CN108510288A - Authentication method during art sales - Google Patents
Authentication method during art sales Download PDFInfo
- Publication number
- CN108510288A CN108510288A CN201810156361.3A CN201810156361A CN108510288A CN 108510288 A CN108510288 A CN 108510288A CN 201810156361 A CN201810156361 A CN 201810156361A CN 108510288 A CN108510288 A CN 108510288A
- Authority
- CN
- China
- Prior art keywords
- block
- information
- node
- network address
- rule
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/018—Certifying business or products
- G06Q30/0185—Product, service or business identity fraud
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/06—Buying, selling or leasing transactions
- G06Q30/0601—Electronic shopping [e-shopping]
- G06Q30/0609—Buyer or seller confidence or verification
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/60—Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources
Abstract
Authentication method during a kind of art sales, includes the following steps:The art work is scanned, art work identification feature information is parsed from scanning result;Art work identification feature information is subjected to type division, and configures the corresponding identification description information of variety classes characteristic information;Art work identification feature information, species characteristic information, identification description information are converted to original character string information by the mapping relations for establishing identification description information and species characteristic information;The block for art sales certification is generated based on time scheduling rule, block is written using original character string information as raw information.
Description
Technical field
The present invention relates to art work digitlization transaction technology field, more particularly to authenticating party during a kind of art sales
Method.
Background technology
During art sales, there is two insoluble problems, first be the art work the true and false discrimination ask
Topic;Second be in the process of circulation can not into line trace and identification the problem of.Both of these problems become what the art work smoothly circulated
It hinders.
Block chain technology is decentralization, have to be suitable for skill as a kind of anonymous, decentralization technology, essence
Certification in art product process of exchange, however such as bit coin in reality, the calculation power for digging mine is excessively concentrated, the mine factory collection of ranking several former
The one third or so of whole calculation power is suffered, this present situation has violated the original idea of block chain technology so that existing block chain skill
Art can not adapt to art sales certification very well.
Invention content
In view of this, authentication method during a kind of art sales of present invention offer.
Authentication method during a kind of art sales, includes the following steps:
The art work is scanned, art work identification feature information is parsed from scanning result;
Art work identification feature information is subjected to type division, and configures the corresponding identification description of variety classes characteristic information
Information;
The mapping relations for establishing identification description information and species characteristic information, art work identification feature information, type is special
Reference breath, identification description information are converted to original character string information;
The block for art sales certification is generated based on time scheduling rule, using original character string information as original
Block is written in information.
During art sales of the present invention in authentication method,
It is described to further include later using original character string information as raw information write-in block:
After the art work merchandise each time, both parties' information, transaction value information, loco information are converted
For the character string information that circulates;
Block is written into as circulation information in circulation character string information.
During art sales of the present invention in authentication method,
It is described to further include later using circulation character string information as circulation information write-in block:
When the art work is merchandised, read block Central Plains beginning information, circulation information to the historical transactional information of the art work,
True and false information is authenticated.
During art sales of the present invention in authentication method,
Described generated based on time scheduling rule is included the following steps for the block of art sales certification:
Block generates allocation rule, calculates power recognition rule in block generating process in S01, configuration block chain;
S02, block sum in allocation rule generation block chain is generated by block, and by block sum according to network address
Section is allocated each network address section of acquisition and corresponds to block pond;
The block generation request of S03, receiving node, whether the block of decision node generates asks corresponding request time full
Foot presets cooling time, and step S04 is jumped to when meeting, and the block for otherwise refusing node generates request;
S04, allocation rule is generated according to preset block, calculates power recognition rule generation block.
During art sales of the present invention in authentication method,
The step S04 includes:
The block generation request of S1, receiving node, determine the network address section where the node of request, and judge place net
It corresponds to whether block pond reaches the upper limit in network address field, step S4 is jumped to when reaching the upper limit, otherwise jump to step S2;
S2, judge whether the node of request occurs calculating power exception by calculating power recognition rule, jumped when power exception is calculated in appearance
Step S4 is gone to, step S3 is otherwise jumped to;
S3, new block is generated according to default block create-rule information, and terminated;
S4, the block for refusing node generate request.
