CN110599206A - Article quality authentication method and device, storage medium and electronic equipment - Google Patents
Article quality authentication method and device, storage medium and electronic equipment Download PDFInfo
- Publication number
- CN110599206A CN110599206A CN201910888873.3A CN201910888873A CN110599206A CN 110599206 A CN110599206 A CN 110599206A CN 201910888873 A CN201910888873 A CN 201910888873A CN 110599206 A CN110599206 A CN 110599206A
- Authority
- CN
- China
- Prior art keywords
- quality
- authentication
- target
- detection data
- target object
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 57
- 238000001514 detection method Methods 0.000 claims abstract description 203
- 230000008569 process Effects 0.000 claims abstract description 15
- 238000007689 inspection Methods 0.000 claims description 29
- 238000004519 manufacturing process Methods 0.000 claims description 21
- 238000004590 computer program Methods 0.000 claims description 9
- 238000000605 extraction Methods 0.000 claims description 8
- 230000003213 activating effect Effects 0.000 claims description 4
- 230000004044 response Effects 0.000 claims description 3
- 235000013305 food Nutrition 0.000 abstract description 5
- 230000036541 health Effects 0.000 abstract description 3
- 238000010586 diagram Methods 0.000 description 18
- 230000006870 function Effects 0.000 description 9
- 238000007726 management method Methods 0.000 description 8
- 230000007246 mechanism Effects 0.000 description 8
- 238000004891 communication Methods 0.000 description 7
- 238000012545 processing Methods 0.000 description 7
- 230000008901 benefit Effects 0.000 description 6
- 238000012544 monitoring process Methods 0.000 description 5
- 230000006978 adaptation Effects 0.000 description 4
- 238000004422 calculation algorithm Methods 0.000 description 4
- 238000002474 experimental method Methods 0.000 description 4
- 230000003287 optical effect Effects 0.000 description 4
- 235000013399 edible fruits Nutrition 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 3
- 235000013372 meat Nutrition 0.000 description 3
- 235000013311 vegetables Nutrition 0.000 description 3
- 230000009471 action Effects 0.000 description 2
- 238000013473 artificial intelligence Methods 0.000 description 2
- 238000012550 audit Methods 0.000 description 2
- 230000005540 biological transmission Effects 0.000 description 2
- 238000004364 calculation method Methods 0.000 description 2
- 238000013500 data storage Methods 0.000 description 2
- 239000000835 fiber Substances 0.000 description 2
- 238000011835 investigation Methods 0.000 description 2
- 238000012423 maintenance Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 230000000737 periodic effect Effects 0.000 description 2
- 230000000644 propagated effect Effects 0.000 description 2
- 239000004065 semiconductor Substances 0.000 description 2
- 238000012795 verification Methods 0.000 description 2
- 238000004458 analytical method Methods 0.000 description 1
- 238000013475 authorization Methods 0.000 description 1
- 238000013145 classification model Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000011156 evaluation Methods 0.000 description 1
- 230000003862 health status Effects 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 238000010801 machine learning Methods 0.000 description 1
- 239000013307 optical fiber Substances 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
- 238000007639 printing Methods 0.000 description 1
- 230000003252 repetitive effect Effects 0.000 description 1
- 238000012954 risk control Methods 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/018—Certifying business or products
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Health & Medical Sciences (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Development Economics (AREA)
- Accounting & Taxation (AREA)
- Entrepreneurship & Innovation (AREA)
- Economics (AREA)
- Finance (AREA)
- Marketing (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Databases & Information Systems (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The present disclosure provides an article quality authentication method and apparatus, an electronic device, a storage medium; relates to the technical field of computers. The article quality authentication method comprises the following steps: acquiring an authentication detection request of a target article, and acquiring identification information corresponding to the target article according to the authentication detection request; acquiring quality detection data corresponding to the target object through the identification information, and encrypting and uploading the quality detection data to a target block chain; generating an authentication tag according to the quality detection data and the identification information in the target block chain; and associating the authentication tag with the target article so that the target object performs quality authentication on the target article through the authentication tag. The method and the device can enable the user to know the quality authentication process of the target object, avoid the user from eating fake and shoddy food, improve the safety of the user eating the food and ensure the physical health of the user.
Description
Technical Field
The present disclosure relates to the field of computer technologies, and in particular, to an article quality authentication method, an article quality authentication device, an electronic device, and a computer-readable storage medium.
Background
With the development of science and technology, the living standard of people is increasingly improved, and the requirements on food safety and food quality are higher and higher.
At present, most of the existing organic products (such as fruits, vegetables, meat and the like) on the market are difficult to distinguish true from false, related explanations and website links for inquiring quality certification are generally printed on organic product packages, but only product introduction can be seen, whether the quality information source of the products is reliable or real or not cannot be verified, and records of quality certification of the whole process of the commodities are lacked, so that a user is distrusted with the organic products, or counterfeit and shoddy products are purchased, the benefits of the consumer are damaged, and the consumption experience of the user is reduced.
It is to be noted that the information disclosed in the above background section is only for enhancement of understanding of the background of the present disclosure, and thus may include information that does not constitute prior art known to those of ordinary skill in the art.
Disclosure of Invention
An object of the present disclosure is to provide an article quality authentication method, an article quality authentication apparatus, an electronic device, and a computer-readable storage medium, which overcome the problems of the related art that a consumer cannot be provided with data for effective quality authentication of a product, resulting in distrust of an organic product by the user, or purchase of counterfeit and shoddy products, which damages the interests of the consumer, to a certain extent due to limitations and disadvantages of the related art.
According to a first aspect of the present disclosure, there is provided an article quality authentication method comprising:
acquiring an authentication detection request of a target article, and acquiring identification information corresponding to the target article according to the authentication detection request;
acquiring quality detection data corresponding to the target object through the identification information, and encrypting and uploading the quality detection data to a target block chain;
generating an authentication tag according to the quality detection data and the identification information in the target block chain;
and associating the authentication tag with the target article so that the target object performs quality authentication on the target article through the authentication tag.
In an exemplary embodiment of the present disclosure, after associating the authentication tag with the target item, the method further includes:
responding to the target object to activate the authentication tag associated with the target article, and acquiring quality detection data corresponding to the authentication tag from the target block chain;
presenting the quality detection data to the target object; wherein the quality inspection data comprises one or more of a quality certification application, an article composition inspection report, and a production quality inspection report.
