CN110599206A - Article quality authentication method and device, storage medium and electronic equipment - Google Patents

Article quality authentication method and device, storage medium and electronic equipment Download PDF

Info

Publication number
CN110599206A
CN110599206A CN201910888873.3A CN201910888873A CN110599206A CN 110599206 A CN110599206 A CN 110599206A CN 201910888873 A CN201910888873 A CN 201910888873A CN 110599206 A CN110599206 A CN 110599206A
Authority
CN
China
Prior art keywords
quality
authentication
target
detection data
target object
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910888873.3A
Other languages
Chinese (zh)
Inventor
张伟
申子熹
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201910888873.3A priority Critical patent/CN110599206A/en
Publication of CN110599206A publication Critical patent/CN110599206A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Health & Medical Sciences (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Development Economics (AREA)
  • Accounting & Taxation (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Economics (AREA)
  • Finance (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Databases & Information Systems (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The present disclosure provides an article quality authentication method and apparatus, an electronic device, a storage medium; relates to the technical field of computers. The article quality authentication method comprises the following steps: acquiring an authentication detection request of a target article, and acquiring identification information corresponding to the target article according to the authentication detection request; acquiring quality detection data corresponding to the target object through the identification information, and encrypting and uploading the quality detection data to a target block chain; generating an authentication tag according to the quality detection data and the identification information in the target block chain; and associating the authentication tag with the target article so that the target object performs quality authentication on the target article through the authentication tag. The method and the device can enable the user to know the quality authentication process of the target object, avoid the user from eating fake and shoddy food, improve the safety of the user eating the food and ensure the physical health of the user.

Description

Article quality authentication method and device, storage medium and electronic equipment
Technical Field
The present disclosure relates to the field of computer technologies, and in particular, to an article quality authentication method, an article quality authentication device, an electronic device, and a computer-readable storage medium.
Background
With the development of science and technology, the living standard of people is increasingly improved, and the requirements on food safety and food quality are higher and higher.
At present, most of the existing organic products (such as fruits, vegetables, meat and the like) on the market are difficult to distinguish true from false, related explanations and website links for inquiring quality certification are generally printed on organic product packages, but only product introduction can be seen, whether the quality information source of the products is reliable or real or not cannot be verified, and records of quality certification of the whole process of the commodities are lacked, so that a user is distrusted with the organic products, or counterfeit and shoddy products are purchased, the benefits of the consumer are damaged, and the consumption experience of the user is reduced.
It is to be noted that the information disclosed in the above background section is only for enhancement of understanding of the background of the present disclosure, and thus may include information that does not constitute prior art known to those of ordinary skill in the art.
Disclosure of Invention
An object of the present disclosure is to provide an article quality authentication method, an article quality authentication apparatus, an electronic device, and a computer-readable storage medium, which overcome the problems of the related art that a consumer cannot be provided with data for effective quality authentication of a product, resulting in distrust of an organic product by the user, or purchase of counterfeit and shoddy products, which damages the interests of the consumer, to a certain extent due to limitations and disadvantages of the related art.
According to a first aspect of the present disclosure, there is provided an article quality authentication method comprising:
acquiring an authentication detection request of a target article, and acquiring identification information corresponding to the target article according to the authentication detection request;
acquiring quality detection data corresponding to the target object through the identification information, and encrypting and uploading the quality detection data to a target block chain;
generating an authentication tag according to the quality detection data and the identification information in the target block chain;
and associating the authentication tag with the target article so that the target object performs quality authentication on the target article through the authentication tag.
In an exemplary embodiment of the present disclosure, after associating the authentication tag with the target item, the method further includes:
responding to the target object to activate the authentication tag associated with the target article, and acquiring quality detection data corresponding to the authentication tag from the target block chain;
presenting the quality detection data to the target object; wherein the quality inspection data comprises one or more of a quality certification application, an article composition inspection report, and a production quality inspection report.
In an exemplary embodiment of the present disclosure, the quality detection data further comprises a digital notarization certificate, and the presenting the quality detection data to the target object comprises:
presenting the quality detection data and the digital notarization certificate to the target object so that the target object determines the authenticity of the quality detection data through the digital notarization certificate.
In an exemplary embodiment of the present disclosure, the method further comprises:
periodically updating the quality detection data, and encrypting and uploading the updated quality detection data to the target block chain; and
and periodically updating the authentication label corresponding to the quality detection data.
In an exemplary embodiment of the present disclosure, acquiring an authentication detection request of a target item, and acquiring identification information corresponding to the target item according to the authentication detection request includes:
when an authentication detection request uploaded by a target object is monitored, acquiring a quality authentication application corresponding to the target object;
and determining the identification information corresponding to the target object from the quality certification application through a pre-trained identification information extraction model.
In an exemplary embodiment of the present disclosure, the authentication tag includes decryption information, and the acquiring, from the target blockchain, quality detection data corresponding to the authentication tag in response to the target object activating the authentication tag associated with the target item includes:
responding to the target object to activate the authentication tag associated with the target object, and acquiring decryption information and the identification information in the authentication tag;
and connecting the target block chain through the decryption information, and acquiring quality detection data corresponding to the authentication tag from the target block chain according to the identification information.
In an exemplary embodiment of the present disclosure, acquiring, by the identification information, quality detection data corresponding to the target item, and uploading the quality detection data to a target block chain in an encrypted manner further includes:
classifying the target object according to the identification information, and determining a classification result of the target object;
and encrypting and uploading the classified quality detection data of the target object to a target block chain according to the classification result.
According to a second aspect of the present disclosure, there is provided an article quality authentication apparatus comprising:
the identification information acquisition module is used for acquiring an authentication detection request of a target article and acquiring identification information corresponding to the target article according to the authentication detection request;
the quality detection data uploading module is used for acquiring quality detection data corresponding to the target object through the identification information and uploading the quality detection data to a target block chain in an encrypted manner;
the authentication tag generation module is used for generating an authentication tag according to the quality detection data and the identification information in the target block chain;
and the authentication tag association module is used for associating the authentication tag with the target object so that the target object can perform quality authentication on the target object through the authentication tag.
In an exemplary embodiment of the present disclosure, the article quality authentication apparatus further includes:
the quality detection data acquisition unit is used for responding to the target object to activate the authentication tag associated with the target object and acquiring quality detection data corresponding to the authentication tag from the target block chain;
a quality detection data display unit for presenting the quality detection data to the target object; wherein the quality inspection data comprises one or more of a quality certification application, an article composition inspection report, and a production quality inspection report.
In an exemplary embodiment of the present disclosure, the quality detection data further includes a digital notarization certificate, the quality detection data display unit is further configured to:
presenting the quality detection data and the digital notarization certificate to the target object so that the target object determines the authenticity of the quality detection data through the digital notarization certificate.
In an exemplary embodiment of the present disclosure, the article quality authentication apparatus further includes:
the quality detection data updating unit is used for periodically updating the quality detection data and encrypting and uploading the updated quality detection data to the target block chain; and
and the authentication label updating unit is used for periodically updating the authentication label corresponding to the quality detection data.
In an exemplary embodiment of the present disclosure, the identification information acquisition module is configured to:
when an authentication detection request uploaded by a target object is monitored, acquiring a quality authentication application corresponding to the target object;
and determining the identification information corresponding to the target object from the quality certification application through a pre-trained identification information extraction model.
In an exemplary embodiment of the present disclosure, the quality detection data acquisition unit is configured to:
responding to the target object to activate the authentication tag associated with the target object, and acquiring decryption information and the identification information in the authentication tag;
and connecting the target block chain through the decryption information, and acquiring quality detection data corresponding to the authentication tag from the target block chain according to the identification information.
In an exemplary embodiment of the present disclosure, the quality detection data uploading module is configured to:
classifying the target object according to the identification information, and determining a classification result of the target object;
and encrypting and uploading the classified quality detection data of the target object to a target block chain according to the classification result.
According to a third aspect of the present disclosure, there is provided an electronic device comprising: a processor; and a memory for storing executable instructions of the processor; wherein the processor is configured to perform the method of any one of the above via execution of the executable instructions.
According to a fourth aspect of the present disclosure, there is provided a computer readable storage medium having stored thereon a computer program which, when executed by a processor, implements the method of any one of the above.
Exemplary embodiments of the present disclosure may have some or all of the following benefits:
in the article quality authentication method provided by an example embodiment of the present disclosure, quality detection data corresponding to a target article is obtained according to identification information in an authentication detection request, and the quality detection data is uploaded to a target block chain in an encrypted manner; and generating an authentication tag according to the quality detection data and the identification information in the target block chain, and associating the authentication tag with the target article so that the target object performs quality authentication on the target article through the authentication tag. On one hand, the quality detection data corresponding to the target object is encrypted and uploaded to the target block chain, and the corresponding authentication label is generated, so that the target object can obtain the quality detection data corresponding to the target object in the target block chain through the authentication label, the operation is simple, the authenticity of the quality detection data can be ensured due to the non-tamper property of the block chain, a consumer can correctly select the object according to the quality detection data, and the benefit and the body health of the consumer are guaranteed; on the other hand, when the target object uses the authentication tag, the quality authentication is firstly required and the quality detection data is uploaded to the block chain, so that a producer of the target object can be indirectly urged to produce the high-quality target object, the quality of the target object is further improved, the safety of the target object is ensured, the benefit of a consumer is guaranteed, and the use experience of the consumer is improved.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present disclosure and together with the description, serve to explain the principles of the disclosure. It is to be understood that the drawings in the following description are merely exemplary of the disclosure, and that other drawings may be derived from those drawings by one of ordinary skill in the art without the exercise of inventive faculty.
Fig. 1 is a schematic diagram illustrating an exemplary system architecture to which an article quality authentication method and apparatus according to an embodiment of the present disclosure may be applied;
FIG. 2 illustrates a schematic structural diagram of a computer system suitable for use with the electronic device used to implement embodiments of the present disclosure;
FIG. 3 schematically shows a flow diagram of an article quality authentication method according to one embodiment of the present disclosure;
FIG. 4 schematically shows a schematic diagram of a data sharing system according to one embodiment of the present disclosure;
FIG. 5 schematically illustrates a schematic diagram of a block chain corresponding to each node in the data sharing system, according to one embodiment of the present disclosure;
FIG. 6 schematically shows a schematic diagram of chunk generation in a data sharing system according to one embodiment of the present disclosure;
FIG. 7 schematically illustrates a flow diagram of quality authentication of a target item according to one embodiment of the present disclosure;
FIG. 8 schematically illustrates a flow diagram for quality authentication of a target item by an item quality authentication method according to one embodiment of the present disclosure;
fig. 9 schematically shows a schematic block diagram of an article quality authentication apparatus according to one embodiment of the present disclosure.
Detailed Description
Example embodiments will now be described more fully with reference to the accompanying drawings. Example embodiments may, however, be embodied in many different forms and should not be construed as limited to the examples set forth herein; rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the concept of example embodiments to those skilled in the art. The described features, structures, or characteristics may be combined in any suitable manner in one or more embodiments. In the following description, numerous specific details are provided to give a thorough understanding of embodiments of the disclosure. One skilled in the relevant art will recognize, however, that the subject matter of the present disclosure can be practiced without one or more of the specific details, or with other methods, components, devices, steps, and the like. In other instances, well-known technical solutions have not been shown or described in detail to avoid obscuring aspects of the present disclosure.
Furthermore, the drawings are merely schematic illustrations of the present disclosure and are not necessarily drawn to scale. The same reference numerals in the drawings denote the same or similar parts, and thus their repetitive description will be omitted. Some of the block diagrams shown in the figures are functional entities and do not necessarily correspond to physically or logically separate entities. These functional entities may be implemented in the form of software, or in one or more hardware modules or integrated circuits, or in different networks and/or processor devices and/or microcontroller devices.
Fig. 1 is a schematic diagram illustrating a system architecture of an exemplary application environment to which an article quality authentication method and apparatus according to an embodiment of the present disclosure may be applied.
As shown in fig. 1, the system architecture 100 may include one or more of terminal devices 101, 102, 103, a network 104, and a server 105. The network 104 serves as a medium for providing communication links between the terminal devices 101, 102, 103 and the server 105. Network 104 may include various connection types, such as wired, wireless communication links, or fiber optic cables, to name a few. The terminal devices 101, 102, 103 may be various electronic devices having a display screen, including but not limited to desktop computers, portable computers, smart phones, tablet computers, and the like. It should be understood that the number of terminal devices, networks, and servers in fig. 1 is merely illustrative. There may be any number of terminal devices, networks, and servers, as desired for implementation. For example, server 105 may be a server cluster comprised of multiple servers, or the like.
The article quality authentication method provided by the embodiment of the present disclosure is generally executed by the server 105, and accordingly, an article quality authentication apparatus is generally provided in the server 105. However, it is easily understood by those skilled in the art that the method for authenticating the quality of an article provided in the embodiment of the present disclosure may also be executed by the terminal devices 101, 102, and 103, and accordingly, the apparatus for authenticating the quality of an article may also be disposed in the terminal devices 101, 102, and 103, which is not particularly limited in this exemplary embodiment.
FIG. 2 illustrates a schematic structural diagram of a computer system suitable for use in implementing the electronic device of an embodiment of the present disclosure.
It should be noted that the computer system 200 of the electronic device shown in fig. 2 is only an example, and should not bring any limitation to the functions and the scope of the application of the embodiments of the present disclosure.
As shown in fig. 2, the computer system 200 includes a Central Processing Unit (CPU)201 that can perform various appropriate actions and processes in accordance with a program stored in a Read Only Memory (ROM)202 or a program loaded from a storage section 208 into a Random Access Memory (RAM) 203. In the RAM 203, various programs and data necessary for system operation are also stored. The CPU201, ROM 202, and RAM 203 are connected to each other via a bus 204. An input/output (I/O) interface 205 is also connected to bus 204.
The following components are connected to the I/O interface 205: an input portion 206 including a keyboard, a mouse, and the like; an output section 207 including a display such as a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), and the like, and a speaker; a storage section 208 including a hard disk and the like; and a communication section 209 including a network interface card such as a LAN card, a modem, or the like. The communication section 209 performs communication processing via a network such as the internet. A drive 210 is also connected to the I/O interface 205 as needed. A removable medium 211 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is mounted on the drive 210 as necessary, so that a computer program read out therefrom is mounted into the storage section 208 as necessary.
In particular, the processes described below with reference to the flowcharts may be implemented as computer software programs, according to embodiments of the present disclosure. For example, embodiments of the present disclosure include a computer program product comprising a computer program embodied on a computer readable medium, the computer program comprising program code for performing the method illustrated in the flow chart. In such an embodiment, the computer program may be downloaded and installed from a network through the communication section 209 and/or installed from the removable medium 211. The computer program, when executed by a Central Processing Unit (CPU)201, performs various functions defined in the methods and apparatus of the present application. In some embodiments, the computer system 200 may further include an AI (artificial intelligence) processor for processing computing operations related to machine learning.
It should be noted that the computer readable media shown in the present disclosure may be computer readable signal media or computer readable storage media or any combination of the two. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples of the computer readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the present disclosure, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In contrast, in the present disclosure, a computer-readable signal medium may include a propagated data signal with computer-readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: wireless, wire, fiber optic cable, RF, etc., or any suitable combination of the foregoing.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams or flowchart illustration, and combinations of blocks in the block diagrams or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units described in the embodiments of the present disclosure may be implemented by software, or may be implemented by hardware, and the described units may also be disposed in a processor. Wherein the names of the elements do not in some way constitute a limitation on the elements themselves.
As another aspect, the present application also provides a computer-readable medium, which may be contained in the electronic device described in the above embodiments; or may exist separately without being assembled into the electronic device. The computer readable medium carries one or more programs which, when executed by an electronic device, cause the electronic device to implement the method as described in the embodiments below. For example, the electronic device may implement the various steps shown in fig. 3, and so on.
The technical solution of the embodiment of the present disclosure is explained in detail below:
the present example embodiment provides an article quality authentication method. The article quality authentication method may be applied to the server 105, and may also be applied to one or more of the terminal devices 101, 102, and 103, which is not particularly limited in this exemplary embodiment. Referring to fig. 3, the article quality authentication method may include the following steps S310 to S340:
step S310, acquiring an authentication detection request of a target article, and acquiring identification information corresponding to the target article according to the authentication detection request;
step S320, acquiring quality detection data corresponding to the target object through the identification information, and encrypting and uploading the quality detection data to a target block chain;
step S330, generating an authentication tag according to the quality detection data and the identification information in the target block chain;
step S340, performing association processing on the authentication tag and the target object, so that the target object performs quality authentication on the target object through the authentication tag.
In the method for authenticating the quality of an article provided by the present exemplary embodiment, on one hand, the quality detection data corresponding to the target article is encrypted and uploaded to the target block chain, and a corresponding authentication tag is generated, so that the target object obtains the quality detection data corresponding to the target article in the target block chain through the authentication tag, which not only is simple to operate, but also can ensure the authenticity of the quality detection data due to the non-tamper-resistance of the block chain, so that a consumer can correctly select an article according to the quality detection data, and the benefit and physical health of the consumer are ensured; on the other hand, when the target object uses the authentication tag, the quality authentication is firstly required and the quality detection data is uploaded to the block chain, so that a producer of the target object can be indirectly urged to produce the high-quality target object, the quality of the target object is further improved, the safety of the target object is ensured, the benefit of a consumer is guaranteed, and the use experience of the consumer is improved.
The above steps of the present exemplary embodiment will be described in more detail below.
In step S310, an authentication detection request of a target article is obtained, and identification information corresponding to the target article is obtained according to the authentication detection request.
In an example embodiment of the present disclosure, the target object may refer to an organic product or a food that needs to be quality-detected and authenticated, for example, the target object may be a certain brand of fruit to be quality-detected or a certain brand of meat to be quality-detected, and of course, the target object may also be a certain brand of vegetable to be quality-detected, which is not particularly limited in this example embodiment. The authentication detection request may refer to a request instruction for the applicant to apply for quality detection authentication of the target item, for example, the authentication detection request may be an application request made by the applicant at a quality authentication center specified by a country, or may be a request for filling a quality authentication application made by the applicant at a website specified by an authority, or of course, the authentication detection request may be a product quality authentication request initiated in another manner, and the present exemplary embodiment is not limited thereto. The identification information may be information corresponding to a unique identifier corresponding to the target article, for example, the identification information may be combination information of a name and a production location of the target article, or may be a unique authentication code generated when the target article performs a quality authentication application, of course, the identification information may also be other information capable of uniquely identifying the target article, which is not limited in this example embodiment.
Specifically, when an authentication detection request uploaded by a target object is monitored, a quality authentication application corresponding to the target object is obtained; and determining the identification information corresponding to the target object from the quality certification application through a pre-trained identification information extraction model. The quality certification application may refer to an application generated when the target object is subjected to quality inspection certification, and may include, as a basis for quality certification of the target object, information related to a manufacturing enterprise, basic information of the target object, or data such as a range or a product to which the quality certification is applied. The identification information extraction model may be a learning model capable of extracting the identification information of the target item from the quality certification application form, for example, the identification information extraction model may be a pre-trained classification model with a classification function, or may be a pre-trained image recognition model capable of extracting the identification information of the target item from an image of the quality certification application form, of course, the identification information extraction model may also be another learning model capable of extracting the identification information of the target item from text information or image information, which is not limited in this example embodiment. By extracting the identification information of the target article from the quality authentication application corresponding to the target article, the authentication efficiency of the target article can be effectively improved, and the accuracy of quality authentication data storage is improved.
In step S320, the quality detection data corresponding to the target object is obtained through the identification information, and the quality detection data is encrypted and uploaded to the target block chain.
In an example embodiment of the present disclosure, the quality inspection data may refer to quality inspection reports generated when quality authentication is performed on the target item by a plurality of quality inspection authorities, and the quality inspection data may include one or more of a quality authentication application, an item composition inspection report, a production quality inspection report, and a digital certificate. The quality certification application may be an application report generated when the applicant applies for quality detection certification of a target article to a national quality certification center CQC, the article component detection report may be a detection report generated after the national quality certification center CQC instructs a relevant laboratory to detect harmful components of the target article, the production quality inspection report may be an inspection report generated after the national quality certification center CQC instructs a relevant inspection and investigation group to go to a production place of the target article for field investigation, and the digital notarization certificate may be a certification report generated after the applicant or the national quality certification center CQC notarizes an integer in the quality detection certification process through a third-party notarization institution. The target block chain may refer to a created block chain for performing quality authentication on the target item, for example, the target block chain may be a common public chain or a federation chain, and of course, the target block chain may also be a private chain, which is not particularly limited in this example embodiment.
Specifically, the target block chain may refer to a novel application mode of a computer technology such as distributed data storage, point-to-point transmission, a consensus mechanism, and an encryption algorithm. A block chain (Blockchain), which is essentially a decentralized database, is a series of data blocks associated by using a cryptographic method, and each data block contains information of a batch of network transactions, so as to verify the validity (anti-counterfeiting) of the information and generate a next block. The blockchain may include a blockchain underlying platform, a platform product services layer, and an application services layer. The underlying platform of the target block chain may include processing modules such as user management, basic service, intelligent contracts, and operation monitoring. The user management module is responsible for identity information management of all blockchain participants, and comprises public and private key generation maintenance (account management), key management, user real identity and blockchain address corresponding relation maintenance (authority management) and the like, and under the authorization condition, the user management module supervises and audits the transaction condition of certain real identities and provides rule configuration (wind control audit) of risk control; the basic service module is deployed on all block chain node equipment and used for verifying the validity of the service request, recording the service request to storage after consensus on the valid request is completed, for a new service request, the basic service firstly performs interface adaptation analysis and authentication processing (interface adaptation), then encrypts service information (consensus management) through a consensus algorithm, transmits the service information to a shared account (network communication) completely and consistently after encryption, and performs recording and storage; the intelligent contract module is responsible for registering and issuing contracts, triggering the contracts and executing the contracts, developers can define contract logics through a certain programming language, issue the contract logics to a block chain (contract registration), call keys or other event triggering and executing according to the logics of contract clauses, complete the contract logics and simultaneously provide the function of upgrading and canceling the contracts; the operation monitoring module is mainly responsible for deployment, configuration modification, contract setting, cloud adaptation in the product release process and visual output of real-time states in product operation, such as: alarm, monitoring network conditions, monitoring node equipment health status, and the like.
Further, classifying the target object according to the identification information, and determining a classification result of the target object; and encrypting and uploading the classified quality detection data of the target object to a target block chain according to the classification result. The classification result may refer to different categories into which the plurality of target items are classified according to the identification information of the target items, for example, the classification result may be a fruit target item or a vegetable target item, and of course, the classification result may also be an animal meat target item, which is not particularly limited in this example. Before the quality detection data of the target object are encrypted and uploaded to the target block chain, the target object is classified through the identification information of the target object, and the quality detection data of the target object are encrypted and uploaded to the target block chain according to the classification result, so that the quality detection data of the target object of different classifications can be managed conveniently, and meanwhile, the efficiency of a consumer for inquiring the quality detection data in the target block chain is improved.
Specifically, referring to the data sharing system shown in fig. 4, the data sharing system 400 refers to a system for performing data sharing between nodes, the data sharing system may include a plurality of nodes 401, and the plurality of nodes 401 may refer to each client in the data sharing system. Each node 401 may receive input information and maintain shared data within the data sharing system based on the received input information while operating normally. In order to ensure information intercommunication in the data sharing system, information connection can exist between each node in the data sharing system, and information transmission can be carried out between the nodes through the information connection. For example, when any node in the data sharing system receives different vertical domain knowledge graphs, other nodes in the data sharing system acquire the vertical domain knowledge graph according to a consensus algorithm, and store the vertical domain knowledge graph as data in shared data, so that the data stored on all the nodes in the data sharing system are consistent.
Each node in the data sharing system has a node identifier corresponding thereto, and each node in the data sharing system may store a node identifier of another node in the data sharing system, so that the generated block is broadcast to the other node in the data sharing system according to the node identifier of the other node in the following. Each node may maintain a node identifier list as shown in the following table, and store the node name and the node identifier in the node identifier list correspondingly. The node identifier may be an IP (Internet Protocol) address and any other information that can be used to identify the node, and table 1 only illustrates the IP address as an example.
TABLE 1 node identification
Node name Node identification
Node 1 117.114.151.174
Node 2 117.116.189.145
Node N 119.123.789.258
Each node in the data sharing system stores one identical blockchain. The block chain is composed of a plurality of blocks, as shown in fig. 5, the block chain is composed of a plurality of blocks, the starting block includes a block header and a block main body, the block header stores an input information characteristic value, a version number, a timestamp and a difficulty value, and the block main body stores input information; the next block of the starting block takes the starting block as a parent block, the next block also comprises a block head and a block main body, the block head stores the input information characteristic value of the current block, the block head characteristic value of the parent block, the version number, the timestamp and the difficulty value, and the like, so that the block data stored in each block in the block chain is associated with the block data stored in the parent block, and the safety of the input information in the block is ensured.
When each block in the block chain is generated, referring to fig. 6, when a node where the block chain is located receives input information, the input information is verified, after the verification is completed, the input information is stored in the memory pool, and the hash tree for recording the input information is updated; and then, updating the updating time stamp to the time when the input information is received, trying different random numbers, and performing characteristic value calculation for multiple times, so that the calculated characteristic value can satisfy the following formula (1):
wherein, SHA256 is a characteristic value algorithm used for calculating a characteristic value; version is version information of the relevant block protocol in the block chain; prev _ hash is a block head characteristic value of a parent block of the current block; merkle _ root is a characteristic value of the input information; ntime is the update time of the update timestamp; nbits is the current difficulty, is a fixed value within a period of time, and is determined again after exceeding a fixed time period; x is a random number; TARGET is a feature threshold, which can be determined from nbits.
Thus, when the random number satisfying the formula (1) is obtained by calculation, the information can be correspondingly stored, and the block header and the block body are generated to obtain the current block. And then, the node where the block chain is located respectively sends the newly generated blocks to other nodes in the data sharing system where the newly generated blocks are located according to the node identifications of the other nodes in the data sharing system, the newly generated blocks are verified by the other nodes, and the newly generated blocks are added to the block chain stored in the newly generated blocks after the verification is completed.
In step S330, an authentication tag is generated according to the quality detection data and the identification information in the target block chain.
In an example embodiment of the present disclosure, the authentication tag may refer to a query connection entry provided on the target item and facilitating a consumer to query quality detection data of the target item, for example, an expression form of the authentication tag may be an electronic tag, or may be any one of a two-dimensional code, a three-dimensional code, or a barcode, of course, the authentication tag may also be another expression form of the query connection entry of the quality detection data, which is not particularly limited in this example embodiment. The quality detection data and the identification information in the target block chain are generated into the authentication tag, so that a consumer can quickly inquire the quality detection data of the target object according to the authentication tag, the operation of inquiring the quality detection data is simplified, and the use experience of the consumer is improved.
In step S340, the authentication tag and the target article are associated, so that the target object performs quality authentication on the target article through the authentication tag.
In an example embodiment of the present disclosure, the association process may refer to a process of binding the authentication tag and the target item, for example, the association process may be printing a graphic corresponding to the authentication tag on a package of the target item, and of course, the association process may also be another process of binding the authentication tag and the target item, which is not limited to this example embodiment. The target object may be an object that needs to obtain quality inspection data of the target item, for example, the target object may be a consumer who purchases the target item, or may be a person or a mechanism that inspects whether the quality security of the target item is qualified, which is not particularly limited in this exemplary embodiment.
Specifically, an authentication tag associated with a target article is activated in response to a target object, and quality detection data corresponding to the authentication tag is acquired from a target block chain; the quality detection data is presented to the target object. The activating of the authentication tag associated with the target item may refer to an operation that the target object opens the query entry corresponding to the authentication tag through the related terminal device, for example, when it is assumed that the authentication tag may be a two-dimensional code graph, the target object may open the query entry corresponding to the authentication tag through a scanning function provided on the smart phone, which is only an exemplary illustration here, and this example embodiment is not limited thereto. Presenting the quality detection data to the target object may refer to an operation of displaying the quality detection data to the target object by activating a display interface of the terminal device of the query entry corresponding to the authentication tag.
Further, the quality detection data and the digital notarization certificate are presented to the target object, so that the target object determines the authenticity of the quality detection data through the digital notarization certificate. The digital notarization certificate may refer to a certification report generated after the applicant or a national quality certification center CQC notarizes an integer in the quality detection certification process by a third-party notarization authority. When the target object obtains the quality detection data of the target object through the authentication tag, the digital notarization certificate corresponding to the quality detection data is presented to the target object, the quality detection data is verified through the digital notarization certificate to determine the authenticity of the quality detection data, supervision on the quality detection data of the target object is further strengthened, a fake target object is prevented from flowing into the market or being purchased by a consumer, and consumption experience of the consumer is improved.
Further, responding to the target object to activate the authentication tag associated with the target object, and acquiring decryption information and identification information in the authentication tag; and connecting the target block chain through the decryption information, and acquiring quality detection data corresponding to the authentication tag from the target block chain according to the identification information. The authentication tag may include decryption information, where the decryption information may refer to information used for accessing the target block chain in the authentication tag, for example, the decryption information may be a private key generated by asymmetric encryption when the quality detection data is encrypted and uploaded to the target block chain, and of course, the decryption information may also be other information used for accessing the target block chain, which is not particularly limited in this example embodiment.
Optionally, periodically updating the quality detection data, and encrypting and uploading the updated quality detection data to the target block chain; and periodically updating the authentication label corresponding to the quality detection data. The periodic update may refer to that the national quality certification center CQC may periodically (for example, every year) perform spot check or re-detection on the target object to ensure validity of the quality detection data, encrypt and upload the updated quality detection data to the target block chain when the quality detection data changes, and after the quality detection data is updated, correspondingly update the certification label of the target object to ensure validity of the quality detection data acquired by the target object.
Fig. 7 schematically illustrates a flow diagram of quality authentication of a target item according to one embodiment of the present disclosure.
Referring to fig. 7, in step S701, an applicant (application enterprise) submits a quality certification application and accessories for a target item on line or a national quality certification center CQC;
step S702, a server of the national quality certification center CQC (block chain node corresponding to the national quality certification center CQC) uploads a quality certification application and accessory encryption submitted by an applicant to a target block chain;
step S703, the national quality certification center CQC provides a payment entrance, and the applicant carries out quality certification payment through the payment entrance to complete the quality certification application of the target object;
step S704, the applicant sends a detection sample of the target item to a national quality certification center CQC;
step S705, the national quality certification center CQC appoints a laboratory to detect a detection sample of a target article and generates a target article component detection report (type experiment report);
step S706, the laboratory feeds back an article component detection report (type experiment report) to a national quality certification center CQC for further quality detection certification;
step S707, the server of the laboratory (corresponding block chain node of the laboratory) encrypts and uploads the generated article component detection report (type experiment report) to the target block chain;
step S708, the national quality certification center CQC designates a detection mechanism (detection group) to go to a production place corresponding to the target object to detect the production environment and the production process so as to generate a production quality inspection report corresponding to the target object;
step S709, the server of the detection mechanism feeds back the obtained production quality inspection report to the national quality certification center CQC for further quality detection certification;
step S710, a server of the detection mechanism (a block chain node corresponding to the detection mechanism) encrypts and uploads a production quality inspection report to a target block chain;
step S711, the national quality certification center CQC evaluates the target object according to the object component detection report (type experiment report) and the production quality inspection report, and authorizes the issuance of a certification certificate after the evaluation is passed (and encrypts and uploads the certification certificate to the target block chain);
step S712, after obtaining the approval and issue certification certificate, the applicant purchases the product quality certification mark and pastes the label on the target object;
step S713, a server of the national quality certification center CQC (block chain node corresponding to the national quality certification center CQC) encrypts and uploads a purchase record of a product quality certification mark of a target article to a target block chain;
step S714, the national quality certification center CQC periodically performs spot check or supervision on the target object to generate a spot check or supervision report;
step S715, encrypting and uploading a spot check or supervision report corresponding to the target object to a target block chain by a server (block chain node corresponding to the national quality authentication center CQC) of the national quality authentication center CQC;
step S716, the two-dimensional code traceability query system generates an authentication tag of the target article according to the quality detection data in the target block chain, and then associates the authentication tag with the target article, so that the target object obtains the quality detection data of the target article in the target block chain through the authentication tag, and presents the quality detection data to the target object for quality authentication.
Fig. 8 schematically illustrates a flow diagram of quality authentication of a target item by an item quality authentication method according to one embodiment of the present disclosure.
Referring to fig. 8, in step S801, an authentication detection request corresponding to a target item newly uploaded by an applicant is obtained, where the authentication detection request may include basic information of the target item and information of a manufacturing enterprise;
step S802, generating a quality authentication application corresponding to the target article according to the data in the authentication detection request and a preset application form;
step S803, determining whether the condition for performing the quality detection of the target article is satisfied (for example, whether the quality authentication application is completely filled or whether the data in the quality authentication application conforms to the specification, etc.) according to the quality authentication application, if it is determined that the condition for performing the quality detection of the target article is satisfied, performing step S804, otherwise, performing step S805;
step S804, extracting identification information (such as an application code of the target object) of the target object in a preset mode according to the quality certification application form;
step S805, the applicant is guided to refill the authentication detection request, and the process returns to step S801;
step S806, sending the quality certification application and the identification information of the target object to each detection mechanism, so that each detection mechanism can perform quality detection on the target object according to the quality certification application;
step S807, the designated laboratory detects the target item according to the sample of the target item sent by the applicant, and generates an item component detection report corresponding to the target item;
step S808, appointing a third-party notarization institution to notarize the detection or inspection process to generate a digital notarization certificate;
step S809, appointing a monitoring organization to go to a production place or a production environment of the target object for checking, and generating a production quality check report corresponding to the target object;
step S810, acquiring a quality authentication application form, an article component detection report, a production quality inspection report and a digital notarization certificate as quality detection data of the target article according to the identification information of the target article;
step S811, classifying the quality detection data according to the identification information, and uploading the classified quality detection data to a target block chain;
step S812, determining whether the quality detection data of the target object exceeds a preset time period, that is, determining whether the quality detection data of the target object meets a condition of periodic update, if it is determined that the quality detection data needs to be updated, returning to execute steps S806 to S812, otherwise executing step S813;
step S813, generating an authentication tag according to the quality detection data on the target block chain, and associating the target item with the authentication tag, so that the target object performs quality authentication on the target item according to the authentication tag.
It should be noted that although the various steps of the methods of the present disclosure are depicted in the drawings in a particular order, this does not require or imply that these steps must be performed in this particular order, or that all of the depicted steps must be performed, to achieve desirable results. Additionally or alternatively, certain steps may be omitted, multiple steps combined into one step execution, and/or one step broken down into multiple step executions, etc.
Further, in the present exemplary embodiment, an article quality authentication apparatus is also provided. The article quality authentication device can be applied to a server or a terminal device. Referring to fig. 8, the article quality authentication apparatus 800 may include an identification information acquisition module 810, a quality detection data upload module 820, an authentication tag generation module 830, and an authentication tag association module 840. Wherein:
the identification information obtaining module 810 is configured to obtain an authentication detection request of a target article, and obtain identification information corresponding to the target article according to the authentication detection request;
the quality detection data uploading module 820 is configured to obtain quality detection data corresponding to the target object through the identification information, and encrypt and upload the quality detection data to a target block chain;
the authentication tag generation module 830 is configured to generate an authentication tag according to the quality detection data and the identification information in the target block chain;
the authentication tag association module 840 is configured to associate the authentication tag with the target item, so that the target object performs quality authentication on the target item through the authentication tag.
In an exemplary embodiment of the present disclosure, the article quality authentication apparatus 800 further includes:
the quality detection data acquisition unit is used for responding to the target object to activate the authentication tag associated with the target object and acquiring quality detection data corresponding to the authentication tag from the target block chain;
a quality detection data display unit for presenting the quality detection data to the target object; wherein the quality inspection data comprises one or more of a quality certification application, an article composition inspection report, and a production quality inspection report.
In an exemplary embodiment of the present disclosure, the quality detection data further includes a digital notarization certificate, the quality detection data display unit is further configured to:
presenting the quality detection data and the digital notarization certificate to the target object so that the target object determines the authenticity of the quality detection data through the digital notarization certificate.
In an exemplary embodiment of the present disclosure, the article quality authentication apparatus 800 further includes:
the quality detection data updating unit is used for periodically updating the quality detection data and encrypting and uploading the updated quality detection data to the target block chain; and
and the authentication label updating unit is used for periodically updating the authentication label corresponding to the quality detection data.
In an exemplary embodiment of the present disclosure, the identification information obtaining module 810 is configured to:
when an authentication detection request uploaded by a target object is monitored, acquiring a quality authentication application corresponding to the target object;
and determining the identification information corresponding to the target object from the quality certification application through a pre-trained identification information extraction model.
In an exemplary embodiment of the present disclosure, the quality detection data acquisition unit is configured to:
responding to the target object to activate the authentication tag associated with the target object, and acquiring decryption information and the identification information in the authentication tag;
and connecting the target block chain through the decryption information, and acquiring quality detection data corresponding to the authentication tag from the target block chain according to the identification information.
In an exemplary embodiment of the present disclosure, the quality detection data uploading module 820 is configured to:
classifying the target object according to the identification information, and determining a classification result of the target object;
and encrypting and uploading the classified quality detection data of the target object to a target block chain according to the classification result.
The specific details of each module or unit in the article quality authentication device have been described in detail in the corresponding article quality authentication method, and therefore are not described herein again.
It should be noted that although in the above detailed description several modules or units of the device for action execution are mentioned, such a division is not mandatory. Indeed, the features and functionality of two or more modules or units described above may be embodied in one module or unit, according to embodiments of the present disclosure. Conversely, the features and functions of one module or unit described above may be further divided into embodiments by a plurality of modules or units.
Other embodiments of the disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the disclosure disclosed herein. This application is intended to cover any variations, uses, or adaptations of the disclosure following, in general, the principles of the disclosure and including such departures from the present disclosure as come within known or customary practice within the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the disclosure being indicated by the following claims.
It will be understood that the present disclosure is not limited to the precise arrangements described above and shown in the drawings and that various modifications and changes may be made without departing from the scope thereof. The scope of the present disclosure is limited only by the appended claims.

Claims (10)

1. An article quality authentication method, comprising:
acquiring an authentication detection request of a target article, and acquiring identification information corresponding to the target article according to the authentication detection request;
acquiring quality detection data corresponding to the target object through the identification information, and encrypting and uploading the quality detection data to a target block chain;
generating an authentication tag according to the quality detection data and the identification information in the target block chain;
and associating the authentication tag with the target article so that the target object performs quality authentication on the target article through the authentication tag.
2. The item quality authentication method according to claim 1, wherein after the associating process of the authentication tag with the target item, the method further comprises:
responding to the target object to activate the authentication tag associated with the target article, and acquiring quality detection data corresponding to the authentication tag from the target block chain;
presenting the quality detection data to the target object; wherein the quality inspection data comprises one or more of a quality certification application, an article composition inspection report, and a production quality inspection report.
3. The article quality authentication method of claim 2, wherein the quality detection data further comprises a digital notary certificate, said presenting the quality detection data to the target object comprising:
presenting the quality detection data and the digital notarization certificate to the target object so that the target object determines the authenticity of the quality detection data through the digital notarization certificate.
4. The article quality authentication method of claim 1, further comprising:
periodically updating the quality detection data, and encrypting and uploading the updated quality detection data to the target block chain; and
and periodically updating the authentication label corresponding to the quality detection data.
5. The article quality authentication method according to claim 1, wherein acquiring an authentication detection request of a target article, and acquiring identification information corresponding to the target article according to the authentication detection request comprises:
when an authentication detection request uploaded by a target object is monitored, acquiring a quality authentication application corresponding to the target object;
and determining the identification information corresponding to the target object from the quality certification application through a pre-trained identification information extraction model.
6. The article quality authentication method according to claim 2, wherein the authentication tag comprises decryption information, and the acquiring, from the target blockchain, the quality detection data corresponding to the authentication tag in response to the target object activating the authentication tag associated with the target article comprises:
responding to the target object to activate the authentication tag associated with the target object, and acquiring decryption information and the identification information in the authentication tag;
and connecting the target block chain through the decryption information, and acquiring quality detection data corresponding to the authentication tag from the target block chain according to the identification information.
7. The method for authenticating the quality of the object according to claim 1, wherein the obtaining the quality detection data corresponding to the object through the identification information and the encrypting and uploading the quality detection data to the object block chain further comprises:
classifying the target object according to the identification information, and determining a classification result of the target object;
and encrypting and uploading the classified quality detection data of the target object to a target block chain according to the classification result.
8. An article quality authentication apparatus, comprising:
the identification information acquisition module is used for acquiring an authentication detection request of a target article and acquiring identification information corresponding to the target article according to the authentication detection request;
the quality detection data uploading module is used for acquiring quality detection data corresponding to the target object through the identification information and uploading the quality detection data to a target block chain in an encrypted manner;
the authentication tag generation module is used for generating an authentication tag according to the quality detection data and the identification information in the target block chain;
and the authentication tag association module is used for associating the authentication tag with the target object so that the target object can perform quality authentication on the target object through the authentication tag.
9. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the method of any one of claims 1 to 7.
10. An electronic device, comprising:
a processor; and
a memory for storing executable instructions of the processor;
wherein the processor is configured to perform the method of any of claims 1-7 via execution of the executable instructions.
CN201910888873.3A 2019-09-19 2019-09-19 Article quality authentication method and device, storage medium and electronic equipment Pending CN110599206A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910888873.3A CN110599206A (en) 2019-09-19 2019-09-19 Article quality authentication method and device, storage medium and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910888873.3A CN110599206A (en) 2019-09-19 2019-09-19 Article quality authentication method and device, storage medium and electronic equipment

Publications (1)

Publication Number Publication Date
CN110599206A true CN110599206A (en) 2019-12-20

Family

ID=68861338

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910888873.3A Pending CN110599206A (en) 2019-09-19 2019-09-19 Article quality authentication method and device, storage medium and electronic equipment

Country Status (1)

Country Link
CN (1) CN110599206A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113298357A (en) * 2021-04-29 2021-08-24 福建宏泰智能工业互联网有限公司 Quality data processing method, device and system

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105608588A (en) * 2016-01-04 2016-05-25 布比(北京)网络技术有限公司 Tracing record processing method and apparatus
CN109284333A (en) * 2018-08-31 2019-01-29 中国信息通信研究院 Industrial chain data maintaining method and platform based on block chain
CN109308621A (en) * 2018-05-27 2019-02-05 成都零光量子科技有限公司 A kind of safe and efficient product false proof and recognition methods
CN109685531A (en) * 2018-12-28 2019-04-26 浙江省公众信息产业有限公司 Product quality certification method and system based on block chain technology
CN110097376A (en) * 2019-04-12 2019-08-06 阿里巴巴集团控股有限公司 Commodity source tracing method, device, equipment and storage medium

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105608588A (en) * 2016-01-04 2016-05-25 布比(北京)网络技术有限公司 Tracing record processing method and apparatus
CN109308621A (en) * 2018-05-27 2019-02-05 成都零光量子科技有限公司 A kind of safe and efficient product false proof and recognition methods
CN109284333A (en) * 2018-08-31 2019-01-29 中国信息通信研究院 Industrial chain data maintaining method and platform based on block chain
CN109685531A (en) * 2018-12-28 2019-04-26 浙江省公众信息产业有限公司 Product quality certification method and system based on block chain technology
CN110097376A (en) * 2019-04-12 2019-08-06 阿里巴巴集团控股有限公司 Commodity source tracing method, device, equipment and storage medium

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113298357A (en) * 2021-04-29 2021-08-24 福建宏泰智能工业互联网有限公司 Quality data processing method, device and system

Similar Documents

Publication Publication Date Title
US11736482B2 (en) Systems and methods for online third-party authentication of credentials
CN110519297B (en) Data processing method and device based on block chain private key
CN110349056A (en) Transaction processing system and method based on block chain
CN111989893A (en) Chain of proof and decomposition
CN110766406A (en) Resource transfer method, resource transfer device, storage medium, and electronic apparatus
CN110599137A (en) Electronic bill data processing method and device and computer equipment
CN111429162A (en) Energized block chain agricultural product quality credible traceability system based on nondestructive detection technology
US20200213302A1 (en) Providing verified claims of user identity
CN111488995B (en) Method, device and system for evaluating joint training model
CN111738893B (en) Identity authentication method, device, equipment and medium based on blockchain
US20220086131A1 (en) Multi-factor authentication for non-internet applications
CN111008852A (en) Artwork anti-counterfeiting identification method, server, terminal and storage medium
CN114500093A (en) Safe interaction method and system for message information
CN113961956A (en) Method, device, equipment and medium for generating and applying tagged network information service
CN109034794A (en) Supply chain dynamic management approach, electronic equipment, storage medium and system
CN112132576B (en) Payment information processing method based on block chain communication and block chain information platform
CN110599206A (en) Article quality authentication method and device, storage medium and electronic equipment
CN111429311A (en) Intellectual property trading sharing system and method based on block chain
CN103379105A (en) Access method and system for enterprise information system in application platform
CN110782265A (en) Information processing method, device, system and computer readable storage medium
CN110689356A (en) Method for recording commodity circulation process by using nested digital twin
CN116071148A (en) Loan qualification auditing and managing system
CN109660357A (en) Digital asset register method, verification method, device, equipment and storage medium
CN114240399A (en) Government affair data processing method and system based on block chain platform
CN113919953A (en) Method, device, equipment and storage medium for realizing cross-chain generation of intelligent contract

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination