is asked is calculated according to node influence coefficient;
Optionally, the value of θ, which is the calculation power for the node entry asked, influences coefficient.
S223, the calculation power for influencing the node of the request after coefficient is adjusted by calculating power, and judge the request after adjustment Node calculation power whether calculate power exception.
Calculation power of the product of the calculation power of calculation power influence coefficient and the node of request as the node of the request after adjustment.
Optionally, power outlier threshold is calculated in setting, and the calculation power of the node of the request after adjustment is carried out with power outlier threshold is calculated Comparison then confirms that the calculation power of the node of the request after adjustment is abnormal if it is greater than power outlier threshold is calculated.
S3, new block is generated according to default block create-rule information, and terminated;
Optionally, during art sales of the present invention in authentication method,
The step S3 includes:
Using the calculation power of the node of the request after adjustment as contribution margin according to generation new block.
S4, the block for refusing node generate request.
Advantageous effects:Authentication method compared with the existing technology, can be realized during the art sales of the present invention: It is generated by the block of decision node and asks whether corresponding request time meets default cooling time, avoided a certain in network A little nodes are constantly dug mine;Allocation rule is generated by block and generates block sum in block chain, and block sum is pressed It is allocated each network address section of acquisition according to network address section and corresponds to block pond, block can be carried out forcing to divide according to region Cloth distributes, and avoids because the calculation power for digging mine is excessively concentrated, the generation of the most of block of mine factory monopolization of ranking several former.
It is understood that for those of ordinary skill in the art, can be conceived with the technique according to the invention and be done Go out various other corresponding changes and deformation, and all these changes and deformation should all belong to the protection model of the claims in the present invention It encloses.

Claims (10)

1. authentication method during a kind of art sales, which is characterized in that include the following steps:
The art work is scanned, art work identification feature information is parsed from scanning result;
Art work identification feature information is subjected to type division, and configures the corresponding identification description letter of variety classes characteristic information Breath;
The mapping relations for establishing identification description information and species characteristic information believe art work identification feature information, species characteristic Breath, identification description information are converted to original character string information;
The block for art sales certification is generated based on time scheduling rule, using original character string information as raw information Block is written.
2. authentication method during art sales as described in claim 1, which is characterized in that
It is described to further include later using original character string information as raw information write-in block:
After the art work merchandise each time, both parties' information, transaction value information, loco information are converted into stream Logical character string information;
Block is written into as circulation information in circulation character string information.
3. authentication method during art sales as claimed in claim 2, which is characterized in that
It is described to further include later using circulation character string information as circulation information write-in block:
When the art work is merchandised, block Central Plains beginning information, historical transactional information, the true and false of the circulation information to the art work are read Information is authenticated.
4. authentication method during art sales as described in claim 1, which is characterized in that
Described generated based on time scheduling rule is included the following steps for the block of art sales certification:
Block generates allocation rule, calculates power recognition rule in block generating process in S01, configuration block chain;
S02, by block generate allocation rule generate block chain in block sum, and by block sum according to network address section into Row distribution obtains each network address section and corresponds to block pond;
S03, receiving node block generate request, the block of decision node generates that ask corresponding request time whether to meet pre- If cooling time, step S04 is jumped to when meeting, the block for otherwise refusing node generates request;
S04, allocation rule is generated according to preset block, calculates power recognition rule generation block.
5. authentication method during art sales as claimed in claim 4, which is characterized in that
The step S04 includes:
The block generation request of S1, receiving node, determine the network address section where the node of request, and with judging place network It corresponds to whether block pond reaches the upper limit in the section of location, step S4 is jumped to when reaching the upper limit, otherwise jumps to step S2;
S2, judge whether the node of request occurs calculating power exception by calculating power recognition rule, jumped to when power exception is calculated in appearance Otherwise step S4 jumps to step S3;
S3, new block is generated according to default block create-rule information, and terminated;
S4, the block for refusing node generate request.
6. authentication method during art sales as claimed in claim 5, which is characterized in that
Judge whether the node of request occurs calculating power including extremely by calculating power recognition rule in the step S2:
S21, it is sent to node and calculates power test program, and the calculation power test result of receiving node feedback;
S22, judge whether the node of request occurs calculating power exception according to calculation power test result.
7. authentication method during art sales as claimed in claim 6, which is characterized in that
Further include before the step S21:
The mutual exclusion rule that each network address section interior nodes generate block chain is configured according to network address section;
Corresponding node, which is configured, according to mutual exclusion rule calculates power adjustment rule;
Correspondingly, the step S22 includes:
S221, judge whether the node of request meets mutual exclusion rule, when meeting mutual exclusion rule, jump to step S3;Otherwise it jumps Go to step S222;
S222, the calculation power that the node entry that power adjustment rule adjustment is asked is calculated according to node influence coefficient;
S223, the calculation power for influencing the node of the request after coefficient is adjusted by calculating power, and judge the section of the request after adjustment Whether the calculation power of point calculates power exception.
8. authentication method during art sales as claimed in claim 6, which is characterized in that
Block sum is allocated each network address section of acquisition according to network address section in the step S02 and corresponds to block pond Including:
Network address is divided into the network address section of different levels;
The each hierarchical network address field of division acquisition is carried out to block sum according to the network address section of different levels and corresponds to block Pond.
9. authentication method during art sales as claimed in claim 8, which is characterized in that
It is described according to network address section configure each network address section interior nodes and generate the mutual exclusion rule of block chain include:
According to the network address section configuration node of different levels different levels network address section standard request rate;
The mutual exclusion rule of block chain is generated according to standard request rate.
10. authentication method during art sales as claimed in claim 6, which is characterized in that
The step S21 includes:
S211, it is sent to node and calculates power test program, the calculation power test program includes that floating-point operation, nodes unique identifier obtain Program fetch;
The calculation power test result of the feedback of S222, receiving node, the calculation power test result include floating-point operation result, node only One identification code;In addition
The step S3 includes:
Using the calculation power of the node of the request after adjustment as contribution margin according to generation new block.
CN201810156361.3A 2018-02-24 2018-02-24 Authentication method during art sales Withdrawn CN108510288A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810156361.3A CN108510288A (en) 2018-02-24 2018-02-24 Authentication method during art sales

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810156361.3A CN108510288A (en) 2018-02-24 2018-02-24 Authentication method during art sales

Publications (1)

Publication Number Publication Date
CN108510288A true CN108510288A (en) 2018-09-07

Family

ID=63375144

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810156361.3A Withdrawn CN108510288A (en) 2018-02-24 2018-02-24 Authentication method during art sales

Country Status (1)

Country Link
CN (1) CN108510288A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105956923A (en) * 2016-04-20 2016-09-21 上海如鸽投资有限公司 Asset transaction platform and digital certification and transaction method for assets
CN106991573A (en) * 2017-04-07 2017-07-28 中链科技有限公司 Art work fidelity method and server based on block chain technology
CN107240009A (en) * 2017-08-04 2017-10-10 北京中广掌视科技有限公司 A kind of VR remote auction systems based on art work copyright authentication and transaction source tracing method
CN107392631A (en) * 2017-08-03 2017-11-24 北京中广掌视科技有限公司 A kind of art work copyright authentication based on block chain and transaction source tracing method and system
CN107730384A (en) * 2017-11-13 2018-02-23 深圳大学 Art sales method and server, server end and system based on block chain

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105956923A (en) * 2016-04-20 2016-09-21 上海如鸽投资有限公司 Asset transaction platform and digital certification and transaction method for assets
CN106991573A (en) * 2017-04-07 2017-07-28 中链科技有限公司 Art work fidelity method and server based on block chain technology
CN107392631A (en) * 2017-08-03 2017-11-24 北京中广掌视科技有限公司 A kind of art work copyright authentication based on block chain and transaction source tracing method and system
CN107240009A (en) * 2017-08-04 2017-10-10 北京中广掌视科技有限公司 A kind of VR remote auction systems based on art work copyright authentication and transaction source tracing method
CN107730384A (en) * 2017-11-13 2018-02-23 深圳大学 Art sales method and server, server end and system based on block chain

Similar Documents

Publication Publication Date Title
JP4709398B2 (en) Method for checking image / document quality
US8601051B2 (en) Method, system and apparatus for changing avatar in online game
EP1081914A3 (en) Single sign-on for network system that includes multiple separately-controlled restricted access resources
CN112799636B (en) Random number generation method, device, equipment and storage medium
US20080114986A1 (en) Techniques for modification of access expiration conditions
CN108307000A (en) Block chain generation method based on time scheduling
CN106530469A (en) Method and device for controlling combination lock
CN110110509A (en) Right management method and Related product
CN104834490B (en) Print control system and method based on E-seal
US6393138B1 (en) Method of creating registration signature data for computerized signature collation scheme
CN109327473B (en) Identity authentication system based on block chain technology
Ogiela et al. Application of knowledge‐based cognitive CAPTCHA in Cloud of Things security
CN108510288A (en) Authentication method during art sales
CN107729924A (en) Picture review probability interval generation method and picture review decision method
CN105469788A (en) Voice information verification method and apparatus
CN101980477B (en) Method and device for detecting number of shadow users, and network equipment
CN111400692B (en) Electronic output system and method for hand-drawn pictures and texts
CN108460602A (en) Agricultural product source tracing method and system based on block certification
CN106327273A (en) STS-based prepaid electricity selling system and method
DE102011050156B4 (en) Secure electronic signing of documents
CN114389821B (en) Signature supervision method, device, equipment and storage medium based on block chain
CN108366136A (en) A kind of analysis method and device of domain name
CN115001714A (en) Resource access method and device, electronic equipment and storage medium
DE60108645T2 (en) METHOD AND DEVICE FOR CENTRALIZED AUTHENTICATION
CN111611567A (en) Authentication method and device, electronic whiteboard and computer readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication
WW01 Invention patent application withdrawn after publication

Application publication date: 20180907