In an exemplary embodiment of the present disclosure, the quality detection data further comprises a digital notarization certificate, and the presenting the quality detection data to the target object comprises:
presenting the quality detection data and the digital notarization certificate to the target object so that the target object determines the authenticity of the quality detection data through the digital notarization certificate.
In an exemplary embodiment of the present disclosure, the method further comprises:
periodically updating the quality detection data, and encrypting and uploading the updated quality detection data to the target block chain; and
and periodically updating the authentication label corresponding to the quality detection data.
In an exemplary embodiment of the present disclosure, acquiring an authentication detection request of a target item, and acquiring identification information corresponding to the target item according to the authentication detection request includes:
when an authentication detection request uploaded by a target object is monitored, acquiring a quality authentication application corresponding to the target object;
and determining the identification information corresponding to the target object from the quality certification application through a pre-trained identification information extraction model.
In an exemplary embodiment of the present disclosure, the authentication tag includes decryption information, and the acquiring, from the target blockchain, quality detection data corresponding to the authentication tag in response to the target object activating the authentication tag associated with the target item includes:
responding to the target object to activate the authentication tag associated with the target object, and acquiring decryption information and the identification information in the authentication tag;
and connecting the target block chain through the decryption information, and acquiring quality detection data corresponding to the authentication tag from the target block chain according to the identification information.
In an exemplary embodiment of the present disclosure, acquiring, by the identification information, quality detection data corresponding to the target item, and uploading the quality detection data to a target block chain in an encrypted manner further includes:
classifying the target object according to the identification information, and determining a classification result of the target object;
and encrypting and uploading the classified quality detection data of the target object to a target block chain according to the classification result.
According to a second aspect of the present disclosure, there is provided an article quality authentication apparatus comprising:
the identification information acquisition module is used for acquiring an authentication detection request of a target article and acquiring identification information corresponding to the target article according to the authentication detection request;
the quality detection data uploading module is used for acquiring quality detection data corresponding to the target object through the identification information and uploading the quality detection data to a target block chain in an encrypted manner;
the authentication tag generation module is used for generating an authentication tag according to the quality detection data and the identification information in the target block chain;
and the authentication tag association module is used for associating the authentication tag with the target object so that the target object can perform quality authentication on the target object through the authentication tag.
In an exemplary embodiment of the present disclosure, the article quality authentication apparatus further includes:
the quality detection data acquisition unit is used for responding to the target object to activate the authentication tag associated with the target object and acquiring quality detection data corresponding to the authentication tag from the target block chain;
a quality detection data display unit for presenting the quality detection data to the target object; wherein the quality inspection data comprises one or more of a quality certification application, an article composition inspection report, and a production quality inspection report.
In an exemplary embodiment of the present disclosure, the quality detection data further includes a digital notarization certificate, the quality detection data display unit is further configured to:
presenting the quality detection data and the digital notarization certificate to the target object so that the target object determines the authenticity of the quality detection data through the digital notarization certificate.
In an exemplary embodiment of the present disclosure, the article quality authentication apparatus further includes:
the quality detection data updating unit is used for periodically updating the quality detection data and encrypting and uploading the updated quality detection data to the target block chain; and
and the authentication label updating unit is used for periodically updating the authentication label corresponding to the quality detection data.
In an exemplary embodiment of the present disclosure, the identification information acquisition module is configured to:
when an authentication detection request uploaded by a target object is monitored, acquiring a quality authentication application corresponding to the target object;
and determining the identification information corresponding to the target object from the quality certification application through a pre-trained identification information extraction model.
In an exemplary embodiment of the present disclosure, the quality detection data acquisition unit is configured to:
responding to the target object to activate the authentication tag associated with the target object, and acquiring decryption information and the identification information in the authentication tag;
and connecting the target block chain through the decryption information, and acquiring quality detection data corresponding to the authentication tag from the target block chain according to the identification information.
In an exemplary embodiment of the present disclosure, the quality detection data uploading module is configured to:
classifying the target object according to the identification information, and determining a classification result of the target object;
and encrypting and uploading the classified quality detection data of the target object to a target block chain according to the classification result.
According to a third aspect of the present disclosure, there is provided an electronic device comprising: a processor; and a memory for storing executable instructions of the processor; wherein the processor is configured to perform the method of any one of the above via execution of the executable instructions.
According to a fourth aspect of the present disclosure, there is provided a computer readable storage medium having stored thereon a computer program which, when executed by a processor, implements the method of any one of the above.
Exemplary embodiments of the present disclosure may have some or all of the following benefits:
in the article quality authentication method provided by an example embodiment of the present disclosure, quality detection data corresponding to a target article is obtained according to identification information in an authentication detection request, and the quality detection data is uploaded to a target block chain in an encrypted manner; and generating an authentication tag according to the quality detection data and the identification information in the target block chain, and associating the authentication tag with the target article so that the target object performs quality authentication on the target article through the authentication tag. On one hand, the quality detection data corresponding to the target object is encrypted and uploaded to the target block chain, and the corresponding authentication label is generated, so that the target object can obtain the quality detection data corresponding to the target object in the target block chain through the authentication label, the operation is simple, the authenticity of the quality detection data can be ensured due to the non-tamper property of the block chain, a consumer can correctly select the object according to the quality detection data, and the benefit and the body health of the consumer are guaranteed; on the other hand, when the target object uses the authentication tag, the quality authentication is firstly required and the quality detection data is uploaded to the block chain, so that a producer of the target object can be indirectly urged to produce the high-quality target object, the quality of the target object is further improved, the safety of the target object is ensured, the benefit of a consumer is guaranteed, and the use experience of the consumer is improved.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present disclosure and together with the description, serve to explain the principles of the disclosure. It is to be understood that the drawings in the following description are merely exemplary of the disclosure, and that other drawings may be derived from those drawings by one of ordinary skill in the art without the exercise of inventive faculty.
Fig. 1 is a schematic diagram illustrating an exemplary system architecture to which an article quality authentication method and apparatus according to an embodiment of the present disclosure may be applied;
FIG. 2 illustrates a schematic structural diagram of a computer system suitable for use with the electronic device used to implement embodiments of the present disclosure;
FIG. 3 schematically shows a flow diagram of an article quality authentication method according to one embodiment of the present disclosure;
FIG. 4 schematically shows a schematic diagram of a data sharing system according to one embodiment of the present disclosure;
FIG. 5 schematically illustrates a schematic diagram of a block chain corresponding to each node in the data sharing system, according to one embodiment of the present disclosure;
FIG. 6 schematically shows a schematic diagram of chunk generation in a data sharing system according to one embodiment of the present disclosure;
FIG. 7 schematically illustrates a flow diagram of quality authentication of a target item according to one embodiment of the present disclosure;
FIG. 8 schematically illustrates a flow diagram for quality authentication of a target item by an item quality authentication method according to one embodiment of the present disclosure;
fig. 9 schematically shows a schematic block diagram of an article quality authentication apparatus according to one embodiment of the present disclosure.
Detailed Description
Example embodiments will now be described more fully with reference to the accompanying drawings. Example embodiments may, however, be embodied in many different forms and should not be construed as limited to the examples set forth herein; rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the concept of example embodiments to those skilled in the art. The described features, structures, or characteristics may be combined in any suitable manner in one or more embodiments. In the following description, numerous specific details are provided to give a thorough understanding of embodiments of the disclosure. One skilled in the relevant art will recognize, however, that the subject matter of the present disclosure can be practiced without one or more of the specific details, or with other methods, components, devices, steps, and the like. In other instances, well-known technical solutions have not been shown or described in detail to avoid obscuring aspects of the present disclosure.
Furthermore, the drawings are merely schematic illustrations of the present disclosure and are not necessarily drawn to scale. The same reference numerals in the drawings denote the same or similar parts, and thus their repetitive description will be omitted. Some of the block diagrams shown in the figures are functional entities and do not necessarily correspond to physically or logically separate entities. These functional entities may be implemented in the form of software, or in one or more hardware modules or integrated circuits, or in different networks and/or processor devices and/or microcontroller devices.
Fig. 1 is a schematic diagram illustrating a system architecture of an exemplary application environment to which an article quality authentication method and apparatus according to an embodiment of the present disclosure may be applied.
As shown in fig. 1, the system architecture 100 may include one or more of terminal devices 101, 102, 103, a network 104, and a server 105. The network 104 serves as a medium for providing communication links between the terminal devices 101, 102, 103 and the server 105. Network 104 may include various connection types, such as wired, wireless communication links, or fiber optic cables, to name a few. The terminal devices 101, 102, 103 may be various electronic devices having a display screen, including but not limited to desktop computers, portable computers, smart phones, tablet computers, and the like. It should be understood that the number of terminal devices, networks, and servers in fig. 1 is merely illustrative. There may be any number of terminal devices, networks, and servers, as desired for implementation. For example, server 105 may be a server cluster comprised of multiple servers, or the like.
The article quality authentication method provided by the embodiment of the present disclosure is generally executed by the server 105, and accordingly, an article quality authentication apparatus is generally provided in the server 105. However, it is easily understood by those skilled in the art that the method for authenticating the quality of an article provided in the embodiment of the present disclosure may also be executed by the terminal devices 101, 102, and 103, and accordingly, the apparatus for authenticating the quality of an article may also be disposed in the terminal devices 101, 102, and 103, which is not particularly limited in this exemplary embodiment.
FIG. 2 illustrates a schematic structural diagram of a computer system suitable for use in implementing the electronic device of an embodiment of the present disclosure.
It should be noted that the computer system 200 of the electronic device shown in fig. 2 is only an example, and should not bring any limitation to the functions and the scope of the application of the embodiments of the present disclosure.
As shown in fig. 2, the computer system 200 includes a Central Processing Unit (CPU)201 that can perform various appropriate actions and processes in accordance with a program stored in a Read Only Memory (ROM)202 or a program loaded from a storage section 208 into a Random Access Memory (RAM) 203. In the RAM 203, various programs and data necessary for system operation are also stored. The CPU201, ROM 202, and RAM 203 are connected to each other via a bus 204. An input/output (I/O) interface 205 is also connected to bus 204.
The following components are connected to the I/O interface 205: an input portion 206 including a keyboard, a mouse, and the like; an output section 207 including a display such as a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), and the like, and a speaker; a storage section 208 including a hard disk and the like; and a communication section 209 including a network interface card such as a LAN card, a modem, or the like. The communication section 209 performs communication processing via a network such as the internet. A drive 210 is also connected to the I/O interface 205 as needed. A removable medium 211 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is mounted on the drive 210 as necessary, so that a computer program read out therefrom is mounted into the storage section 208 as necessary.
In particular, the processes described below with reference to the flowcharts may be implemented as computer software programs, according to embodiments of the present disclosure. For example, embodiments of the present disclosure include a computer program product comprising a computer program embodied on a computer readable medium, the computer program comprising program code for performing the method illustrated in the flow chart. In such an embodiment, the computer program may be downloaded and installed from a network through the communication section 209 and/or installed from the removable medium 211. The computer program, when executed by a Central Processing Unit (CPU)201, performs various functions defined in the methods and apparatus of the present application. In some embodiments, the computer system 200 may further include an AI (artificial intelligence) processor for processing computing operations related to machine learning.
It should be noted that the computer readable media shown in the present disclosure may be computer readable signal media or computer readable storage media or any combination of the two. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples of the computer readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the present disclosure, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In contrast, in the present disclosure, a computer-readable signal medium may include a propagated data signal with computer-readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: wireless, wire, fiber optic cable, RF, etc., or any suitable combination of the foregoing.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams or flowchart illustration, and combinations of blocks in the block diagrams or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units described in the embodiments of the present disclosure may be implemented by software, or may be implemented by hardware, and the described units may also be disposed in a processor. Wherein the names of the elements do not in some way constitute a limitation on the elements themselves.
As another aspect, the present application also provides a computer-readable medium, which may be contained in the electronic device described in the above embodiments; or may exist separately without being assembled into the electronic device. The computer readable medium carries one or more programs which, when executed by an electronic device, cause the electronic device to implement the method as described in the embodiments below. For example, the electronic device may implement the various steps shown in fig. 3, and so on.