During art sales of the present invention in authentication method,
Judge whether the node of request occurs calculating power including extremely by calculating power recognition rule in the step S2:
S21, it is sent to node and calculates power test program, and the calculation power test result of receiving node feedback;
S22, judge whether the node of request occurs calculating power exception according to calculation power test result.
During art sales of the present invention in authentication method,
Further include before the step S21:
The mutual exclusion rule that each network address section interior nodes generate block chain is configured according to network address section;
Corresponding node, which is configured, according to mutual exclusion rule calculates power adjustment rule;
Correspondingly, the step S22 includes:
S221, judge whether the node of request meets mutual exclusion rule, when meeting mutual exclusion rule, jump to step S3;It is no
Then jump to step S222;
S222, the calculation power that the node entry that power adjustment rule adjustment is asked is calculated according to node influence coefficient;
S223, the calculation power for influencing the node of the request after coefficient is adjusted by calculating power, and judge the request after adjustment
Node calculation power whether calculate power exception.
During art sales of the present invention in authentication method,
Block sum is allocated each network address section of acquisition according to network address section in the step S02 and corresponds to area
Block pond includes:
Network address is divided into the network address section of different levels;
Block sum divide according to the network address section of different levels and obtains each hierarchical network address field correspondence
Block pond.
During art sales of the present invention in authentication method,
It is described according to network address section configure each network address section interior nodes and generate the mutual exclusion rule of block chain include:
According to the network address section configuration node of different levels different levels network address section standard request rate;
The mutual exclusion rule of block chain is generated according to standard request rate.
During art sales of the present invention in authentication method,
The step S21 includes:
S211, it is sent to node and calculates power test program, the calculation power test program includes floating-point operation, node unique identification
Code obtains program;
The calculation power test result of the feedback of S222, receiving node, the calculation power test result include floating-point operation result, section
Point unique identifier;In addition
The step S3 includes:
Using the calculation power of the node of the request after adjustment as contribution margin according to generation new block.
Advantageous effects:Authentication method compared with the existing technology, can be realized during the art sales of the present invention:
The identification information and Transaction Information of the art work are authenticated by block, substantially increase the credibility of certification;In addition pass through
The block of decision node, which generates, asks whether corresponding request time meets default cooling time, avoids certain some section in network
Point is constantly dug mine;Allocation rule is generated by block and generates block sum in block chain, and by block sum according to net
Network address field is allocated each network address section of acquisition and corresponds to block pond, can carry out forcing to be distributed dividing according to region to block
Match, avoids because the calculation power for digging mine is excessively concentrated, the generation of the most of block of mine factory monopolization of ranking several former so that pass through area
Block is more reliable to the certification of art sales process.
Description of the drawings
Fig. 1 is authentication method flow chart during art sales provided in an embodiment of the present invention.
Specific implementation mode
As shown in Figure 1, in embodiments of the present invention, authentication method during a kind of art sales includes the following steps:
The art work is scanned, art work identification feature information is parsed from scanning result.
In the present embodiment, the art work can be jewelry, calligraphy and painting or porcelain etc..Each art work identification feature is believed
Breath can be different, such as calligraphy and painting, and art work identification feature information may include using the color of ink, type, the place of production of paper,
Quality, lines, font type, vigour of style in writing feature etc..Art work identification feature information is the unique identifier of art work itself
Information.
Art work identification feature information is subjected to type division, and configures the corresponding identification description of variety classes characteristic information
Information.
Optionally, such as by being divided into the color of ink, type black information is used, the place of production of paper, quality, lines is divided
For paper information, font type, vigour of style in writing feature are divided into written information, specific type division can be more or less.Configuration
The corresponding identification description information of variety classes characteristic information is a big improvement of the present embodiment, and the identification description information is auxiliary
The tutorial message for understanding art work identification feature information can contribute to ordinary user and differentiate to the true and false of the art work.Existing
In technology, this type of information there is no to assist, the form differentiated often by expert is identified, even masonry certificate, often
The characteristic of masonry itself is only described, and for how to be identified, it does not often record, especially for painting and calligraphy, porcelain
The equal arts work, the gateway often differentiated are more.
The mapping relations for establishing identification description information and species characteristic information, art work identification feature information, type is special
Reference breath, identification description information are converted to original character string information;
The block for art sales certification is generated based on time scheduling rule, using original character string information as original
Block is written in information.
The block for being used for art sales certification is generated based on time scheduling rule by configuring, and is avoided because digging the calculation of mine
Power is excessively concentrated, the generation of the most of block of mine factory monopolization of ranking several former so that by block to art sales process
Certification it is more reliable.
During art sales of the present invention in authentication method,
It is described to further include later using original character string information as raw information write-in block:
After the art work merchandise each time, both parties' information, transaction value information, loco information are converted
For the character string information that circulates;
Block is written into as circulation information in circulation character string information.
During art sales of the present invention in authentication method,
It is described to further include later using circulation character string information as circulation information write-in block:
When the art work is merchandised, read block Central Plains beginning information, circulation information to the historical transactional information of the art work,
True and false information is authenticated.
During art sales of the present invention in authentication method,
Described generated based on time scheduling rule is included the following steps for the block of art sales certification:
Block generates allocation rule, calculates power recognition rule in block generating process in S01, configuration block chain.
In the prior art, the allocation rule generated without block is gone yuan often by power size is calculated to determine generation
Node contribution margin, although the determination of contribution margin there are many mode, does not have distribution mechanism;And simple passes through calculation power
Size determines contribution margin so that large-scale mortar businesses concentrate a large amount of high-performance computers or server to be far longer than
The calculation power of common computer is to obtain more blocks.This step, can be right by generating allocation rule, calculating power recognition rule
It distinguishes to generate and be allocated, and the mine factory running that profession digs mine can be limited to a certain extent, improve its operating cost.
S02, block sum in allocation rule generation block chain is generated by block, and by block sum according to network address
Section is allocated each network address section of acquisition and corresponds to block pond;
Optionally, block sum is allocated according to network address section and can carries out segmentation division by IP address with 1.,
Can also 2. IP address in such a way that MAC Address is combined or 3. pass through backbone network, IP Address in LAN distribution rule
Then determine.
Optionally,
Block sum is allocated each network address section of acquisition according to network address section in the step S02 and corresponds to area
Block pond includes:
Network address is divided into the network address section of different levels;
Block sum divide according to the network address section of different levels and obtains each hierarchical network address field correspondence
Block pond.
In a preferred embodiment of the invention, by the way that network address to be divided into the network address section of different levels, and it is final
Divide and obtain each hierarchical network address field and correspond to block pond, for example allocation rule is as follows:
First level network address section A, B, C, and limit the transformation that A, B, C correspond to block in block pond.
Further, in the second level network address section, A is divided into a1, a2, a3, and limits a1, a2, a3 correspondence
The transformation of block in block pond, and can connect and be finely divided.
Preferred embodiment through the invention not only needs the requirement for meeting block pond in this hierarchical network address field, also needs
The hierarchical network address field for meeting this hierarchical network address field or more corresponds to the requirement in block pond so that block generate when pair
In limitation more the having levels property of quantity.
Optionally,
It is described according to network address section configure each network address section interior nodes and generate the mutual exclusion rule of block chain include:
According to the network address section configuration node of different levels different levels network address section standard request rate;
The mutual exclusion rule of block chain is generated according to standard request rate.
In a preferred embodiment of the invention, standard request rate is that the node asked in the hierarchical network address field accounts for all sections
The ratio value of point, standard request rate are to generate the mutual exclusion rule of block chain.
The block generation request of S03, receiving node, whether the block of decision node generates asks corresponding request time full
Foot presets cooling time, and step S04 is jumped to when meeting, and the block for otherwise refusing node generates request;
Optionally, the set-up mode that cooling time is set in the step S03 can be fixed cooling time, or floating
Dynamic cooling time, floating length cooling time and the number of blocks that the node generates are proportional.
S04, allocation rule is generated according to preset block, calculates power recognition rule generation block.
Optionally, the step S04 includes:
The block generation request of S1, receiving node, determine the network address section where the node of request, and judge place net
It corresponds to whether block pond reaches the upper limit in network address field, step S4 is jumped to when reaching the upper limit, otherwise jump to step S2;
S2, judge whether the node of request occurs calculating power exception by calculating power recognition rule, jumped when power exception is calculated in appearance
Step S4 is gone to, step S3 is otherwise jumped to;
Optionally,
Judge whether the node of request occurs calculating power including extremely by calculating power recognition rule in the step S2:
S21, it is sent to node and calculates power test program, and the calculation power test result of receiving node feedback;
S22, judge whether the node of request occurs calculating power exception according to calculation power test result.
Optionally,
Further include before the step S21:
The mutual exclusion rule that each network address section interior nodes generate block chain is configured according to network address section;
Corresponding node, which is configured, according to mutual exclusion rule calculates power adjustment rule.
Optionally, configuring corresponding node calculation power adjustment rule according to mutual exclusion rule includes:
θ=δ1*δ2*...δn, wherein θ is that node calculates power Tuning function, δ1For node this level network address section
Standard request rate, δ2For node the network address section of last layer grade standard request rate, and so on, n be node where
Total level of network address section.
Optionally,
The step S21 includes:
S211, it is sent to node and calculates power test program, the calculation power test program includes floating-point operation, node unique identification
Code obtains program;
The calculation power test result of the feedback of S222, receiving node, the calculation power test result include floating-point operation result, section
Point unique identifier.
Correspondingly, the step S22 includes:
S221, judge whether the node of request meets mutual exclusion rule, when meeting mutual exclusion rule, jump to step S3;It is no
Then jump to step S222;
S222, the calculation power that the node entry that power adjustment rule adjustment is asked is calculated according to node influence coefficient;
Optionally, the value of θ, which is the calculation power for the node entry asked, influences coefficient.
S223, the calculation power for influencing the node of the request after coefficient is adjusted by calculating power, and judge the request after adjustment
Node calculation power whether calculate power exception.
Calculation power of the product of the calculation power of calculation power influence coefficient and the node of request as the node of the request after adjustment.
Optionally, power outlier threshold is calculated in setting, and the calculation power of the node of the request after adjustment is carried out with power outlier threshold is calculated
Comparison then confirms that the calculation power of the node of the request after adjustment is abnormal if it is greater than power outlier threshold is calculated.
S3, new block is generated according to default block create-rule information, and terminated;
Optionally, during art sales of the present invention in authentication method,
The step S3 includes:
Using the calculation power of the node of the request after adjustment as contribution margin according to generation new block.
S4, the block for refusing node generate request.
Advantageous effects:Authentication method compared with the existing technology, can be realized during the art sales of the present invention:
It is generated by the block of decision node and asks whether corresponding request time meets default cooling time, avoided a certain in network
A little nodes are constantly dug mine;Allocation rule is generated by block and generates block sum in block chain, and block sum is pressed
It is allocated each network address section of acquisition according to network address section and corresponds to block pond, block can be carried out forcing to divide according to region
Cloth distributes, and avoids because the calculation power for digging mine is excessively concentrated, the generation of the most of block of mine factory monopolization of ranking several former.
It is understood that for those of ordinary skill in the art, can be conceived with the technique according to the invention and be done
Go out various other corresponding changes and deformation, and all these changes and deformation should all belong to the protection model of the claims in the present invention
It encloses.
Claims (10)
1. authentication method during a kind of art sales, which is characterized in that include the following steps:
The art work is scanned, art work identification feature information is parsed from scanning result;
Art work identification feature information is subjected to type division, and configures the corresponding identification description letter of variety classes characteristic information
Breath;
The mapping relations for establishing identification description information and species characteristic information believe art work identification feature information, species characteristic
Breath, identification description information are converted to original character string information;
The block for art sales certification is generated based on time scheduling rule, using original character string information as raw information
Block is written.
2. authentication method during art sales as described in claim 1, which is characterized in that
It is described to further include later using original character string information as raw information write-in block:
After the art work merchandise each time, both parties' information, transaction value information, loco information are converted into stream
Logical character string information;
Block is written into as circulation information in circulation character string information.
3. authentication method during art sales as claimed in claim 2, which is characterized in that
It is described to further include later using circulation character string information as circulation information write-in block:
When the art work is merchandised, block Central Plains beginning information, historical transactional information, the true and false of the circulation information to the art work are read
Information is authenticated.
4. authentication method during art sales as described in claim 1, which is characterized in that
Described generated based on time scheduling rule is included the following steps for the block of art sales certification:
Block generates allocation rule, calculates power recognition rule in block generating process in S01, configuration block chain;
S02, by block generate allocation rule generate block chain in block sum, and by block sum according to network address section into
Row distribution obtains each network address section and corresponds to block pond;
S03, receiving node block generate request, the block of decision node generates that ask corresponding request time whether to meet pre-
If cooling time, step S04 is jumped to when meeting, the block for otherwise refusing node generates request;
S04, allocation rule is generated according to preset block, calculates power recognition rule generation block.
5. authentication method during art sales as claimed in claim 4, which is characterized in that
The step S04 includes:
The block generation request of S1, receiving node, determine the network address section where the node of request, and with judging place network
It corresponds to whether block pond reaches the upper limit in the section of location, step S4 is jumped to when reaching the upper limit, otherwise jumps to step S2;
S2, judge whether the node of request occurs calculating power exception by calculating power recognition rule, jumped to when power exception is calculated in appearance
Otherwise step S4 jumps to step S3;
S3, new block is generated according to default block create-rule information, and terminated;
S4, the block for refusing node generate request.
6. authentication method during art sales as claimed in claim 5, which is characterized in that
Judge whether the node of request occurs calculating power including extremely by calculating power recognition rule in the step S2:
S21, it is sent to node and calculates power test program, and the calculation power test result of receiving node feedback;
S22, judge whether the node of request occurs calculating power exception according to calculation power test result.
7. authentication method during art sales as claimed in claim 6, which is characterized in that
Further include before the step S21:
The mutual exclusion rule that each network address section interior nodes generate block chain is configured according to network address section;
Corresponding node, which is configured, according to mutual exclusion rule calculates power adjustment rule;
Correspondingly, the step S22 includes:
S221, judge whether the node of request meets mutual exclusion rule, when meeting mutual exclusion rule, jump to step S3;Otherwise it jumps
Go to step S222;
S222, the calculation power that the node entry that power adjustment rule adjustment is asked is calculated according to node influence coefficient;
S223, the calculation power for influencing the node of the request after coefficient is adjusted by calculating power, and judge the section of the request after adjustment
Whether the calculation power of point calculates power exception.
8. authentication method during art sales as claimed in claim 6, which is characterized in that
Block sum is allocated each network address section of acquisition according to network address section in the step S02 and corresponds to block pond
Including:
Network address is divided into the network address section of different levels;
The each hierarchical network address field of division acquisition is carried out to block sum according to the network address section of different levels and corresponds to block
Pond.
9. authentication method during art sales as claimed in claim 8, which is characterized in that
It is described according to network address section configure each network address section interior nodes and generate the mutual exclusion rule of block chain include:
According to the network address section configuration node of different levels different levels network address section standard request rate;
The mutual exclusion rule of block chain is generated according to standard request rate.
10. authentication method during art sales as claimed in claim 6, which is characterized in that
The step S21 includes:
S211, it is sent to node and calculates power test program, the calculation power test program includes that floating-point operation, nodes unique identifier obtain
Program fetch;
The calculation power test result of the feedback of S222, receiving node, the calculation power test result include floating-point operation result, node only
One identification code;In addition
The step S3 includes:
Using the calculation power of the node of the request after adjustment as contribution margin according to generation new block.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810156361.3A CN108510288A (en) | 2018-02-24 | 2018-02-24 | Authentication method during art sales |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810156361.3A CN108510288A (en) | 2018-02-24 | 2018-02-24 | Authentication method during art sales |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108510288A true CN108510288A (en) | 2018-09-07 |
Family
ID=63375144
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810156361.3A Withdrawn CN108510288A (en) | 2018-02-24 | 2018-02-24 | Authentication method during art sales |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108510288A (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105956923A (en) * | 2016-04-20 | 2016-09-21 | 上海如鸽投资有限公司 | Asset transaction platform and digital certification and transaction method for assets |
CN106991573A (en) * | 2017-04-07 | 2017-07-28 | 中链科技有限公司 | Art work fidelity method and server based on block chain technology |
CN107240009A (en) * | 2017-08-04 | 2017-10-10 | 北京中广掌视科技有限公司 | A kind of VR remote auction systems based on art work copyright authentication and transaction source tracing method |
CN107392631A (en) * | 2017-08-03 | 2017-11-24 | 北京中广掌视科技有限公司 | A kind of art work copyright authentication based on block chain and transaction source tracing method and system |
CN107730384A (en) * | 2017-11-13 | 2018-02-23 | 深圳大学 | Art sales method and server, server end and system based on block chain |
-
2018
- 2018-02-24 CN CN201810156361.3A patent/CN108510288A/en not_active Withdrawn
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105956923A (en) * | 2016-04-20 | 2016-09-21 | 上海如鸽投资有限公司 | Asset transaction platform and digital certification and transaction method for assets |
CN106991573A (en) * | 2017-04-07 | 2017-07-28 | 中链科技有限公司 | Art work fidelity method and server based on block chain technology |
CN107392631A (en) * | 2017-08-03 | 2017-11-24 | 北京中广掌视科技有限公司 | A kind of art work copyright authentication based on block chain and transaction source tracing method and system |
CN107240009A (en) * | 2017-08-04 | 2017-10-10 | 北京中广掌视科技有限公司 | A kind of VR remote auction systems based on art work copyright authentication and transaction source tracing method |
CN107730384A (en) * | 2017-11-13 | 2018-02-23 | 深圳大学 | Art sales method and server, server end and system based on block chain |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP4709398B2 (en) | Method for checking image / document quality | |
US8601051B2 (en) | Method, system and apparatus for changing avatar in online game | |
EP1081914A3 (en) | Single sign-on for network system that includes multiple separately-controlled restricted access resources | |
CN112799636B (en) | Random number generation method, device, equipment and storage medium | |
US20080114986A1 (en) | Techniques for modification of access expiration conditions | |
CN108307000A (en) | Block chain generation method based on time scheduling | |
CN106530469A (en) | Method and device for controlling combination lock | |
CN110110509A (en) | Right management method and Related product | |
CN104834490B (en) | Print control system and method based on E-seal | |
US6393138B1 (en) | Method of creating registration signature data for computerized signature collation scheme | |
CN109327473B (en) | Identity authentication system based on block chain technology | |
Ogiela et al. | Application of knowledge‐based cognitive CAPTCHA in Cloud of Things security | |
CN108510288A (en) | Authentication method during art sales | |
CN107729924A (en) | Picture review probability interval generation method and picture review decision method | |
CN105469788A (en) | Voice information verification method and apparatus | |
CN101980477B (en) | Method and device for detecting number of shadow users, and network equipment | |
CN111400692B (en) | Electronic output system and method for hand-drawn pictures and texts | |
CN108460602A (en) | Agricultural product source tracing method and system based on block certification | |
CN106327273A (en) | STS-based prepaid electricity selling system and method | |
DE102011050156B4 (en) | Secure electronic signing of documents | |
CN114389821B (en) | Signature supervision method, device, equipment and storage medium based on block chain | |
CN108366136A (en) | A kind of analysis method and device of domain name | |
CN115001714A (en) | Resource access method and device, electronic equipment and storage medium | |
DE60108645T2 (en) | METHOD AND DEVICE FOR CENTRALIZED AUTHENTICATION | |
CN111611567A (en) | Authentication method and device, electronic whiteboard and computer readable storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WW01 | Invention patent application withdrawn after publication | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20180907 |