CN108764908A - A kind of assets method for anti-counterfeit and system, equipment and storage medium - Google Patents
A kind of assets method for anti-counterfeit and system, equipment and storage medium Download PDFInfo
- Publication number
- CN108764908A CN108764908A CN201810555608.9A CN201810555608A CN108764908A CN 108764908 A CN108764908 A CN 108764908A CN 201810555608 A CN201810555608 A CN 201810555608A CN 108764908 A CN108764908 A CN 108764908A
- Authority
- CN
- China
- Prior art keywords
- information
- trustship
- assets
- signature
- testing result
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 26
- 238000003860 storage Methods 0.000 title claims abstract description 15
- 238000012360 testing method Methods 0.000 claims abstract description 52
- 238000007689 inspection Methods 0.000 claims abstract description 49
- 238000012795 verification Methods 0.000 claims abstract description 8
- 238000004590 computer program Methods 0.000 claims description 6
- 238000013473 artificial intelligence Methods 0.000 claims description 3
- 230000005540 biological transmission Effects 0.000 claims description 3
- 238000009826 distribution Methods 0.000 claims description 2
- 235000013399 edible fruits Nutrition 0.000 claims description 2
- 238000004519 manufacturing process Methods 0.000 claims description 2
- 238000005516 engineering process Methods 0.000 abstract description 5
- 238000001514 detection method Methods 0.000 abstract description 4
- 230000009286 beneficial effect Effects 0.000 abstract description 2
- 238000005242 forging Methods 0.000 abstract 1
- 238000010586 diagram Methods 0.000 description 7
- 230000006870 function Effects 0.000 description 6
- 230000006854 communication Effects 0.000 description 4
- 238000004891 communication Methods 0.000 description 3
- 238000012544 monitoring process Methods 0.000 description 2
- BASFCYQUMIYNBI-UHFFFAOYSA-N platinum Chemical compound [Pt] BASFCYQUMIYNBI-UHFFFAOYSA-N 0.000 description 2
- 238000012545 processing Methods 0.000 description 2
- 230000015572 biosynthetic process Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- PCHJSUWPFVWCPO-UHFFFAOYSA-N gold Chemical compound [Au] PCHJSUWPFVWCPO-UHFFFAOYSA-N 0.000 description 1
- 229910052737 gold Inorganic materials 0.000 description 1
- 239000010931 gold Substances 0.000 description 1
- 238000009434 installation Methods 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 230000014759 maintenance of location Effects 0.000 description 1
- 229910052697 platinum Inorganic materials 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
- 229910052709 silver Inorganic materials 0.000 description 1
- 239000004332 silver Substances 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3829—Payment protocols; Details thereof insuring higher security of transaction involving key management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3825—Use of electronic signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/018—Certifying business or products
- G06Q30/0185—Product, service or business identity fraud
Abstract
The invention discloses a kind of assets method for anti-counterfeit and system, equipment and storage mediums, include the following steps:The signature trustship information that deposit mechanism is sent is received, and the signature trustship information is recorded on block chain;The signature check information that acceptance inspection side is sent, and the signature check information is recorded on block chain;Separately verify the signature trustship information and the signature check information, and in verification by comparing the trustship testing result information and the inspection testing result information, according to comparison result judge the assets examined whether genuine piece, and comparing result is recorded on block chain.Beneficial effects of the present invention are:It based on block chain technology, prevents from artificially forging altered data, detection record can be searched at any time, protect the interests of user.
Description
Technical field
The present invention relates to block chain fields more particularly to a kind of based on the assets method for anti-counterfeit and system of block chain, equipment
And storage medium.
Background technology
Existing assets such as gold, platinum, the anti-fake method majority such as silver be by the parameter of assets take pictures video recording and with
Trusteeship party's folk prescription or multi-party database carry out the true or false that assets are checked in comparison, and in assets deposit, trusteeship party provides to during trustship
The check of production is during these, and all data only have trusteeship party's folk prescription to possess, and such case easily causes inside trusteeship party
The case where even if database is tampered, and equity holders are also unaware of.It would therefore be desirable to have a kind of method for anti-counterfeit to improve this number
According to library limitation, the problem of data are easy to be tampered.
Invention content
In view of the above problems, above-mentioned limitation can be broken by needing a kind of assets method for anti-counterfeit, more open and clear
It determines the true and false of assets, and user can be made to understand the truth of oneself park assets at any time.
In a first aspect, the present invention provides a kind of assets method for anti-counterfeit, it is based on block chain technology, all parameters of assets are believed
Breath is recorded on block chain, and data are safer, reliably, it is not easy to be tampered.Include the following steps:
The signature trustship information that deposit mechanism is sent is received, and signature trustship information is recorded on block chain;Wherein, it signs
Name trustship information carries out signature generation with the first private key held by deposit mechanism to the trustship testing result information of assets;
The signature check information that acceptance inspection side is sent, and signature check information is recorded on block chain;Wherein, it signs
Checking information carries out signature generation with the second private key held by inspection party to the inspection testing result information of assets;
Signature trustship information and signature check information are separately verified, and in verification by comparing trustship testing result information
With examine testing result information, according to comparison result judge inspection assets whether genuine piece.
Further, signature trustship information and signature check information are separately verified, and in verification by comparing trustship detection
Result information and inspection testing result information judge whether genuine piece includes the assets examined according to comparison result:
The first public key corresponding to the first private key is obtained, signature trustship information is verified with the first public key, judges to hold in the palm
Whether pipe testing result information is credible;
The second public key corresponding to the second private key is obtained, signature check information is verified with the second public key, judges to examine
Whether credible test testing result information;
In trustship testing result information and all credible inspection testing result information, trustship testing result information and inspection are compared
Test testing result information, according to comparison result judge examine assets whether genuine piece.
Further, in trustship testing result information and all credible inspection testing result information, trustship testing result is compared
Information and examine testing result information, according to comparison result judge inspection assets whether genuine piece when by the way of artificial intelligence
It is compared.
It further, can alert (such as sending out alarm sound) when comparing result fails.
Further, trustship testing result and inspection testing result include at least one of following:Cryptographic Hash, the money of assets parameter
Produce the abstract of parameter and assets parameter.
It includes at least one of following to examine testing result:The cryptographic Hash of assets parameter, the inspection result of assets parameter and inspection
Test the abstract of result.
Further, assets parameter include assets distribution when number, assets are taken pictures or are recorded a video comprehensively, the line of assets
Road or weight.
Second aspect, the invention also discloses a kind of assets anti-counterfeiting systems, including:
Trustship information recording unit receives the signature trustship information that deposit mechanism is sent, and will signature trustship information record
On block chain;Wherein, signature trustship information is by deposit mechanism trustship testing result of the first the held private key to assets
Information carries out signature generation;
Checking information recording unit, is configured to the signature check information of acceptance inspection side's transmission, and signature check is believed
Breath is recorded on block chain;Wherein, signature check information detects the inspection of assets with the second held private key by inspection party
Result information carries out signature generation;
Fake certification unit is configured to separately verify signature trustship information and signature check information, and logical in verification
Cross comparison trustship testing result information and examine testing result information, according to comparison result judge inspection assets whether genuine piece,
And comparing result is recorded on block chain;
Further, assets anti-counterfeiting system further includes:
Alarm unit, be configured to comparison result it is inconsistent when alert.
The third aspect, the invention also discloses a kind of equipment, including one or more processors and memory, for storing
One or more programs, wherein memory include can be by instruction that the one or more processors execute so that this or more
A processor executes the method for anti-counterfeit provided according to various embodiments of the present invention.
Fourth aspect, the present invention also provides a kind of storage mediums being stored with computer program, and the program is by processor
The method for anti-counterfeit that various embodiments of the present invention provide when execution.
Beneficial effects of the present invention are:Assets are by user's trustship, until intermediate inspection, to the end user take out,
All assets parameters can be found in block chain, detection record can be searched at any time, since data are recorded in block chain
On, transparent disclosure, user, deposit mechanism even other third parties cannot forge altered data, encroach on the interests of user.And
And through the invention, it during user can participate directly in deposit mechanism supervision, avoids existing user and assets is entrusted
After support, the annual limitation for only allowing checking storehouse finite number of time.
Description of the drawings
Fig. 1 is the flow chart of the park assets of method shown in the present invention.
Fig. 2 is the flow chart of the inspection assets of method shown in the present invention.
Fig. 3 is that the trustship information of method shown in the present invention compares flow chart with checking information.
Fig. 4 is schematic diagram in assets anti-counterfeiting system structure of the present invention.
Fig. 5 is the structural schematic diagram of the preferred embodiment of assets anti-counterfeiting system of the present invention.
Fig. 6 is a kind of structural schematic diagram for equipment that one embodiment of the invention provides.
Specific implementation mode
After assets are entrusted to deposit mechanism by user, deposit mechanism has a responsibility for the authenticity for being responsible for commission assets.
Referring to Fig.1, after assets are entrusted to deposit mechanism by user, trusteeship party first use camera arrangement, ultrasonic wave, X-ray, or
The detecting instruments such as electric installation record the relevant parameter that assets carry out, and obtain the relevant parameter of assets, including to assets
Number, assets shape is taken pictures or is recorded a video, records the parameters such as lines, the weight of assets, each number pair of assets
Unique product, parameter primary identity is answered the main character of the assets, convenient for checking the true and false in the future.After obtaining relevant parameter,
Hash obtains cryptographic Hash a, and detecting instrument Hash is obtained cryptographic Hash b, and deposit mechanism is with the first private key held to cryptographic Hash
Be recorded on block A after a, the assets parameter of acquisition and the digest of assets parameter, ensure the data can not tamper, this
Outer detecting instrument a generates cryptographic Hash b thirds private key signature to verify the cryptographic Hash for the detecting instrument.
After parameter acquiring, assets are stored in warehouse by trusteeship party, and using monitor or other monitoring instruments 24 on the market
Hour monitoring.And inspection party can be periodically or non-periodically assets are checked, ping procedure is following (with reference to Fig. 2):Inspection
Proved recipe is again detected assets using detecting instrument, the inspection result of assets parameter is obtained, after the inspection result Hash
Cryptographic Hash c is obtained, cryptographic Hash d is obtained after detecting instrument Hash, inspection party, to cryptographic Hash c, examines knot with the second private key held
Be recorded on block B after fruit and inspection result digest, in addition detecting instrument b to cryptographic Hash d with the 4th private key signature to test
The cryptographic Hash is demonstrate,proved to generate for the detecting instrument.
Here inspection party can be user, deposit mechanism or third party testing agency.
User and deposit mechanism can require to be detected, and can be detected with random inspection warehouse, can also user
Specified warehouse carries out selective examination detection, it is ensured that the product of deposit mechanism trustship is former genuine piece.
With reference to Fig. 3, by the fake certification unit in assets anti-counterfeiting system by the assets parameter being recorded on block A and area
Inspection result artificial intelligence AI comparisons on block B illustrate that assets are genuine piece, if it is inconsistent, assets if comparison is consistent
For counterfeit.
Finally, comparing result is uploaded on block chain, user can check oneself assets at any time by block platform chain
Current intelligence.
With reference to Fig. 4, assets anti-counterfeiting system includes
Trustship information recording unit receives the signature trustship information that deposit mechanism is sent, and will signature trustship information record
On block chain;Wherein, signature trustship information is by deposit mechanism trustship testing result of the first the held private key to assets
Information carries out signature generation;
Checking information recording unit, is configured to the signature check information of acceptance inspection side's transmission, and signature check is believed
Breath is recorded on block chain;Wherein, signature check information detects the inspection of assets with the second held private key by inspection party
Result information carries out signature generation;
Fake certification unit is configured to separately verify signature trustship information and signature check information, and logical in verification
Cross comparison trustship testing result information and examine testing result information, according to comparison result judge inspection assets whether genuine piece,
And comparing result is recorded on block chain;
Fig. 5 is a kind of preferred embodiment of system shown in Figure 4, and assets anti-counterfeiting system further includes:
Alarm unit, when the information of trustship information recording unit and the information contrast verification of checking information recording unit are obstructed
Out-of-date, alert (such as makes a sound).
With reference to Fig. 6, as on the other hand, present invention also provides a kind of equipment 10, including one or more central processings
Unit (CPU) 101 can be loaded according to the program being stored in read-only memory (ROM) 102 or from storage section 108
Various actions appropriate and processing are executed to the program in random access storage device (RAM) 103.In RAMX03, also store
There is equipment 10 to operate required various programs and data.CPUX01, ROMX02 and RAMX03 are connected with each other by bus 104.
Input/output (I/O) interface 105 is also connected to bus 104.
It is connected to I/O interfaces 105 with lower component:Importation 106 including keyboard, mouse etc.;It is penetrated including such as cathode
The output par, c 107 of spool (CRT), liquid crystal display (LCD) etc. and loud speaker etc.;Storage section 108 including hard disk etc.;
And the communications portion 109 of the network interface card including LAN card, modem etc..Communications portion 109 via such as because
The network of spy's net executes communication process.Driver 110 is also according to needing to be connected to I/O interfaces 105.Detachable media 111, such as
Disk, CD, magneto-optic disk, semiconductor memory etc. are mounted on driver 110, as needed in order to be read from thereon
Computer program be mounted into storage section 108 as needed.
Particularly, in accordance with an embodiment of the present disclosure, the assets method for anti-counterfeit of any of the above-described embodiment description can be implemented
For computer software programs.For example, embodiment of the disclosure includes a kind of computer program product comprising be tangibly embodied in
Computer program on machine readable media, computer program include the program code for executing assets method for anti-counterfeit.At this
In the embodiment of sample, which can be downloaded and installed by communications portion 109 from network, and/or from removable
Medium 111 is unloaded to be mounted.
As another aspect, present invention also provides a kind of computer readable storage medium, the computer-readable storage mediums
Matter can be computer readable storage medium included in the device of above-described embodiment;Can also be individualism, it is unassembled
Enter the computer readable storage medium in equipment.There are one computer-readable recording medium storages or more than one program, should
Program is used for executing the assets method for anti-counterfeit for being described in the application by one or more than one processor.
Flow chart in attached drawing and block diagram, it is illustrated that according to the system of various embodiments of the invention, method and computer journey
The architecture, function and operation in the cards of sequence product.In this regard, each box in flowchart or block diagram can generation
A part for a part for one module, program segment, or code of table, the module, program segment, or code includes one or more uses
The executable instruction of the logic function as defined in realization.It should also be noted that in some implementations as replacements, being marked in box
The function of note can also occur in a different order than that indicated in the drawings.For example, two boxes succeedingly indicated are actually
It can be basically executed in parallel, they can also be executed in the opposite order sometimes, this is depending on involved function.Also it wants
It is noted that the combination of each box in block diagram and or flow chart and the box in block diagram and or flow chart, Ke Yitong
The dedicated hardware based system of functions or operations as defined in executing is crossed to realize, or specialized hardware and calculating can be passed through
The combination of machine instruction is realized.
Being described in unit or module involved in the embodiment of the present application can be realized by way of software, can also
It is realized by way of hardware.Described unit or module can also be arranged in the processor, for example, each unit can be
Software program in computer or intelligent movable equipment is set, can also be the hardware device being separately configured.Wherein, these lists
The title of member or module does not constitute the restriction to the unit or module itself under certain conditions.
Above description is only the preferred embodiment of the application and the explanation to institute's application technology principle.People in the art
Member should be appreciated that invention scope involved in the application, however it is not limited to technology made of the specific combination of above-mentioned technical characteristic
Scheme, while should also cover in the case where not departing from the application design, appointed by above-mentioned technical characteristic or its equivalent feature
Other technical solutions of meaning combination and formation.Such as features described above has similar functions with (but not limited to) disclosed herein
Technical characteristic replaced mutually and the technical solution that is formed.