The technical solution of the embodiment of the present disclosure is explained in detail below:
the present example embodiment provides an article quality authentication method. The article quality authentication method may be applied to the server 105, and may also be applied to one or more of the terminal devices 101, 102, and 103, which is not particularly limited in this exemplary embodiment. Referring to fig. 3, the article quality authentication method may include the following steps S310 to S340:
step S310, acquiring an authentication detection request of a target article, and acquiring identification information corresponding to the target article according to the authentication detection request;
step S320, acquiring quality detection data corresponding to the target object through the identification information, and encrypting and uploading the quality detection data to a target block chain;
step S330, generating an authentication tag according to the quality detection data and the identification information in the target block chain;
step S340, performing association processing on the authentication tag and the target object, so that the target object performs quality authentication on the target object through the authentication tag.
In the method for authenticating the quality of an article provided by the present exemplary embodiment, on one hand, the quality detection data corresponding to the target article is encrypted and uploaded to the target block chain, and a corresponding authentication tag is generated, so that the target object obtains the quality detection data corresponding to the target article in the target block chain through the authentication tag, which not only is simple to operate, but also can ensure the authenticity of the quality detection data due to the non-tamper-resistance of the block chain, so that a consumer can correctly select an article according to the quality detection data, and the benefit and physical health of the consumer are ensured; on the other hand, when the target object uses the authentication tag, the quality authentication is firstly required and the quality detection data is uploaded to the block chain, so that a producer of the target object can be indirectly urged to produce the high-quality target object, the quality of the target object is further improved, the safety of the target object is ensured, the benefit of a consumer is guaranteed, and the use experience of the consumer is improved.
The above steps of the present exemplary embodiment will be described in more detail below.
In step S310, an authentication detection request of a target article is obtained, and identification information corresponding to the target article is obtained according to the authentication detection request.
In an example embodiment of the present disclosure, the target object may refer to an organic product or a food that needs to be quality-detected and authenticated, for example, the target object may be a certain brand of fruit to be quality-detected or a certain brand of meat to be quality-detected, and of course, the target object may also be a certain brand of vegetable to be quality-detected, which is not particularly limited in this example embodiment. The authentication detection request may refer to a request instruction for the applicant to apply for quality detection authentication of the target item, for example, the authentication detection request may be an application request made by the applicant at a quality authentication center specified by a country, or may be a request for filling a quality authentication application made by the applicant at a website specified by an authority, or of course, the authentication detection request may be a product quality authentication request initiated in another manner, and the present exemplary embodiment is not limited thereto. The identification information may be information corresponding to a unique identifier corresponding to the target article, for example, the identification information may be combination information of a name and a production location of the target article, or may be a unique authentication code generated when the target article performs a quality authentication application, of course, the identification information may also be other information capable of uniquely identifying the target article, which is not limited in this example embodiment.
Specifically, when an authentication detection request uploaded by a target object is monitored, a quality authentication application corresponding to the target object is obtained; and determining the identification information corresponding to the target object from the quality certification application through a pre-trained identification information extraction model. The quality certification application may refer to an application generated when the target object is subjected to quality inspection certification, and may include, as a basis for quality certification of the target object, information related to a manufacturing enterprise, basic information of the target object, or data such as a range or a product to which the quality certification is applied. The identification information extraction model may be a learning model capable of extracting the identification information of the target item from the quality certification application form, for example, the identification information extraction model may be a pre-trained classification model with a classification function, or may be a pre-trained image recognition model capable of extracting the identification information of the target item from an image of the quality certification application form, of course, the identification information extraction model may also be another learning model capable of extracting the identification information of the target item from text information or image information, which is not limited in this example embodiment. By extracting the identification information of the target article from the quality authentication application corresponding to the target article, the authentication efficiency of the target article can be effectively improved, and the accuracy of quality authentication data storage is improved.
In step S320, the quality detection data corresponding to the target object is obtained through the identification information, and the quality detection data is encrypted and uploaded to the target block chain.
In an example embodiment of the present disclosure, the quality inspection data may refer to quality inspection reports generated when quality authentication is performed on the target item by a plurality of quality inspection authorities, and the quality inspection data may include one or more of a quality authentication application, an item composition inspection report, a production quality inspection report, and a digital certificate. The quality certification application may be an application report generated when the applicant applies for quality detection certification of a target article to a national quality certification center CQC, the article component detection report may be a detection report generated after the national quality certification center CQC instructs a relevant laboratory to detect harmful components of the target article, the production quality inspection report may be an inspection report generated after the national quality certification center CQC instructs a relevant inspection and investigation group to go to a production place of the target article for field investigation, and the digital notarization certificate may be a certification report generated after the applicant or the national quality certification center CQC notarizes an integer in the quality detection certification process through a third-party notarization institution. The target block chain may refer to a created block chain for performing quality authentication on the target item, for example, the target block chain may be a common public chain or a federation chain, and of course, the target block chain may also be a private chain, which is not particularly limited in this example embodiment.
Specifically, the target block chain may refer to a novel application mode of a computer technology such as distributed data storage, point-to-point transmission, a consensus mechanism, and an encryption algorithm. A block chain (Blockchain), which is essentially a decentralized database, is a series of data blocks associated by using a cryptographic method, and each data block contains information of a batch of network transactions, so as to verify the validity (anti-counterfeiting) of the information and generate a next block. The blockchain may include a blockchain underlying platform, a platform product services layer, and an application services layer. The underlying platform of the target block chain may include processing modules such as user management, basic service, intelligent contracts, and operation monitoring. The user management module is responsible for identity information management of all blockchain participants, and comprises public and private key generation maintenance (account management), key management, user real identity and blockchain address corresponding relation maintenance (authority management) and the like, and under the authorization condition, the user management module supervises and audits the transaction condition of certain real identities and provides rule configuration (wind control audit) of risk control; the basic service module is deployed on all block chain node equipment and used for verifying the validity of the service request, recording the service request to storage after consensus on the valid request is completed, for a new service request, the basic service firstly performs interface adaptation analysis and authentication processing (interface adaptation), then encrypts service information (consensus management) through a consensus algorithm, transmits the service information to a shared account (network communication) completely and consistently after encryption, and performs recording and storage; the intelligent contract module is responsible for registering and issuing contracts, triggering the contracts and executing the contracts, developers can define contract logics through a certain programming language, issue the contract logics to a block chain (contract registration), call keys or other event triggering and executing according to the logics of contract clauses, complete the contract logics and simultaneously provide the function of upgrading and canceling the contracts; the operation monitoring module is mainly responsible for deployment, configuration modification, contract setting, cloud adaptation in the product release process and visual output of real-time states in product operation, such as: alarm, monitoring network conditions, monitoring node equipment health status, and the like.
Further, classifying the target object according to the identification information, and determining a classification result of the target object; and encrypting and uploading the classified quality detection data of the target object to a target block chain according to the classification result. The classification result may refer to different categories into which the plurality of target items are classified according to the identification information of the target items, for example, the classification result may be a fruit target item or a vegetable target item, and of course, the classification result may also be an animal meat target item, which is not particularly limited in this example. Before the quality detection data of the target object are encrypted and uploaded to the target block chain, the target object is classified through the identification information of the target object, and the quality detection data of the target object are encrypted and uploaded to the target block chain according to the classification result, so that the quality detection data of the target object of different classifications can be managed conveniently, and meanwhile, the efficiency of a consumer for inquiring the quality detection data in the target block chain is improved.
Specifically, referring to the data sharing system shown in fig. 4, the data sharing system 400 refers to a system for performing data sharing between nodes, the data sharing system may include a plurality of nodes 401, and the plurality of nodes 401 may refer to each client in the data sharing system. Each node 401 may receive input information and maintain shared data within the data sharing system based on the received input information while operating normally. In order to ensure information intercommunication in the data sharing system, information connection can exist between each node in the data sharing system, and information transmission can be carried out between the nodes through the information connection. For example, when any node in the data sharing system receives different vertical domain knowledge graphs, other nodes in the data sharing system acquire the vertical domain knowledge graph according to a consensus algorithm, and store the vertical domain knowledge graph as data in shared data, so that the data stored on all the nodes in the data sharing system are consistent.
Each node in the data sharing system has a node identifier corresponding thereto, and each node in the data sharing system may store a node identifier of another node in the data sharing system, so that the generated block is broadcast to the other node in the data sharing system according to the node identifier of the other node in the following. Each node may maintain a node identifier list as shown in the following table, and store the node name and the node identifier in the node identifier list correspondingly. The node identifier may be an IP (Internet Protocol) address and any other information that can be used to identify the node, and table 1 only illustrates the IP address as an example.
TABLE 1 node identification
Node name | Node identification |
Node 1 | 117.114.151.174 |
Node 2 | 117.116.189.145 |
… | … |
Node N | 119.123.789.258 |
Each node in the data sharing system stores one identical blockchain. The block chain is composed of a plurality of blocks, as shown in fig. 5, the block chain is composed of a plurality of blocks, the starting block includes a block header and a block main body, the block header stores an input information characteristic value, a version number, a timestamp and a difficulty value, and the block main body stores input information; the next block of the starting block takes the starting block as a parent block, the next block also comprises a block head and a block main body, the block head stores the input information characteristic value of the current block, the block head characteristic value of the parent block, the version number, the timestamp and the difficulty value, and the like, so that the block data stored in each block in the block chain is associated with the block data stored in the parent block, and the safety of the input information in the block is ensured.
When each block in the block chain is generated, referring to fig. 6, when a node where the block chain is located receives input information, the input information is verified, after the verification is completed, the input information is stored in the memory pool, and the hash tree for recording the input information is updated; and then, updating the updating time stamp to the time when the input information is received, trying different random numbers, and performing characteristic value calculation for multiple times, so that the calculated characteristic value can satisfy the following formula (1):
wherein, SHA256 is a characteristic value algorithm used for calculating a characteristic value; version is version information of the relevant block protocol in the block chain; prev _ hash is a block head characteristic value of a parent block of the current block; merkle _ root is a characteristic value of the input information; ntime is the update time of the update timestamp; nbits is the current difficulty, is a fixed value within a period of time, and is determined again after exceeding a fixed time period; x is a random number; TARGET is a feature threshold, which can be determined from nbits.
Thus, when the random number satisfying the formula (1) is obtained by calculation, the information can be correspondingly stored, and the block header and the block body are generated to obtain the current block. And then, the node where the block chain is located respectively sends the newly generated blocks to other nodes in the data sharing system where the newly generated blocks are located according to the node identifications of the other nodes in the data sharing system, the newly generated blocks are verified by the other nodes, and the newly generated blocks are added to the block chain stored in the newly generated blocks after the verification is completed.
In step S330, an authentication tag is generated according to the quality detection data and the identification information in the target block chain.
In an example embodiment of the present disclosure, the authentication tag may refer to a query connection entry provided on the target item and facilitating a consumer to query quality detection data of the target item, for example, an expression form of the authentication tag may be an electronic tag, or may be any one of a two-dimensional code, a three-dimensional code, or a barcode, of course, the authentication tag may also be another expression form of the query connection entry of the quality detection data, which is not particularly limited in this example embodiment. The quality detection data and the identification information in the target block chain are generated into the authentication tag, so that a consumer can quickly inquire the quality detection data of the target object according to the authentication tag, the operation of inquiring the quality detection data is simplified, and the use experience of the consumer is improved.
In step S340, the authentication tag and the target article are associated, so that the target object performs quality authentication on the target article through the authentication tag.
In an example embodiment of the present disclosure, the association process may refer to a process of binding the authentication tag and the target item, for example, the association process may be printing a graphic corresponding to the authentication tag on a package of the target item, and of course, the association process may also be another process of binding the authentication tag and the target item, which is not limited to this example embodiment. The target object may be an object that needs to obtain quality inspection data of the target item, for example, the target object may be a consumer who purchases the target item, or may be a person or a mechanism that inspects whether the quality security of the target item is qualified, which is not particularly limited in this exemplary embodiment.
Specifically, an authentication tag associated with a target article is activated in response to a target object, and quality detection data corresponding to the authentication tag is acquired from a target block chain; the quality detection data is presented to the target object. The activating of the authentication tag associated with the target item may refer to an operation that the target object opens the query entry corresponding to the authentication tag through the related terminal device, for example, when it is assumed that the authentication tag may be a two-dimensional code graph, the target object may open the query entry corresponding to the authentication tag through a scanning function provided on the smart phone, which is only an exemplary illustration here, and this example embodiment is not limited thereto. Presenting the quality detection data to the target object may refer to an operation of displaying the quality detection data to the target object by activating a display interface of the terminal device of the query entry corresponding to the authentication tag.
Further, the quality detection data and the digital notarization certificate are presented to the target object, so that the target object determines the authenticity of the quality detection data through the digital notarization certificate. The digital notarization certificate may refer to a certification report generated after the applicant or a national quality certification center CQC notarizes an integer in the quality detection certification process by a third-party notarization authority. When the target object obtains the quality detection data of the target object through the authentication tag, the digital notarization certificate corresponding to the quality detection data is presented to the target object, the quality detection data is verified through the digital notarization certificate to determine the authenticity of the quality detection data, supervision on the quality detection data of the target object is further strengthened, a fake target object is prevented from flowing into the market or being purchased by a consumer, and consumption experience of the consumer is improved.
Further, responding to the target object to activate the authentication tag associated with the target object, and acquiring decryption information and identification information in the authentication tag; and connecting the target block chain through the decryption information, and acquiring quality detection data corresponding to the authentication tag from the target block chain according to the identification information. The authentication tag may include decryption information, where the decryption information may refer to information used for accessing the target block chain in the authentication tag, for example, the decryption information may be a private key generated by asymmetric encryption when the quality detection data is encrypted and uploaded to the target block chain, and of course, the decryption information may also be other information used for accessing the target block chain, which is not particularly limited in this example embodiment.
Optionally, periodically updating the quality detection data, and encrypting and uploading the updated quality detection data to the target block chain; and periodically updating the authentication label corresponding to the quality detection data. The periodic update may refer to that the national quality certification center CQC may periodically (for example, every year) perform spot check or re-detection on the target object to ensure validity of the quality detection data, encrypt and upload the updated quality detection data to the target block chain when the quality detection data changes, and after the quality detection data is updated, correspondingly update the certification label of the target object to ensure validity of the quality detection data acquired by the target object.
Fig. 7 schematically illustrates a flow diagram of quality authentication of a target item according to one embodiment of the present disclosure.
Referring to fig. 7, in step S701, an applicant (application enterprise) submits a quality certification application and accessories for a target item on line or a national quality certification center CQC;
step S702, a server of the national quality certification center CQC (block chain node corresponding to the national quality certification center CQC) uploads a quality certification application and accessory encryption submitted by an applicant to a target block chain;
step S703, the national quality certification center CQC provides a payment entrance, and the applicant carries out quality certification payment through the payment entrance to complete the quality certification application of the target object;
step S704, the applicant sends a detection sample of the target item to a national quality certification center CQC;
step S705, the national quality certification center CQC appoints a laboratory to detect a detection sample of a target article and generates a target article component detection report (type experiment report);
step S706, the laboratory feeds back an article component detection report (type experiment report) to a national quality certification center CQC for further quality detection certification;
step S707, the server of the laboratory (corresponding block chain node of the laboratory) encrypts and uploads the generated article component detection report (type experiment report) to the target block chain;
step S708, the national quality certification center CQC designates a detection mechanism (detection group) to go to a production place corresponding to the target object to detect the production environment and the production process so as to generate a production quality inspection report corresponding to the target object;
step S709, the server of the detection mechanism feeds back the obtained production quality inspection report to the national quality certification center CQC for further quality detection certification;
step S710, a server of the detection mechanism (a block chain node corresponding to the detection mechanism) encrypts and uploads a production quality inspection report to a target block chain;
step S711, the national quality certification center CQC evaluates the target object according to the object component detection report (type experiment report) and the production quality inspection report, and authorizes the issuance of a certification certificate after the evaluation is passed (and encrypts and uploads the certification certificate to the target block chain);
step S712, after obtaining the approval and issue certification certificate, the applicant purchases the product quality certification mark and pastes the label on the target object;
step S713, a server of the national quality certification center CQC (block chain node corresponding to the national quality certification center CQC) encrypts and uploads a purchase record of a product quality certification mark of a target article to a target block chain;
step S714, the national quality certification center CQC periodically performs spot check or supervision on the target object to generate a spot check or supervision report;
step S715, encrypting and uploading a spot check or supervision report corresponding to the target object to a target block chain by a server (block chain node corresponding to the national quality authentication center CQC) of the national quality authentication center CQC;
step S716, the two-dimensional code traceability query system generates an authentication tag of the target article according to the quality detection data in the target block chain, and then associates the authentication tag with the target article, so that the target object obtains the quality detection data of the target article in the target block chain through the authentication tag, and presents the quality detection data to the target object for quality authentication.
Fig. 8 schematically illustrates a flow diagram of quality authentication of a target item by an item quality authentication method according to one embodiment of the present disclosure.
Referring to fig. 8, in step S801, an authentication detection request corresponding to a target item newly uploaded by an applicant is obtained, where the authentication detection request may include basic information of the target item and information of a manufacturing enterprise;
step S802, generating a quality authentication application corresponding to the target article according to the data in the authentication detection request and a preset application form;
step S803, determining whether the condition for performing the quality detection of the target article is satisfied (for example, whether the quality authentication application is completely filled or whether the data in the quality authentication application conforms to the specification, etc.) according to the quality authentication application, if it is determined that the condition for performing the quality detection of the target article is satisfied, performing step S804, otherwise, performing step S805;
step S804, extracting identification information (such as an application code of the target object) of the target object in a preset mode according to the quality certification application form;
step S805, the applicant is guided to refill the authentication detection request, and the process returns to step S801;
step S806, sending the quality certification application and the identification information of the target object to each detection mechanism, so that each detection mechanism can perform quality detection on the target object according to the quality certification application;
step S807, the designated laboratory detects the target item according to the sample of the target item sent by the applicant, and generates an item component detection report corresponding to the target item;
step S808, appointing a third-party notarization institution to notarize the detection or inspection process to generate a digital notarization certificate;
step S809, appointing a monitoring organization to go to a production place or a production environment of the target object for checking, and generating a production quality check report corresponding to the target object;
step S810, acquiring a quality authentication application form, an article component detection report, a production quality inspection report and a digital notarization certificate as quality detection data of the target article according to the identification information of the target article;
step S811, classifying the quality detection data according to the identification information, and uploading the classified quality detection data to a target block chain;
step S812, determining whether the quality detection data of the target object exceeds a preset time period, that is, determining whether the quality detection data of the target object meets a condition of periodic update, if it is determined that the quality detection data needs to be updated, returning to execute steps S806 to S812, otherwise executing step S813;
step S813, generating an authentication tag according to the quality detection data on the target block chain, and associating the target item with the authentication tag, so that the target object performs quality authentication on the target item according to the authentication tag.
It should be noted that although the various steps of the methods of the present disclosure are depicted in the drawings in a particular order, this does not require or imply that these steps must be performed in this particular order, or that all of the depicted steps must be performed, to achieve desirable results. Additionally or alternatively, certain steps may be omitted, multiple steps combined into one step execution, and/or one step broken down into multiple step executions, etc.
Further, in the present exemplary embodiment, an article quality authentication apparatus is also provided. The article quality authentication device can be applied to a server or a terminal device. Referring to fig. 8, the article quality authentication apparatus 800 may include an identification information acquisition module 810, a quality detection data upload module 820, an authentication tag generation module 830, and an authentication tag association module 840. Wherein:
the identification information obtaining module 810 is configured to obtain an authentication detection request of a target article, and obtain identification information corresponding to the target article according to the authentication detection request;
the quality detection data uploading module 820 is configured to obtain quality detection data corresponding to the target object through the identification information, and encrypt and upload the quality detection data to a target block chain;
the authentication tag generation module 830 is configured to generate an authentication tag according to the quality detection data and the identification information in the target block chain;
the authentication tag association module 840 is configured to associate the authentication tag with the target item, so that the target object performs quality authentication on the target item through the authentication tag.
In an exemplary embodiment of the present disclosure, the article quality authentication apparatus 800 further includes:
the quality detection data acquisition unit is used for responding to the target object to activate the authentication tag associated with the target object and acquiring quality detection data corresponding to the authentication tag from the target block chain;
a quality detection data display unit for presenting the quality detection data to the target object; wherein the quality inspection data comprises one or more of a quality certification application, an article composition inspection report, and a production quality inspection report.
In an exemplary embodiment of the present disclosure, the quality detection data further includes a digital notarization certificate, the quality detection data display unit is further configured to:
presenting the quality detection data and the digital notarization certificate to the target object so that the target object determines the authenticity of the quality detection data through the digital notarization certificate.
In an exemplary embodiment of the present disclosure, the article quality authentication apparatus 800 further includes:
the quality detection data updating unit is used for periodically updating the quality detection data and encrypting and uploading the updated quality detection data to the target block chain; and
and the authentication label updating unit is used for periodically updating the authentication label corresponding to the quality detection data.
In an exemplary embodiment of the present disclosure, the identification information obtaining module 810 is configured to:
when an authentication detection request uploaded by a target object is monitored, acquiring a quality authentication application corresponding to the target object;
and determining the identification information corresponding to the target object from the quality certification application through a pre-trained identification information extraction model.
In an exemplary embodiment of the present disclosure, the quality detection data acquisition unit is configured to:
responding to the target object to activate the authentication tag associated with the target object, and acquiring decryption information and the identification information in the authentication tag;
and connecting the target block chain through the decryption information, and acquiring quality detection data corresponding to the authentication tag from the target block chain according to the identification information.
In an exemplary embodiment of the present disclosure, the quality detection data uploading module 820 is configured to:
classifying the target object according to the identification information, and determining a classification result of the target object;
and encrypting and uploading the classified quality detection data of the target object to a target block chain according to the classification result.
The specific details of each module or unit in the article quality authentication device have been described in detail in the corresponding article quality authentication method, and therefore are not described herein again.
It should be noted that although in the above detailed description several modules or units of the device for action execution are mentioned, such a division is not mandatory. Indeed, the features and functionality of two or more modules or units described above may be embodied in one module or unit, according to embodiments of the present disclosure. Conversely, the features and functions of one module or unit described above may be further divided into embodiments by a plurality of modules or units.
Other embodiments of the disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the disclosure disclosed herein. This application is intended to cover any variations, uses, or adaptations of the disclosure following, in general, the principles of the disclosure and including such departures from the present disclosure as come within known or customary practice within the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the disclosure being indicated by the following claims.
It will be understood that the present disclosure is not limited to the precise arrangements described above and shown in the drawings and that various modifications and changes may be made without departing from the scope thereof. The scope of the present disclosure is limited only by the appended claims.
Claims (10)
1. An article quality authentication method, comprising:
acquiring an authentication detection request of a target article, and acquiring identification information corresponding to the target article according to the authentication detection request;
acquiring quality detection data corresponding to the target object through the identification information, and encrypting and uploading the quality detection data to a target block chain;
generating an authentication tag according to the quality detection data and the identification information in the target block chain;
and associating the authentication tag with the target article so that the target object performs quality authentication on the target article through the authentication tag.
2. The item quality authentication method according to claim 1, wherein after the associating process of the authentication tag with the target item, the method further comprises:
responding to the target object to activate the authentication tag associated with the target article, and acquiring quality detection data corresponding to the authentication tag from the target block chain;
presenting the quality detection data to the target object; wherein the quality inspection data comprises one or more of a quality certification application, an article composition inspection report, and a production quality inspection report.
3. The article quality authentication method of claim 2, wherein the quality detection data further comprises a digital notary certificate, said presenting the quality detection data to the target object comprising:
presenting the quality detection data and the digital notarization certificate to the target object so that the target object determines the authenticity of the quality detection data through the digital notarization certificate.
4. The article quality authentication method of claim 1, further comprising:
periodically updating the quality detection data, and encrypting and uploading the updated quality detection data to the target block chain; and
and periodically updating the authentication label corresponding to the quality detection data.
5. The article quality authentication method according to claim 1, wherein acquiring an authentication detection request of a target article, and acquiring identification information corresponding to the target article according to the authentication detection request comprises:
when an authentication detection request uploaded by a target object is monitored, acquiring a quality authentication application corresponding to the target object;
and determining the identification information corresponding to the target object from the quality certification application through a pre-trained identification information extraction model.
6. The article quality authentication method according to claim 2, wherein the authentication tag comprises decryption information, and the acquiring, from the target blockchain, the quality detection data corresponding to the authentication tag in response to the target object activating the authentication tag associated with the target article comprises:
responding to the target object to activate the authentication tag associated with the target object, and acquiring decryption information and the identification information in the authentication tag;
and connecting the target block chain through the decryption information, and acquiring quality detection data corresponding to the authentication tag from the target block chain according to the identification information.
7. The method for authenticating the quality of the object according to claim 1, wherein the obtaining the quality detection data corresponding to the object through the identification information and the encrypting and uploading the quality detection data to the object block chain further comprises:
classifying the target object according to the identification information, and determining a classification result of the target object;
and encrypting and uploading the classified quality detection data of the target object to a target block chain according to the classification result.
8. An article quality authentication apparatus, comprising:
the identification information acquisition module is used for acquiring an authentication detection request of a target article and acquiring identification information corresponding to the target article according to the authentication detection request;
the quality detection data uploading module is used for acquiring quality detection data corresponding to the target object through the identification information and uploading the quality detection data to a target block chain in an encrypted manner;
the authentication tag generation module is used for generating an authentication tag according to the quality detection data and the identification information in the target block chain;
and the authentication tag association module is used for associating the authentication tag with the target object so that the target object can perform quality authentication on the target object through the authentication tag.
9. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the method of any one of claims 1 to 7.
10. An electronic device, comprising:
a processor; and
a memory for storing executable instructions of the processor;
wherein the processor is configured to perform the method of any of claims 1-7 via execution of the executable instructions.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910888873.3A CN110599206A (en) | 2019-09-19 | 2019-09-19 | Article quality authentication method and device, storage medium and electronic equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910888873.3A CN110599206A (en) | 2019-09-19 | 2019-09-19 | Article quality authentication method and device, storage medium and electronic equipment |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110599206A true CN110599206A (en) | 2019-12-20 |
Family
ID=68861338
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910888873.3A Pending CN110599206A (en) | 2019-09-19 | 2019-09-19 | Article quality authentication method and device, storage medium and electronic equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110599206A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113298357A (en) * | 2021-04-29 | 2021-08-24 | 福建宏泰智能工业互联网有限公司 | Quality data processing method, device and system |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105608588A (en) * | 2016-01-04 | 2016-05-25 | 布比(北京)网络技术有限公司 | Tracing record processing method and apparatus |
CN109284333A (en) * | 2018-08-31 | 2019-01-29 | 中国信息通信研究院 | Industrial chain data maintaining method and platform based on block chain |
CN109308621A (en) * | 2018-05-27 | 2019-02-05 | 成都零光量子科技有限公司 | A kind of safe and efficient product false proof and recognition methods |
CN109685531A (en) * | 2018-12-28 | 2019-04-26 | 浙江省公众信息产业有限公司 | Product quality certification method and system based on block chain technology |
CN110097376A (en) * | 2019-04-12 | 2019-08-06 | 阿里巴巴集团控股有限公司 | Commodity source tracing method, device, equipment and storage medium |
-
2019
- 2019-09-19 CN CN201910888873.3A patent/CN110599206A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105608588A (en) * | 2016-01-04 | 2016-05-25 | 布比(北京)网络技术有限公司 | Tracing record processing method and apparatus |
CN109308621A (en) * | 2018-05-27 | 2019-02-05 | 成都零光量子科技有限公司 | A kind of safe and efficient product false proof and recognition methods |
CN109284333A (en) * | 2018-08-31 | 2019-01-29 | 中国信息通信研究院 | Industrial chain data maintaining method and platform based on block chain |
CN109685531A (en) * | 2018-12-28 | 2019-04-26 | 浙江省公众信息产业有限公司 | Product quality certification method and system based on block chain technology |
CN110097376A (en) * | 2019-04-12 | 2019-08-06 | 阿里巴巴集团控股有限公司 | Commodity source tracing method, device, equipment and storage medium |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113298357A (en) * | 2021-04-29 | 2021-08-24 | 福建宏泰智能工业互联网有限公司 | Quality data processing method, device and system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11736482B2 (en) | Systems and methods for online third-party authentication of credentials | |
CN110519297B (en) | Data processing method and device based on block chain private key | |
CN110349056A (en) | Transaction processing system and method based on block chain | |
CN111989893A (en) | Chain of proof and decomposition | |
CN110766406A (en) | Resource transfer method, resource transfer device, storage medium, and electronic apparatus | |
CN110599137A (en) | Electronic bill data processing method and device and computer equipment | |
CN111429162A (en) | Energized block chain agricultural product quality credible traceability system based on nondestructive detection technology | |
US20200213302A1 (en) | Providing verified claims of user identity | |
CN111488995B (en) | Method, device and system for evaluating joint training model | |
CN111738893B (en) | Identity authentication method, device, equipment and medium based on blockchain | |
US20220086131A1 (en) | Multi-factor authentication for non-internet applications | |
CN111008852A (en) | Artwork anti-counterfeiting identification method, server, terminal and storage medium | |
CN114500093A (en) | Safe interaction method and system for message information | |
CN113961956A (en) | Method, device, equipment and medium for generating and applying tagged network information service | |
CN109034794A (en) | Supply chain dynamic management approach, electronic equipment, storage medium and system | |
CN112132576B (en) | Payment information processing method based on block chain communication and block chain information platform | |
CN110599206A (en) | Article quality authentication method and device, storage medium and electronic equipment | |
CN111429311A (en) | Intellectual property trading sharing system and method based on block chain | |
CN103379105A (en) | Access method and system for enterprise information system in application platform | |
CN110782265A (en) | Information processing method, device, system and computer readable storage medium | |
CN110689356A (en) | Method for recording commodity circulation process by using nested digital twin | |
CN116071148A (en) | Loan qualification auditing and managing system | |
CN109660357A (en) | Digital asset register method, verification method, device, equipment and storage medium | |
CN114240399A (en) | Government affair data processing method and system based on block chain platform | |
CN113919953A (en) | Method, device, equipment and storage medium for realizing cross-chain generation of intelligent contract |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |