CN109033789A - A kind of generation method, the device and system of true warrant book - Google Patents

A kind of generation method, the device and system of true warrant book Download PDF

Info

Publication number
CN109033789A
CN109033789A CN201810623530.XA CN201810623530A CN109033789A CN 109033789 A CN109033789 A CN 109033789A CN 201810623530 A CN201810623530 A CN 201810623530A CN 109033789 A CN109033789 A CN 109033789A
Authority
CN
China
Prior art keywords
uid
identity
certificate
assets
true
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810623530.XA
Other languages
Chinese (zh)
Other versions
CN109033789B (en
Inventor
宣宏量
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Wenchuang Park Investment Management Co Ltd
Original Assignee
Beijing Wenchuang Park Investment Management Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Wenchuang Park Investment Management Co Ltd filed Critical Beijing Wenchuang Park Investment Management Co Ltd
Priority to CN201810623530.XA priority Critical patent/CN109033789B/en
Publication of CN109033789A publication Critical patent/CN109033789A/en
Application granted granted Critical
Publication of CN109033789B publication Critical patent/CN109033789B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/33User authentication using certificates

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention relates to generation method, the device and system of a kind of true warrant book, the method comprise the steps that identity information and first time are stabbed, carry out digital encryption, generate the letter of identity of digital encryption, Hash calculation is carried out according to letter of identity, the HASH value of generation, as identity unique identification UID;By the generation information and the second timestamp of assets, digital encryption is carried out, the assets certificate of digital encryption is generated, Hash calculation, the HASH value of generation, as assets UID are carried out according to assets certificate;By legal proof the file information and third timestamp, digital encryption is carried out, the legal proof document certificate of digital encryption is generated, Hash calculation, the HASH value of generation, as legal proof file UID are carried out according to legal proof document certificate;Que Quan mechanism verify letter of identity, assets certificate and legal proof document certificate it is true after, by identity UID, assets UID, legal proof file UID, ownership informative abstract and the 4th timestamp, carry out digital encryption, generate the first true warrant book.

Description

A kind of generation method, the device and system of true warrant book
Technical field
The present invention relates to field of information security technology more particularly to a kind of generation method, the device and system of true warrant book.
Background technique
Copyright registration full name is Copyright registration, i.e., carries out copyright registration in registration unit to some works. Existing copyright registration certificate, carrier are papery digital certificate or electronic edition (picture/PDF format) certificate.Wherein papery is demonstrate,proved Book (first generation certificate of registration) and the content item of electronic edition certificate (second generation certificate of registration) are identical with format, electronic edition card Book is printed as papery version certificate, as shown in Figure 1.
Existing copyright registration certificate has the disadvantage in that
(1) information is easy to be forged or distort in papery certificate and electronic edition certificate, the number after being forged or distorting Certificate, certificate issuing authority are also difficult to carry out true and false identification to the papery certificate and electronic edition certificate oneself provided;
(2) since China generates many works every year, some work titles are identical, and Equity Investors name also has a large amount of phases Together, so papery certificate and electronic edition certificate itself can not be on certifications between works, work data file and obligee Uniqueness relation;
(3) when a works (such as: films and television programs) are related to multiple obligees, papery and electronic edition certificate are due to length It is limited, all obligee's titles can not be enumerated.
Summary of the invention
The present invention is based on the above problems, propose generation method, the device and system of a kind of true warrant book.
In a first aspect, the present invention provides a kind of generation methods of true warrant book, comprising: by identity information and first time Stamp carries out digital encryption, generates the letter of identity of digital encryption, carries out Hash calculation according to the letter of identity, generation HASH value, as identity unique identification UID;By the generation information and the second timestamp of assets, digital encryption is carried out, generates number The assets certificate of word encryption carries out Hash calculation, the HASH value of generation, as assets UID according to the assets certificate;By law Documentary evidence information and third timestamp carry out digital encryption, the legal proof document certificate of digital encryption are generated, according to described Legal proof document certificate carries out Hash calculation, the HASH value of generation, as legal proof file UID;It is verified in Que Quan mechanism The letter of identity, the assets certificate and the legal proof document certificate it is true after, by the identity UID, the money UID, the legal proof file UID, ownership informative abstract and the 4th timestamp are produced, digital encryption is carried out, first is generated and really weighs Certificate.
Preferably, further includes: by data file existing for the letter of identity, the version information of identity, record identity HASH value and the 5th timestamp carry out digital encryption, generate the identity version certificate of digital encryption, are demonstrate,proved according to the identity version Book carries out Hash calculation, the HASH value of generation, as identity version UID;The letter of identity, described is verified in Que Quan mechanism Identity version certificate, the assets certificate and the legal proof document certificate it is true after, by the identity UID, the body Part version UID, the assets UID, the legal proof file UID, the ownership informative abstract and the 6th timestamp, are counted Word encryption, generates the second true warrant book.
Preferably, further includes: by data file existing for the assets certificate, the version information of assets, record assets HASH value and the 7th timestamp carry out digital encryption, generate the asset version certificate of digital encryption, are demonstrate,proved according to the asset version Book carries out Hash calculation, the HASH value of generation, as asset version UID;The letter of identity, described is verified in Que Quan mechanism Assets certificate, the asset version certificate and the legal proof document certificate it is true after, by the identity UID, the money UID, the asset version UID, the legal proof file UID, the ownership informative abstract and the 8th timestamp are produced, is counted Word encryption, generates the true warrant book of third.
Preferably, further includes: by the legal proof document certificate, the version information of legal proof file, record law The data file HASH value and the 9th timestamp of documentary evidence carry out digital encryption, generate the legal proof file of digital encryption Version certificate carries out Hash calculation, the HASH value of generation, as legal proof according to the legal proof FileVersion certificate FileVersion UID;The letter of identity, the assets certificate, the legal proof document certificate and institute are verified in Que Quan mechanism State legal proof text version certificate it is true after, by the identity UID, the assets UID, the legal proof file UID, institute Legal proof FileVersion UID, the ownership informative abstract and the tenth timestamp are stated, digital encryption is carried out, the 4th is generated and really weighs Certificate.
Preferably, the identity information include: author, Equity Investors, obligee, user, producer, agency and really Weigh at least one of mechanism, the letter of identity include author's certificate, Equity Investors certificate, obligee's certificate, user's certificate, At least one of producer's certificate, agency's certificate and Que Quan mechanism certificate, the identity UID includes author UID, equity At least one of people UID, obligee UID, user UID, producer UID, agency UID and Que Quan mechanism UID.
Preferably, further includes: the Que Quan mechanism also verifies assignor's identity information, assignee's identity information and the second method Whether the assets transfer contract information restrained in documentary evidence is true;After determining the necessary being of verification information, according to described turn People's identity information, the second legal proof file and the first true warrant book is allowed to obtain the identity UID and the assets UID;By the identity UID, the assets UID, the legal proof file UID, according to assignor's identity information carry out Assignor's identity UID that digital encryption and Hash calculation obtain, digital encryption and Kazakhstan are carried out according to assignee's identity information Uncommon assignee's identity UID, the true warrant book ID of assets in the assets transfer contract information, the ownership information being calculated Abstract and eleventh time stamp, carry out digital encryption, generate first and transfer the possession of true warrant book.
Preferably, be applied to the assets license in use, further include: the Que Quan mechanism also verify licensor's identity believe Whether the assets contract for allowing to apply information in breath, licensee's identity information and third legal proof file is true;In determination When the necessary being of verification information, really according to licensor's identity information, the third legal proof file and described first Warrant book obtains the identity UID and the assets UID;By the identity UID, the assets UID, first legal proof File UID, licensor's identity UID, the basis that digital encryption and Hash calculation obtain are carried out according to licensor's identity information Licensee's identity information carries out digital encryption and Hash calculation obtains licensee's identity UID, assets license Using the true warrant book ID of assets, the ownership informative abstract and the 12nd timestamp in contract information, digital encryption is carried out, it is raw At the first true warrant book of license.
Preferably, the legal proof file is for proving between the identity information and the generation information of the assets really Qualitative corresponding relationship.
Preferably, at the time of when the timestamp is certificates constructing.
Preferably, the file of the certificates constructing, be all using certificate UID as filename, using .dat as extended file name, It is stored.
Second aspect, the invention proposes a kind of generating means of true warrant book, comprising: the first generation module, being used for will Identity information and at the first time stamp, carry out digital encryption, generate the letter of identity of digital encryption, are carried out according to the letter of identity Hash calculation, the HASH value of generation, as identity UID;Third generation module, for by the generation information of assets and the second time Stamp carries out digital encryption, generates the assets certificate of digital encryption, carries out Hash calculation according to the assets certificate, generation HASH value, as assets UID;5th generation module, for carrying out legal proof the file information and third timestamp number and adding It is close, the legal proof document certificate of digital encryption is generated, Hash calculation is carried out according to the legal proof document certificate, generation HASH value, as legal proof file UID;7th generation module, for verifying the letter of identity, the money in Que Quan mechanism Produce certificate and the legal proof document certificate it is true after, by the identity UID, the assets UID, legal proof text Part UID and the 4th timestamp carry out digital encryption, generate the first true warrant book.
Preferably, further includes: the second generation module, for by the version information of the letter of identity, identity, record identity Existing data file HASH value and the 5th timestamp carry out digital encryption, generate the identity version certificate of digital encryption, according to The identity version certificate carries out Hash calculation, the HASH value of generation, as identity version UID;The 7th generation module tool Body is used for: verifying the letter of identity, the identity version certificate, the assets certificate and the legal proof in Que Quan mechanism Document certificate it is true after, by the identity UID, the identity version UID, the assets UID, the legal proof file UID, ownership informative abstract and the 6th timestamp carry out digital encryption, generate the second true warrant book.
Preferably, further includes: the 4th generation module, for by the version information of the assets certificate, assets, record assets Existing data file HASH value and the 7th timestamp carry out digital encryption, generate the asset version certificate of digital encryption, according to The asset version certificate carries out Hash calculation, the HASH value of generation, as asset version UID;The 7th generation module tool Body is used for: verifying the letter of identity, the assets certificate, the asset version certificate and the legal proof in Que Quan mechanism Document certificate it is true after, by the identity UID, the assets UID, the asset version UID, the legal proof file UID, the ownership informative abstract and the 8th timestamp carry out digital encryption, generate the true warrant book of third.
Preferably, further includes: the 6th generation module, for by the legal proof document certificate, legal proof file Version information, the data file HASH value and the 9th timestamp for recording law documentary evidence carry out digital encryption, generate number and add Close legal proof FileVersion certificate carries out Hash calculation, the HASH of generation according to the legal proof FileVersion certificate Value, as legal proof FileVersion UID;7th generation module is specifically used for: verifying the identity card in Que Quan mechanism Book, the assets certificate, the legal proof document certificate and the legal proof text version certificate it is true after, by the body Part UID, the assets UID, the legal proof file UID, the legal proof FileVersion UID, the ownership information are plucked Digital encryption is carried out with the tenth timestamp, generate the 4th true warrant book.
Preferably, when being transferred the possession of applied to assets, further includes: the 8th generation module is used for the identity UID, institute It states assets UID, the legal proof file UID, obtained according to assignor's identity information progress digital encryption and Hash calculation To assignor's identity UID, the person of assigning that digital encryption and Hash calculation obtain carried out according to assignee's identity information Part UID, the true warrant book ID of assets in the assets transfer contract information, the ownership informative abstract and eleventh time stamp, Digital encryption is carried out, first is generated and transfers the possession of true warrant book.
Preferably, be applied to assets license in use, further include: the 9th generation module, for by the identity UID, the assets UID, the first legal proof file UID, according to licensor's identity information carry out digital encryption and Licensor's identity UID that Hash calculation obtains, digital encryption is carried out according to licensee's identity information and Hash calculation obtains To licensee's identity UID, the true warrant book ID of assets in the assets contract for allowing to apply information, the ownership information plucks Digital encryption is carried out with the 12nd timestamp, generate the first true warrant book of license.
The third aspect, the invention proposes a kind of generation systems of true warrant book, comprising: as appointed in claim 11-16 Device described in meaning one.
The present invention is by demonstrate,proving identity information, identity version information, the generation information of assets, asset version information, law Prescribed paper information, legal proof file version information carry out unique identification, it is ensured that the information generated in warrant book really is unique Property, to guarantee that encryption generates warrant book uniqueness really;In addition all information are really verified by Que Quan mechanism, is protected Card generates the information authenticity in warrant book really.
Detailed description of the invention
Fig. 1 is the master drawing of papery certificate and electronic edition certificate in the prior art;
Fig. 2 is a kind of flow chart of the generation method of true warrant book provided in an embodiment of the present invention;
Fig. 3 is the flow chart of another really generation method of warrant book provided in an embodiment of the present invention;
Fig. 4 is a kind of generating means schematic diagram of true warrant book provided in an embodiment of the present invention;
Fig. 5 is the generating means schematic diagram of another really warrant book provided in an embodiment of the present invention.
Specific embodiment
To make the technical solution of the embodiment of the present invention and becoming apparent from for advantage expression, below by drawings and examples, Technical scheme of the present invention will be described in further detail.
Before creating true warrant book, obtain some information necessary to generating true warrant book, for example, assets generation information, The information such as author, copyright owner, Que Quan mechanism carry out the certificate that digitlization encryption generates encryption, then according to the certificate of encryption Hash calculation is carried out, the UID of information is generated, then the UID of all information is encrypted, obtains true warrant book.Wherein, it is generating The step of being encrypted during certificate is it is alternatively possible to obtain certificate without encryption.
The present invention, which generates warrant book really, can be applied not only to copyright registration certificate, can also be applied to building property registration and demonstrate,prove What each mechanisms such as book, the motor vehicle certificate of registration, degree certification, professional qualification certificate, trade mark certificate, patent certificate issued Certificate.The embodiment of the present invention is by taking copyright registration certificate as an example.
Fig. 2 is a kind of flow chart of the generation method of true warrant book provided in an embodiment of the present invention.One kind as shown in Figure 2 The generation method of true warrant book, specific steps include:
Step S201 stabs identity information and first time, carries out digital encryption, generates the letter of identity of digital encryption, Hash calculation, the HASH value of generation, as identity UID are carried out according to letter of identity.
Optionally, identity information mainly includes author, Equity Investors, obligee, user, producer, agency, really power The information of mechanism etc..
Optionally, identity information can be personal name, fingerprint, face recognition feature, personal biological gene, birth The information such as ground, date of birth can be the title of mechanism, establishing time, set up the information such as place.
Specifically, timestamp when system is to identity information and encryption carries out digitlization encryption, generates one by encryption Letter of identity, further according to letter of identity carry out Hash calculation, the HASH value of generation, as identity UID (Unique Identifier, unique identification).Then the file that letter of identity generates, uses identity UID as filename, with .dat (Digital Assets Token, the logical card of digital asset) is used as extended file name, is stored.
Wherein, identity information is not by author, Equity Investors, obligee, user, producer, agency and really to weigh machine The information unification of structure carries out digital encryption and Hash calculation obtains an identity UID.But by author information in identity information, lead to It crosses digital encryption and Hash calculation obtains author UID;Copyright owner's information obtains copyright by digital encryption and Hash calculation People UID etc., then these UID are referred to as identity UID.In addition, author, Equity Investors in identity information, obligee, use Person, producer, all more than one, so the author UID generated can be multiple, Equity Investors UID, obligee UID, user UID, producer UID may be multiple.
In addition, stamp indicates timestamp when identity information is encrypted at the first time, when by by identity information and encryption Timestamp, carry out digital encryption generation letter of identity have more uniqueness.Identity version certificate, the assets card generated below Book, asset version certificate, legal proof document certificate, legal proof FileVersion certificate and true warrant book use second Timestamp to the 12nd timestamp acquisition with play a role and at the first time stamp be as, it is subsequent to repeat no more.
The generation information and the second timestamp of assets are carried out digital encryption, generate the assets of digital encryption by step S202 Certificate carries out Hash calculation, the HASH value of generation, as assets UID according to assets certificate.
Specifically, generation information of the system to assets and timestamp when encryption, carry out digitlization encryption, generate a number Word cryptographic assets certificate carries out Hash calculation, the HASH value of generation, as assets UID further according to assets certificate.Then it provides The file for producing certificates constructing, uses assets UID to be stored as filename using .dat as extended file name.
Wherein, the generation information of assets can generate the time for asset name, Asset Type, assets, assets generate place, Asset content etc. information.
Legal proof the file information and third timestamp are carried out digital encryption, generate the method for digital encryption by step S203 Documentary evidence certificate is restrained, Hash calculation, the HASH value of generation, as legal proof file are carried out according to legal proof document certificate UID。
Specifically, timestamp when system is to legal proof the file information and encryption, carries out digitlization encryption, generates one Digitlization encryption law documentary evidence certificate carries out Hash calculation further according to legal proof document certificate, the HASH value of generation, As legal proof file UID.Then the file that legal proof document certificate generates, uses law documentary evidence UID as file Name, using .dat as extended file name, is stored.
Wherein, legal proof the file information can be legal proof file name, legal proof file type, legal proof The information such as file generated time, legal proof file generated place.
Step S204, Que Quan mechanism verify letter of identity, assets certificate and legal proof document certificate it is true after, will Identity UID, assets UID, legal proof file UID, ownership informative abstract and the 4th timestamp carry out digital encryption, generate the One true warrant book.
Specifically, due to generate really warrant book can not determine it includes all information whether be all necessary being, Generate need to verify before true warrant book generate all information in warrant book really whether necessary being.So system needs really power Whether mechanism verifies letter of identity, assets certificate and legal proof document certificate true.In the necessary being for determining these information When, timestamp when system is by identity UID, assets UID, legal proof file UID and generation certificate carries out digitlization encryption, Generate the true warrant book of digital encryption.
Wherein, Que Quan mechanism is really to make in verifying letter of identity, assets certificate and legal proof document certificate, and system will True warrant book UID is added in each certificate.Identity version certificate, asset version certificate and the legal proof file version of subsequent authentication When this certificate is true, equally true warrant book UID is added in each certificate.
Optionally, it can also be added to and be generated in true warrant book according to the identity version information that identity information generates, specifically Realize that steps are as follows:
Step S205, by data file HASH value and the 5th existing for letter of identity, the version information of identity, record identity Timestamp carries out digital encryption, generates the identity version certificate of digital encryption, according to identity version certificate, carries out Hash calculation, The HASH value of generation, as identity version UID;
Specifically, system to data file HASH value existing for the version information of letter of identity, identity, record identity and adds Timestamp when close carries out digitlization encryption, generates the identity version certificate of a digitlization encryption, demonstrate,proves further according to identity version Book carries out Hash calculation, the HASH value of generation, as identity version UID.Then the file of identity version certificates constructing, uses body Part version UID is stored as filename using .dat as extended file name.
Wherein, identity version information refers to the carrier of identity information, can for identity card, passport, student's identity card, WeChat ID, The other ways such as QQ number are presented, wherein including the information such as personal name, identification card number, personal biological gene, home address At least one of.Identity version certificate is for confirming identity information necessary being.
In addition, due to identity version information difference with comprising identity information it is different, pass through the body that digital encryption generates Part version certificate is different, and carries out Hash calculation, and obtained identity version UID is also different.Each identity UID can be corresponded to Multiple identity version UID a, because people can have multiple proofs of identification.
However, it is to verify letter of identity, identity version according in Que Quan mechanism that step S204, which generates warrant book really, at this time Certificate, assets certificate and legal proof document certificate it is true after, identity UID, identity version UID, assets UID, law are demonstrate,proved Prescribed paper UID, ownership informative abstract and the 6th timestamp carry out digital encryption, generate the second true warrant book.
Optionally, it can also be added to according to the version information that the generation information of assets generates assets and generate true warrant book In, the specific implementation steps are as follows:
Step S206, by data file HASH value and the 7th existing for assets certificate, the version information of assets, record assets Timestamp carries out digital encryption, generates the asset version certificate of digital encryption, according to asset version certificate, carries out Hash calculation, The HASH value of generation, as asset version UID.
Specifically, system to data file HASH value existing for the version information of assets certificate, assets, record assets and adds Timestamp when close carries out digitlization encryption, generates asset version certificate, then to asset version certificate, carry out Hash calculation, raw At HASH value, as asset version UID.Then the file of asset version certificates constructing uses asset version UID as file Name, using .dat as extended file name, is stored.
Wherein, asset version information refers to the carrier of the generation information of assets, can be with text, video, picture or other Version is presented, wherein including at least one of information such as asset content, asset name, Asset Type.Asset version certificate For confirming existing for the generation information truth of assets.
In addition, due to the version information of assets difference and comprising assets generation information difference, by number plus It is dense at asset version certificate be also different, carry out Hash calculation, obtained asset version UID is different.Each assets UID Multiple assets version UID may be corresponded to, because an assets there can also be version existing for multiple record assets.
However, at this time step S204 generate really warrant book be according to Que Quan mechanism verify letter of identity, assets certificate, Asset version certificate and legal proof document certificate it is true after, by identity UID, assets UID, asset version UID, legal proof File UID, ownership informative abstract and the 8th timestamp carry out digital encryption, generate the true warrant book of third.
Optionally, the version information that law documentary evidence can also be generated according to the generation information of legal proof file is added To generating in true warrant book, the specific implementation steps are as follows:
Step S207, by legal proof document certificate, the version information of legal proof file, record law documentary evidence Data file HASH value and the 9th timestamp carry out digital encryption, generate the legal proof FileVersion certificate of digital encryption, root According to legal proof FileVersion certificate, Hash calculation, the HASH value of generation, as legal proof FileVersion UID are carried out.
Specifically, version information, record law documentary evidence of the system to legal proof document certificate, legal proof file Data file HASH value and encryption when timestamp carry out digitlization encryption, generate law documentary evidence version certificate, then right Legal proof FileVersion certificate carries out Hash calculation, the HASH value of generation, as legal proof FileVersion UID.Then method The file for restraining documentary evidence version certificates constructing uses law documentary evidence version UID as filename, using .dat as extension text Part name, is stored.
Legal proof file is to prove certainty corresponding relationship between identity information and the generation information of assets.Such as law Documentary evidence proves that between author and works be original relationship, then provides an original proof contract;Assignor and works Between be transfer relationship, then provide an assets transfer contract;It is licensing relationship between licensor and works, then provides one A assets contract for allowing to apply.
Wherein, legal proof file version information refers to the carrier of the generation information of legal proof file, can with text, Video, picture or other versions are presented.Legal proof FileVersion certificate is used to confirm the generation information of law documentary evidence Necessary being.
In addition, due to the version information of legal proof file difference and comprising legal proof file generation information Difference is also different by the legal proof FileVersion certificate that digital encryption generates, and carries out Hash calculation, obtained law Documentary evidence version UID is different.Each legal proof file UID may correspond to multiple legal proof FileVersion UID, because one A legal proof file can also have version existing for multiple record law documentary evidences.