Claims (10)
1. a kind of assets method for anti-counterfeit, which is characterized in that include the following steps:
The signature trustship information that deposit mechanism is sent is received, and the signature trustship information is recorded on block chain;Wherein, institute
Signature trustship information is stated to sign the trustship testing result information of assets with the first private key held by the deposit mechanism
Name generates;
The signature check information that acceptance inspection side is sent, and the signature check information is recorded on block chain;Wherein, described
Signature check information carries out signature life with the second private key held by the inspection party to the inspection testing result information of assets
At;
The signature trustship information and the signature check information are separately verified, and is detected in verification by comparing the trustship
Result information and the inspection testing result information, according to comparison result judge examine assets whether genuine piece, and will comparison knot
Fruit is recorded on block chain.
2. according to the method described in claim 1, it is characterized in that, described separately verify the signature trustship information and the label
Name checking information, and in verification by comparing the trustship testing result information and the inspection testing result information, according to
Comparison result judges whether genuine piece includes the assets examined:
The first public key corresponding to first private key is obtained, the signature trustship information is tested with first public key
Card, judges whether the trustship testing result information is credible;
The second public key corresponding to second private key is obtained, the signature check information is tested with second public key
Card, judges whether the inspection testing result information is credible;
In the trustship testing result information and all credible inspection testing result information, the trustship testing result is compared
Information and the inspection testing result information, according to comparison result judge examine assets whether genuine piece.
3. according to the method described in claim 2, it is characterized in that, being detected in the trustship testing result information and the inspection
When result information is all credible, the trustship testing result information and the inspection testing result information are compared, according to comparison result
Judge examine assets whether genuine piece when compared by the way of artificial intelligence.
4. according to the method described in claim 3, it is characterized in that, when comparing result fails, alert is understood.
5. according to claim 1-4 any one of them methods, which is characterized in that the trustship testing result include it is following at least
One:The abstract of the cryptographic Hash of assets parameter, the assets parameter and the assets parameter;
It includes at least one of following to examine testing result:The cryptographic Hash of assets parameter, the inspection result of assets parameter and the inspection
Test the abstract of result.
6. according to the method described in claim 5, it is characterized in that, numbering, be right when the assets parameter includes assets distribution
Assets are taken pictures or are recorded a video comprehensively, the lines of assets or weight.
7. a kind of assets anti-counterfeiting system, which is characterized in that including:
Trustship information recording unit receives the signature trustship information that deposit mechanism is sent, and the signature trustship information is recorded
On block chain;Wherein, trustship of the signature trustship information by the deposit mechanism with the first held private key to assets
Testing result information carries out signature generation;
Checking information recording unit, is configured to the signature check information of acceptance inspection side's transmission, and the signature check is believed
Breath is recorded on block chain;Wherein, the signature check information uses the second held private key to assets by the inspection party
Testing result information is examined to carry out signature generation;
Fake certification unit is configured to separately verify the signature trustship information and the signature check information, and is verifying
When by comparing the trustship testing result information and the inspections testing result information, the money of inspection is judged according to comparison result
Production whether genuine piece, and comparing result is recorded on block chain.
8. system according to claim 7, which is characterized in that further include:
Alarm unit, be configured to comparison result it is inconsistent when alert.
9. a kind of equipment, which is characterized in that the equipment includes:
One or more processors;
Memory, for storing one or more programs,
When one or more of programs are executed by one or more of processors so that one or more of processors
Execute the method as described in any one of claim 1-6.
10. a kind of storage medium being stored with computer program, which is characterized in that realized when the program is executed by processor as weighed
Profit requires the method described in any one of 1-6.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810555608.9A CN108764908A (en) | 2018-06-01 | 2018-06-01 | A kind of assets method for anti-counterfeit and system, equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810555608.9A CN108764908A (en) | 2018-06-01 | 2018-06-01 | A kind of assets method for anti-counterfeit and system, equipment and storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108764908A true CN108764908A (en) | 2018-11-06 |
Family
ID=64001764
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810555608.9A Pending CN108764908A (en) | 2018-06-01 | 2018-06-01 | A kind of assets method for anti-counterfeit and system, equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108764908A (en) |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109508564A (en) * | 2018-12-20 | 2019-03-22 | 姚前 | A kind of digital asset storage system and method based on block chain |
CN109636391A (en) * | 2018-12-20 | 2019-04-16 | 姚前 | The confirmation method and system of assets under a kind of chain to trustship cochain |
CN109658104A (en) * | 2018-12-20 | 2019-04-19 | 姚前 | The system and method for assets consistency confirmation on a kind of chain |
CN109670833A (en) * | 2018-12-20 | 2019-04-23 | 姚前 | The trustship register system and method for assets under a kind of chain to cochain |
CN109685665A (en) * | 2018-12-20 | 2019-04-26 | 姚前 | The system and method for assets trustship transfer under a kind of chain |
CN110096903A (en) * | 2019-03-26 | 2019-08-06 | 罗克佳华科技集团股份有限公司 | Assets verification method and block chain network system based on block chain |
CN110548293A (en) * | 2019-09-02 | 2019-12-10 | 腾讯科技(深圳)有限公司 | information verification method and related device |
CN111161056A (en) * | 2018-11-07 | 2020-05-15 | 新明华区块链技术(深圳)有限公司 | Method, system and equipment for improving transaction security of digital assets |
CN112307516A (en) * | 2019-07-26 | 2021-02-02 | 傲为信息技术(江苏)有限公司 | Method for verifying and authenticating authenticity of digital assets |
CN113592222A (en) * | 2021-06-18 | 2021-11-02 | 长春市把手科技有限公司 | Product inspection and detection system and equipment based on block chain |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105610578A (en) * | 2016-01-25 | 2016-05-25 | 杭州复杂美科技有限公司 | Block chain information archiving and privacy protection method |
CN105959119A (en) * | 2016-06-09 | 2016-09-21 | 惠众商务顾问(北京)有限公司 | Random encryption physical information block chain anti-counterfeiting method, system and device |
CN106504097A (en) * | 2016-11-09 | 2017-03-15 | 北京金股链科技有限公司 | A kind for the treatment of method and apparatus of assets information |
CN107316239A (en) * | 2017-07-14 | 2017-11-03 | 众安信息技术服务有限公司 | A kind of authentification of message and source tracing method and system based on block chain |
CN107566116A (en) * | 2017-06-15 | 2018-01-09 | 中国银联股份有限公司 | The method and device of registration is really weighed for digital asset |
CN107888375A (en) * | 2017-11-08 | 2018-04-06 | 深圳市携网科技有限公司 | A kind of electronic evidence safety system and method based on block chain technology |
-
2018
- 2018-06-01 CN CN201810555608.9A patent/CN108764908A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105610578A (en) * | 2016-01-25 | 2016-05-25 | 杭州复杂美科技有限公司 | Block chain information archiving and privacy protection method |
CN105959119A (en) * | 2016-06-09 | 2016-09-21 | 惠众商务顾问(北京)有限公司 | Random encryption physical information block chain anti-counterfeiting method, system and device |
CN106504097A (en) * | 2016-11-09 | 2017-03-15 | 北京金股链科技有限公司 | A kind for the treatment of method and apparatus of assets information |
CN107566116A (en) * | 2017-06-15 | 2018-01-09 | 中国银联股份有限公司 | The method and device of registration is really weighed for digital asset |
CN107316239A (en) * | 2017-07-14 | 2017-11-03 | 众安信息技术服务有限公司 | A kind of authentification of message and source tracing method and system based on block chain |
CN107888375A (en) * | 2017-11-08 | 2018-04-06 | 深圳市携网科技有限公司 | A kind of electronic evidence safety system and method based on block chain technology |
Cited By (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111161056A (en) * | 2018-11-07 | 2020-05-15 | 新明华区块链技术(深圳)有限公司 | Method, system and equipment for improving transaction security of digital assets |
CN109685665B (en) * | 2018-12-20 | 2020-09-29 | 姚前 | System and method for under-chain asset hosting transfer |
CN109658104B (en) * | 2018-12-20 | 2022-10-21 | 姚前 | System and method for confirming asset consistency on chain |
CN109670833A (en) * | 2018-12-20 | 2019-04-23 | 姚前 | The trustship register system and method for assets under a kind of chain to cochain |
CN109685665A (en) * | 2018-12-20 | 2019-04-26 | 姚前 | The system and method for assets trustship transfer under a kind of chain |
CN109670833B (en) * | 2018-12-20 | 2023-06-16 | 姚前 | Escrow registration system and method for under-chain assets to be uplinked |
CN109658104A (en) * | 2018-12-20 | 2019-04-19 | 姚前 | The system and method for assets consistency confirmation on a kind of chain |
CN109508564A (en) * | 2018-12-20 | 2019-03-22 | 姚前 | A kind of digital asset storage system and method based on block chain |
CN109636391A (en) * | 2018-12-20 | 2019-04-16 | 姚前 | The confirmation method and system of assets under a kind of chain to trustship cochain |
CN110096903A (en) * | 2019-03-26 | 2019-08-06 | 罗克佳华科技集团股份有限公司 | Assets verification method and block chain network system based on block chain |
CN112307516A (en) * | 2019-07-26 | 2021-02-02 | 傲为信息技术(江苏)有限公司 | Method for verifying and authenticating authenticity of digital assets |
WO2021017637A1 (en) * | 2019-07-26 | 2021-02-04 | 南京瑞祥信息技术有限公司 | Method for verifying authenticity of authenticated digital asset |
CN110548293B (en) * | 2019-09-02 | 2021-09-21 | 腾讯科技(深圳)有限公司 | Information verification method and related device |
CN110548293A (en) * | 2019-09-02 | 2019-12-10 | 腾讯科技(深圳)有限公司 | information verification method and related device |
CN113592222A (en) * | 2021-06-18 | 2021-11-02 | 长春市把手科技有限公司 | Product inspection and detection system and equipment based on block chain |
CN113592222B (en) * | 2021-06-18 | 2023-07-28 | 长春市把手科技有限公司 | Block chain-based product inspection and detection system and equipment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108764908A (en) | A kind of assets method for anti-counterfeit and system, equipment and storage medium | |
US11848758B1 (en) | Secure messaging in a blockchain network | |
US20190303579A1 (en) | Decentralized, immutable, tamper-evident, directed acyclic graphs documenting software supply-chains with cryptographically signed records of software-development life cycle state and cryptographic digests of executable code | |
US20190305957A1 (en) | Execution smart contracts configured to establish trustworthiness of code before execution | |
CN107251513A (en) | System and method for the accurate guarantee of Malicious Code Detection | |
CN110413908A (en) | The method and apparatus classified based on web site contents to uniform resource locator | |
CN108681966A (en) | A kind of information monitoring method and device based on block chain | |
CN110177108A (en) | A kind of anomaly detection method, device and verifying system | |
CN111429162A (en) | Energized block chain agricultural product quality credible traceability system based on nondestructive detection technology | |
US20220327541A1 (en) | Systems and methods of generating risk scores and predictive fraud modeling | |
CN108133148B (en) | Data safety inspection method and system | |
US20220188828A1 (en) | Transaction generation for analytics evaluation | |
CN108959965A (en) | Data review of compliance method and apparatus | |
CN110278201A (en) | Security strategy evaluation method and device, computer-readable medium and electronic equipment | |
CN109313541A (en) | For showing and the user interface of comparison attacks telemetering resource | |
CN111897806A (en) | Big data offline data quality inspection method and device | |
Nofal et al. | A use case of anomaly detection for identifying unusual water consumption in Jordan | |
CN116074843B (en) | Zero trust security trusted audit method for 5G dual-domain private network | |
CN115375336B (en) | Management method of target object transaction certificate, electronic equipment and storage medium | |
CN106845281A (en) | A kind of dynamic credible measure of use nonce mechanism | |
EP4323900A1 (en) | Systems and methods of generating risk scores and predictive fraud modeling | |
CN115659214A (en) | Energy industry data credible evaluation method based on PaaS platform | |
CN108965249A (en) | A kind of network information security detection system and its detection method | |
CN114301713A (en) | Risk access detection model training method, risk access detection method and risk access detection device | |
CN110599668B (en) | Abnormal detection method and system for number of paper money in money box, server and financial equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20181106 |
|
RJ01 | Rejection of invention patent application after publication |