However, at this time step S204 generate really warrant book be according to Que Quan mechanism verify letter of identity, assets certificate, Legal proof document certificate and legal proof text version certificate it is true after, by identity UID, assets UID, legal proof file UID, legal proof FileVersion UID, ownership informative abstract and the tenth timestamp carry out digital encryption, generate the 4th true warrant Book.
Furthermore it is possible to according to identity UID, assets UID and legal proof file UID these three certificates UID, then at random from Identity version UID, asset version UID and legal proof FileVersion UID select two and the certificate of front three in these three UID is combined into five certificate UID, in addition ownership informative abstract and timestamp, carry out digital encryption and generate true warrant book.
It, can also be according to identity UID, identity version UID, money according to a kind of generation method of true warrant book as shown in Figure 3 UID, asset version UID, legal proof file UID, legal proof FileVersion UID, ownership informative abstract and timestamp are produced, into Row digital encryption generates true warrant book.
Wherein, assets UID and law are contained due to containing in identity UID, asset version UID in identity version UID Legal proof file UID is contained in documentary evidence version UID, thus can also according to identity version UID, asset version UID, Legal proof FileVersion UID, ownership informative abstract and timestamp carry out digital encryption and generate true warrant book.
So can also according to identity version UID, asset version UID and legal proof FileVersion UID these three certificates, Then it selects one or two certificate UID from identity UID, assets UID and legal proof file UID to come out, the certificate of composition UID adds ownership informative abstract and timestamp, carries out digital encryption and generates true warrant book.
In one embodiment, when assets are transferred the possession of, Que Quan mechanism needs to verify letter of identity and identity version card In book it is random one or two, in assets certificate and asset version certificate it is random one or two, legal proof document certificate and In legal proof FileVersion certificate it is random one or two, assignor's identity information, assignee's identity information and assets transfer Whether contract information is true.
In the necessary being for determining these information, system will be random one or two in identity UID and identity version UID In a, assets UID and asset version UID it is random one or two, legal proof file UID and legal proof FileVersion UID In it is random one or two, assignor's identity UID for being obtained according to assignor's identity information digital encryption and Hash calculation, basis Assignee's identity UID that assignee's identity information digital encryption and Hash calculation obtain, the true warrant book ID of assets, ownership information are plucked Timestamp when digital certificate is wanted and generated, digital encryption is carried out, generates and transfers the possession of true warrant book.
Wherein, when transferring the possession of first time, assignor's information is exactly original rights people's information, when transferring the possession of for second, Assignor's information is exactly first time assignee's information, backward and so on.
In another embodiment, when the generation information assets authorization of assets, Que Quan mechanism need to verify letter of identity or/ With in identity version certificate, assets certificate and asset version certificate it is random one or two, legal proof document certificate and law In documentary evidence version certificate it is random one or two, licensor's identity information, licensee's identity information and assets license make It is whether true with contract information.
In the necessary being for determining these information, system will be random one or two in identity UID and identity version UID In a, assets UID and asset version UID it is random one or two, legal proof file UID and legal proof FileVersion UID In it is random one or two, licensor's identity UID for being obtained according to license assignee's identity information digital encryption and Hash calculation, According to licensee's identity UID, the true warrant book of assets for being licensed assignee's identity information digital encryption and Hash calculation obtains Timestamp when ID, ownership informative abstract and generation digital certificate, carries out digital encryption, generates and permit true warrant book.
Wherein, when obtain can sublicense permitted user to other people permit in use, assignor's information as licensor Information.
In addition, carrying out Hash calculation, the HASH value of generation, as true warrant book UID further according to true warrant book.Then really The file for weighing certificates constructing uses true power UID to be stored as filename using .dat as extended file name.
If system will not all generate true warrant book and true warrant book when Que Quan mechanism verifying any information is untrue UID。
The present invention is by demonstrate,proving identity information, identity version information, the generation information of assets, asset version information, law Prescribed paper information, legal proof file version information carry out unique identification, it is ensured that the information generated in warrant book really is unique Property, to guarantee that encryption generates warrant book uniqueness really;In addition all information are really verified by Que Quan mechanism, is protected Card generates the information authenticity in warrant book really.
Fig. 4 is a kind of generating means schematic diagram of true warrant book provided in an embodiment of the present invention.As shown in figure 4, of the invention Also proposed a kind of generating means of true warrant book, device 400 include: the first generation module 401, third generation module 403, 5th generation module 405 and the 7th generation module 407, wherein each module is specifically used for:
First generation module 401 is used to stab by identity information and at the first time, carries out digital encryption, generates digital encryption Letter of identity carries out Hash calculation, the HASH value of generation, as identity unique identification UID according to letter of identity;
Third generation module 403 is used to the generation information and the second timestamp of assets carrying out digital encryption, generates number The assets certificate of encryption carries out Hash calculation, the HASH value of generation, as assets UID according to assets certificate;
5th generation module 405 is used to legal proof the file information and third timestamp carrying out digital encryption, generates number The legal proof document certificate of word encryption carries out Hash calculation, the HASH value of generation, as method according to legal proof document certificate Restrain documentary evidence UID;
7th generation module 407 is used to verify letter of identity, assets certificate and legal proof document certificate in Que Quan mechanism It is true after, by identity UID, assets UID, legal proof file UID, ownership informative abstract and the 4th timestamp, carry out number Encryption generates the first true warrant book.
Optionally, it can also be added in the 7th generation module 407 according to the identity version information that identity information generates raw It is specific as follows at true warrant book:
Second generation module 402 is used for data file existing for letter of identity, the version information of identity, record identity HASH value and the 5th timestamp carry out digital encryption, generate the identity version certificate of digital encryption, according to identity version certificate, Carry out Hash calculation, the HASH value of generation, as identity version UID.
The 7th generation module 407 at this time is used to verify letter of identity, identity version certificate, assets certificate in Que Quan mechanism With legal proof document certificate it is true after, by identity UID, identity version UID, assets UID, legal proof file UID, ownership Informative abstract and the 6th timestamp carry out digital encryption, generate the second true warrant book.
Optionally, the 7th generation module can also be added to according to the asset version information that the generation information of assets generates True warrant book is generated in 407, specific as follows:
4th generation module 404 is used for data file existing for assets certificate, the version information of assets, record assets HASH value and the 7th timestamp carry out digital encryption, generate the asset version certificate of digital encryption, according to asset version certificate, Carry out Hash calculation, the HASH value of generation, as asset version UID.
The 7th generation module 407 at this time is used to verify letter of identity, assets certificate, asset version certificate in Que Quan mechanism With legal proof document certificate it is true after, by identity UID, assets UID, asset version UID, legal proof file UID, ownership Informative abstract and the 8th timestamp carry out digital encryption, generate the true warrant book of third.
Optionally, the legal proof file version information that can also be generated according to the generation information of legal proof file is added True warrant book is generated into the 7th generation module 407, specific as follows:
6th generation module 406 is used for legal proof document certificate, the version information of legal proof file, record law The data file HASH value and the 9th timestamp of documentary evidence carry out digital encryption, generate the legal proof file of digital encryption Version certificate carries out Hash calculation, the HASH value of generation, as legal proof file according to legal proof FileVersion certificate Version UID.
The 7th generation module 407 at this time is used to verify letter of identity, assets certificate, legal proof file in Que Quan mechanism Certificate and legal proof text version certificate it is true after, by identity UID, assets UID, legal proof file UID, legal proof text Part version UID, ownership informative abstract and the tenth timestamp carry out digital encryption, generate the 4th true warrant book.
Fig. 5 is the generating means schematic diagram of another really warrant book provided in an embodiment of the present invention.Another kind shown in fig. 5 The generating means 500 of true warrant book, identity UID, the second generation module 402 that can also be generated according to the first generation module 401 The asset version that assets UID, the 4th generation module 404 that identity version UID, the third generation module 403 of generation generate generate The legal proof file version of legal proof file UID, the generation of the 6th generation module 406 that UID, the 5th generation module 405 generate This UID, ownership informative abstract and timestamp carry out digital encryption and generate true warrant book.
In one embodiment, when assets are transferred the possession of, Que Quan mechanism needs to verify letter of identity and/or identity version In certificate, assets certificate and asset version certificate it is random one or two, legal proof document certificate and legal proof file version In this certificate it is random one or two, assignor's identity information, assignee's identity information and copyright transfer contract information whether Really.
6th generation unit 406 be used for by identity UID and identity version UID it is random one or two, assets UID and money Produce in version UID it is random one or two, random one or two in legal proof file UID and legal proof FileVersion UID It is a, assignor's identity UID that digital encryption and Hash calculation obtain is carried out according to assignor's identity information, according to assignee's identity Information carries out assignee's identity UID that digital encryption and Hash calculation obtain, the true warrant of assets in assets transfer contract information Book ID, ownership informative abstract and timestamp carry out digital encryption, generate and transfer the possession of true warrant book.
In another embodiment, license occurs for assets in use, Que Quan mechanism needs to verify letter of identity and identity version In this certificate it is random one or two, in assets certificate and asset version certificate it is random one or two, legal proof file card In book and legal proof FileVersion certificate it is random one or two, licensor's identity information, licensee's identity information and money Whether true produce contract for allowing to apply information.
8th generation unit 408 be used for by identity UID and identity version UID it is random one or two, assets UID and money Produce in version UID it is random one or two, random one or two in legal proof file UID and legal proof FileVersion UID It is a, permitted according to being licensed assignee's identity information and carry out licensee's identity UID, assets that digital encryption and Hash calculation obtain The true warrant book ID of assets, ownership informative abstract and the timestamp in contract information can be used, carry out digital encryption, it is true to generate license Warrant book.
Wherein, when Que Quan mechanism verifying any information is untrue, true warrant book and true warrant book UID will not all be generated.
Optionally, for the digital certificate of generation in order to store, the digital certificate files of generation use digital certificate UID as file Name, then using .dat as extended file name, is stored.
The present invention in device 500, by identity information, identity version information, assets generation information, asset version Information, legal proof file version information, carries out unique identification at legal proof the file information, it is ensured that generation module generated Information uniqueness in true warrant book, to guarantee that encryption generates warrant book uniqueness really;In addition by Que Quan mechanism to institute There is information really to be verified, guarantees to generate the information authenticity in warrant book really.
The invention also provides a kind of generation system of true warrant book, all processes are all realized in systems, main mistake Journey are as follows: the first generation module 401 is used to stab by identity information and at the first time, carries out digital encryption, generates the body of digital encryption Part certificate carries out Hash calculation, the HASH value of generation, as identity unique identification UID according to letter of identity;Second generates mould Block 402 is used for data file HASH value and the 5th timestamp existing for letter of identity, the version information of identity, record identity, Digital encryption is carried out, the identity version certificate of digital encryption is generated, according to identity version certificate, carries out Hash calculation, generation HASH value, as identity version UID;Third generation module 403 is used to be counted the generation information and the second timestamp of assets Word encryption, generates the assets certificate of digital encryption, carries out Hash calculation, the HASH value of generation, as assets according to assets certificate UID;4th generation module 404 is used for data file HASH value existing for assets certificate, the version information of assets, record assets With the 7th timestamp, digital encryption is carried out, the asset version certificate for generating digital encryption is breathed out according to asset version certificate It is uncommon to calculate, the HASH value of generation, as asset version UID;When 5th generation module 405 is used for legal proof file and third Between stab, carry out digital encryption, generate the legal proof document certificate of digital encryption, according to legal proof document certificate carry out Hash It calculates, the HASH value of generation, as legal proof file UID;6th generation module 406 be used for by legal proof document certificate, The version information of legal proof file, the data file HASH value and the 9th timestamp for recording law documentary evidence carry out number Encryption, generates the legal proof FileVersion certificate of digital encryption, according to legal proof FileVersion certificate, carries out Hash meter It calculates, the HASH value of generation, as legal proof FileVersion UID;7th generation module 407 is used to verify identity in Que Quan mechanism In certificate and identity version certificate it is random one or two, in assets certificate and asset version certificate it is random one or two, method It restrains in documentary evidence certificate and legal proof FileVersion certificate after one or two random true, by identity UID and identity In version and legal proof FileVersion it is random one or two, in assets UID and asset version it is random one or two, law In documentary evidence UID and legal proof FileVersion it is random one or two, ownership informative abstract and the tenth timestamp, counted Word encryption, generates true warrant book.
The present invention is by demonstrate,proving identity information, identity version information, the generation information of assets, asset version information, law Prescribed paper information, legal proof file version information carry out unique identification, it is ensured that the information generated in warrant book really is unique Property, to guarantee that encryption generates warrant book uniqueness really;All information are really verified by Que Quan mechanism, guarantee life At the information authenticity in warrant book really.
It should be noted that, in this document, relational terms such as first and second and the like are used merely to a reality Body or operation are distinguished with another entity or operation, are deposited without necessarily requiring or implying between these entities or operation In any actual relationship or order or sequence.Moreover, the terms "include", "comprise" or its any other variant are intended to Non-exclusive inclusion, so that process, method, article or device including a series of elements are not only wanted including those Element, but also including other elements that are not explicitly listed, or further include for this process, method, article or device Intrinsic element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that There is also other identical elements in process, method, article or device including the element.
Those of ordinary skill in the art will appreciate that realizing that all or part of the steps of above-described embodiment can pass through hardware It completes, relevant hardware can also be instructed to complete by program, the program can store in a kind of computer-readable In storage medium, storage medium mentioned above can be read-only memory, disk or CD etc..
Above-described specific embodiment has carried out further the purpose of the present invention, technical scheme and beneficial effects It is described in detail, it should be understood that being not intended to limit the present invention the foregoing is merely a specific embodiment of the invention Protection scope, all within the spirits and principles of the present invention, any modification, equivalent substitution, improvement and etc. done should all include Within protection scope of the present invention.

Claims (17)

1. a kind of generation method of true warrant book characterized by comprising
Identity information and first time are stabbed, digital encryption is carried out, the letter of identity of digital encryption is generated, according to the identity card Book carries out Hash calculation, the HASH value of generation, as identity unique identification UID;
By the generation information and the second timestamp of assets, digital encryption is carried out, the assets certificate of digital encryption is generated, according to described Assets certificate carries out Hash calculation, the HASH value of generation, as assets UID;
By legal proof the file information and third timestamp, digital encryption is carried out, generates the legal proof file card of digital encryption Book carries out Hash calculation, the HASH value of generation, as legal proof file UID according to the legal proof document certificate;
Que Quan mechanism verify the letter of identity, the assets certificate and the legal proof document certificate it is true after, will The identity UID, the assets UID, the legal proof file UID, ownership informative abstract and the 4th timestamp carry out number Encryption generates the first true warrant book.
2. the generation method of true warrant book according to claim 1, which is characterized in that further include: by the letter of identity, The version information of identity records data file HASH value and the 5th timestamp existing for identity, carries out digital encryption, generates number The identity version certificate of encryption carries out Hash calculation, the HASH value of generation, as identity version according to the identity version certificate This UID;
The letter of identity, the identity version certificate, the assets certificate and legal proof text are verified in Que Quan mechanism Part certificate it is true after, by the identity UID, the identity version UID, the assets UID, the legal proof file UID, The ownership informative abstract and the 6th timestamp carry out digital encryption, generate the second true warrant book.
3. the generation method of true warrant book according to claim 1, which is characterized in that further include: by the assets certificate, The version information of assets records data file HASH value and the 7th timestamp existing for assets, carries out digital encryption, generates number The asset version certificate of encryption carries out Hash calculation, the HASH value of generation, as assets version according to the asset version certificate This UID;
The letter of identity, the assets certificate, the asset version certificate and legal proof text are verified in Que Quan mechanism Part certificate it is true after, by the identity UID, the assets UID, the asset version UID, the legal proof file UID, The ownership informative abstract and the 8th timestamp carry out digital encryption, generate the true warrant book of third.
4. the generation method of true warrant book according to claim 1, which is characterized in that further include: by the legal proof The data file HASH value and the 9th timestamp of document certificate, the version information of legal proof file, record law documentary evidence, Digital encryption is carried out, the legal proof FileVersion certificate of digital encryption is generated, according to the legal proof FileVersion certificate, Carry out Hash calculation, the HASH value of generation, as legal proof FileVersion UID;
The letter of identity, the assets certificate, the legal proof document certificate and law card are verified in Que Quan mechanism Cleartext version certificate it is true after, by the identity UID, the assets UID, the legal proof file UID, the law demonstrate,prove Prescribed paper version UID, the ownership informative abstract and the tenth timestamp carry out digital encryption, generate the 4th true warrant book.
5. the generation method of true warrant book according to claim 1, which is characterized in that the identity information include: author, At least one of Equity Investors, obligee, user, producer, agency and Que Quan mechanism, the letter of identity include making Person's certificate, Equity Investors certificate, obligee's certificate, user's certificate, producer's certificate, agency's certificate and Que Quan mechanism certificate At least one of, the identity UID include author UID, Equity Investors UID, obligee UID, user UID, producer UID, At least one of agency UID and Que Quan mechanism UID.
6. the generation method of true warrant book according to claim 1, when being transferred the possession of applied to assets, which is characterized in that Further include: the Que Quan mechanism also verifies in assignor's identity information, assignee's identity information and the second legal proof file Whether assets transfer contract information is true;After determining the necessary being of verification information, according to assignor's identity information, institute It states the second legal proof file and the first true warrant book obtains the identity UID and the assets UID;
By the identity UID, the assets UID, the legal proof file UID, according to assignor's identity information carry out Assignor's identity UID that digital encryption and Hash calculation obtain, digital encryption and Kazakhstan are carried out according to assignee's identity information Uncommon assignee's identity UID, the true warrant book ID of assets in the assets transfer contract information, the ownership information being calculated Abstract and eleventh time stamp, carry out digital encryption, generate first and transfer the possession of true warrant book.
7. the generation method of true warrant book according to claim 1 is applied to the assets and permits in use, its feature exists In, further includes: the Que Quan mechanism also verifies licensor's identity information, licensee's identity information and third legal proof file In assets contract for allowing to apply information it is whether true;In the necessary being for determining verification information, according to the license person Part information, the third legal proof file and the first true warrant book obtain the identity UID and the assets UID;
By the identity UID, the assets UID, the first legal proof file UID, according to licensor's identity information Carry out licensor's identity UID that digital encryption and Hash calculation obtain, number is carried out according to licensee's identity information plus Licensee's identity UID that close and Hash calculation obtains, the true warrant book ID of assets in the assets contract for allowing to apply information, The ownership informative abstract and the 12nd timestamp carry out digital encryption, generate the first true warrant book of license.
8. the generation method of warrant book really described in one of -6 according to claim 1, which is characterized in that the legal proof file For proving certainty corresponding relationship between the identity information and the generation information of the assets.
9. the generation method of warrant book really described in one of -6 according to claim 1, which is characterized in that the timestamp is certificate At the time of when generation.
10. the generation method of warrant book really described in one of -6 according to claim 1, which is characterized in that the certificates constructing File, using .dat as extended file name, is stored using certificate UID as filename.
11. a kind of generating means of true warrant book characterized by comprising
First generation module carries out digital encryption, generates the identity card of digital encryption for stabbing identity information and first time Book carries out Hash calculation, the HASH value of generation, as identity UID according to the letter of identity;
Third generation module, for carrying out the generation information and the second timestamp of assets digital encryption, generating digital encryption Assets certificate carries out Hash calculation, the HASH value of generation, as assets UID according to the assets certificate;
5th generation module generates digital encryption for carrying out digital encryption for legal proof the file information and third timestamp Legal proof document certificate, according to the legal proof document certificate carry out Hash calculation, the HASH value of generation, as law Documentary evidence UID;
7th generation module, for verifying the letter of identity, the assets certificate and legal proof text in Que Quan mechanism Part certificate it is true after, the identity UID, the assets UID, the legal proof file UID and the 4th timestamp carry out Digital encryption generates the first true warrant book.
12. the generating means of true warrant book according to claim 11, which is characterized in that further include:
Second generation module, for by the version information of the letter of identity, identity, record identity existing for data file HASH Value and the 5th timestamp carry out digital encryption, generate the identity version certificate of digital encryption, according to the identity version certificate, Carry out Hash calculation, the HASH value of generation, as identity version UID;
7th generation module is specifically used for: verifying the letter of identity, the identity version certificate, described in Que Quan mechanism Assets certificate and the legal proof document certificate it is true after, by the identity UID, the identity version UID, the assets UID, the legal proof file UID, ownership informative abstract and the 6th timestamp carry out digital encryption, generate the second true warrant Book.
13. the generating means of true warrant book according to claim 11, which is characterized in that further include:
4th generation module, for by the version information of the assets certificate, assets, record assets existing for data file HASH Value and the 7th timestamp carry out digital encryption, generate the asset version certificate of digital encryption, according to the asset version certificate, Carry out Hash calculation, the HASH value of generation, as asset version UID;
7th generation module is specifically used for: verifying the letter of identity, the assets certificate, the assets in Que Quan mechanism Version certificate and the legal proof document certificate it is true after, by the identity UID, the assets UID, the asset version UID, the legal proof file UID, the ownership informative abstract and the 8th timestamp carry out digital encryption, and it is true to generate third Warrant book.
14. the generating means of true warrant book according to claim 11, which is characterized in that further include:
6th generation module, for demonstrate,proving the version information of the legal proof document certificate, legal proof file, record law The data file HASH value and the 9th timestamp of prescribed paper carry out digital encryption, generate the legal proof file version of digital encryption This certificate carries out Hash calculation, the HASH value of generation, as legal proof text according to the legal proof FileVersion certificate Part version UID;
7th generation module is specifically used for: verifying the letter of identity, the assets certificate, the law in Que Quan mechanism Documentary evidence certificate and the legal proof text version certificate it is true after, by the identity UID, the assets UID, the method Documentary evidence UID, the legal proof FileVersion UID, the ownership informative abstract and the tenth timestamp are restrained, number is carried out and adds It is close, generate the 4th true warrant book.
15. the generating means of true warrant book according to claim 11, when transferring the possession of applied to assets, feature exists In, further includes:
8th generation module, for will turn described in the identity UID, the assets UID, the legal proof file UID, basis People's identity information is allowed to carry out assignor's identity UID that digital encryption and Hash calculation obtain, according to assignee's identity information Carry out the true warrant of assets in the assignee's identity UID, the assets transfer contract information that digital encryption and Hash calculation obtain Book ID, the ownership informative abstract and eleventh time stamp, carry out digital encryption, generate first and transfer the possession of true warrant book.
16. the generating means of true warrant book according to claim 11 are applied to the assets and permit in use, its feature It is, further includes:
9th generation module, for by the identity UID, the assets UID, the first legal proof file UID, according to institute Licensor's identity information is stated to carry out licensor's identity UID that digital encryption and Hash calculation obtain, be licensed the person according to In part information carries out digital encryption and Hash calculation obtains licensee's identity UID, the assets contract for allowing to apply information The true warrant book ID of assets, the ownership informative abstract and the 12nd timestamp, carry out digital encryption, generate first license really power Certificate.
17. a kind of generation system of true warrant book characterized by comprising as described in any one of claim 13-18 Device.
CN201810623530.XA 2018-06-15 2018-06-15 Method, device and system for generating right-confirming certificate Active CN109033789B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810623530.XA CN109033789B (en) 2018-06-15 2018-06-15 Method, device and system for generating right-confirming certificate

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810623530.XA CN109033789B (en) 2018-06-15 2018-06-15 Method, device and system for generating right-confirming certificate

Publications (2)

Publication Number Publication Date
CN109033789A true CN109033789A (en) 2018-12-18
CN109033789B CN109033789B (en) 2021-01-01

Family

ID=64609908

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810623530.XA Active CN109033789B (en) 2018-06-15 2018-06-15 Method, device and system for generating right-confirming certificate

Country Status (1)

Country Link
CN (1) CN109033789B (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109788309A (en) * 2018-12-25 2019-05-21 陕西优米数据技术有限公司 Video file piracy detection method and system based on block chain technology
CN110188515A (en) * 2019-05-16 2019-08-30 中细软集团有限公司 A kind of block chain network copyright register method and client
CN110932869A (en) * 2019-12-02 2020-03-27 北京合游时空科技有限公司 Method, device and equipment for certificate real-name authentication
CN112651052A (en) * 2020-12-24 2021-04-13 江苏通付盾科技有限公司 Data right confirming method and system based on block chain technology
CN114293846A (en) * 2021-11-16 2022-04-08 武汉小安科技有限公司 Unlocking control method and device for battery compartment lock, electronic equipment and storage medium
CN114362971A (en) * 2022-03-21 2022-04-15 南京大学 Digital asset right confirming and tracing method based on Hash algorithm
CN114666063A (en) * 2022-03-21 2022-06-24 矩阵时光数字科技有限公司 Traditional Hash algorithm-based digital asset tracing method

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101800646A (en) * 2010-03-03 2010-08-11 南京优泰科技发展有限公司 Implementation method and system of electronic signature
CN102339370A (en) * 2011-09-14 2012-02-01 福建伊时代信息科技股份有限公司 Preservation method for electronic file, preservation system and verification system thereof
CN102916971A (en) * 2012-10-31 2013-02-06 重庆君盾科技有限公司 Electronic data curing system and method
CN103237038A (en) * 2013-05-09 2013-08-07 中国电子科技集团公司第三十研究所 Two-way network access authentication method based on digital certificate
CN107070939A (en) * 2017-04-28 2017-08-18 国信嘉宁数据技术有限公司 A kind of internet data security method, system and device
CN107086920A (en) * 2017-06-20 2017-08-22 无锡井通网络科技有限公司 Copyright based on block chain really weighs method

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101800646A (en) * 2010-03-03 2010-08-11 南京优泰科技发展有限公司 Implementation method and system of electronic signature
CN102339370A (en) * 2011-09-14 2012-02-01 福建伊时代信息科技股份有限公司 Preservation method for electronic file, preservation system and verification system thereof
CN102916971A (en) * 2012-10-31 2013-02-06 重庆君盾科技有限公司 Electronic data curing system and method
CN103237038A (en) * 2013-05-09 2013-08-07 中国电子科技集团公司第三十研究所 Two-way network access authentication method based on digital certificate
CN107070939A (en) * 2017-04-28 2017-08-18 国信嘉宁数据技术有限公司 A kind of internet data security method, system and device
CN107086920A (en) * 2017-06-20 2017-08-22 无锡井通网络科技有限公司 Copyright based on block chain really weighs method

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109788309A (en) * 2018-12-25 2019-05-21 陕西优米数据技术有限公司 Video file piracy detection method and system based on block chain technology
CN110188515A (en) * 2019-05-16 2019-08-30 中细软集团有限公司 A kind of block chain network copyright register method and client
CN110932869A (en) * 2019-12-02 2020-03-27 北京合游时空科技有限公司 Method, device and equipment for certificate real-name authentication
CN112651052A (en) * 2020-12-24 2021-04-13 江苏通付盾科技有限公司 Data right confirming method and system based on block chain technology
CN114293846A (en) * 2021-11-16 2022-04-08 武汉小安科技有限公司 Unlocking control method and device for battery compartment lock, electronic equipment and storage medium
CN114362971A (en) * 2022-03-21 2022-04-15 南京大学 Digital asset right confirming and tracing method based on Hash algorithm
CN114666063A (en) * 2022-03-21 2022-06-24 矩阵时光数字科技有限公司 Traditional Hash algorithm-based digital asset tracing method
CN114666063B (en) * 2022-03-21 2023-09-19 矩阵时光数字科技有限公司 Digital asset tracing method based on traditional hash algorithm
WO2023178941A1 (en) * 2022-03-21 2023-09-28 南京大学 Digital-asset confirmation method based on hash algorithm, and digital asset tracing method based on hash algorithm

Also Published As

Publication number Publication date
CN109033789B (en) 2021-01-01

Similar Documents

Publication Publication Date Title
CN109033789A (en) A kind of generation method, the device and system of true warrant book
Konashevych General concept of real estate tokenization on blockchain: The right to choose
CN107659610B (en) Copyright protection method, device and system based on block chain technology
CN109074462B (en) Method and system for verifying ownership of digital assets using distributed hash tables and peer-to-peer distributed ledgers
TWI291109B (en) Method and apparatus for storing data records on a database system
CN106877998B (en) Electronic evidence management method and system
US11917071B2 (en) Data protection using universal tagging
CN102984201A (en) Artwork digital certification and true and false identification system
Shakan et al. Verification of university student and graduate data using blockchain technology
CN114915809A (en) Video file copyright protection method and transaction method based on block chain
Bhebhe Contemporary diplomatics of the civil and deceased estate case files found at the national archives of Zimbabwe
Chen et al. DCDChain: A credible architecture of digital copyright detection based on blockchain
KR20200021853A (en) Method and apparatus for distributing intellectual property and originality check of literary work based on blockchain technology
Shakila et al. Design and analysis of digital certificate verification and validation using blockchain-based technology
US7421078B2 (en) Valid medium management system
CN109033788A (en) A kind of certificate management method and device based on block chain technology
US20200213122A1 (en) Data protection using sporadically generated universal tags
PL434845A1 (en) Method and system for securing data, especially data from biotechnology laboratories
US20240078306A1 (en) Secure, self authenticating document verification system and methods
KR20110118498A (en) Apparatus, system and method for rights management
JP7127922B1 (en) CONTENT MANAGEMENT DEVICE, CONTENT MANAGEMENT METHOD AND CONTENT MANAGEMENT PROGRAM
Abdul Hadi et al. Blockchain for the Authentication and Immutability of Academic Credentials Issued in Brunei Darussalam
CN114417392B (en) Multi-auditing system for block chain editing permission
Longhorn et al. Legal issues in the use of geospatial data and tools for agriculture and natural resource management: A primer
Dalla Preda et al. Exploring NFT Validation through Digital Watermarking

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant