CN113421100A - Article information recording, circulation, authentication initiation and service method, terminal and system - Google Patents

Article information recording, circulation, authentication initiation and service method, terminal and system Download PDF

Info

Publication number
CN113421100A
CN113421100A CN202010145395.XA CN202010145395A CN113421100A CN 113421100 A CN113421100 A CN 113421100A CN 202010145395 A CN202010145395 A CN 202010145395A CN 113421100 A CN113421100 A CN 113421100A
Authority
CN
China
Prior art keywords
image
article
user
information
storage system
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010145395.XA
Other languages
Chinese (zh)
Inventor
唐平中
孙景昶
陆依鸣
许娅伦
杨清竹
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Turing Deep View Nanjing Technology Co ltd
Original Assignee
Turing Deep View Nanjing Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Turing Deep View Nanjing Technology Co ltd filed Critical Turing Deep View Nanjing Technology Co ltd
Priority to CN202010145395.XA priority Critical patent/CN113421100A/en
Publication of CN113421100A publication Critical patent/CN113421100A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Abstract

According to the method, the terminal and the system for recording, circulating, identifying, initiating and serving the article information, the electronic terminal of the user can store the reference image of the genuine article on the cloud, and one or more of verification information of the reference image, article information, a comparison result of the article image, circulation information of the article and the like can be stored in the credible distributed storage system, such as a block chain system, and can be provided according to a legal user request, so that the safety and reliability of identifying the article to be identified and inquiring related information can be guaranteed, a feasible path of tracing can be provided, and the problems in the prior art can be well solved.

Description

Article information recording, circulation, authentication initiation and service method, terminal and system
Technical Field
The application relates to the technical field of data processing, in particular to a method, a terminal and a system for recording, transferring and identifying and initiating and serving article information.
Background
Various luxury goods are now increasingly sold on both traditional and newsletter platforms, including both first-hand and second-hand transactions, and related transaction platforms such as panning, chunking, fish leisure, etc. Especially for expensive luxury goods, such as luxury bags, watches, jewelry, etc., consumers are more concerned about their authenticity, but at present the authenticity (production information, historical transaction information) of the goods sold cannot be completely determined, resulting in a consumer being prohibitive.
There are several luxury anti-counterfeiting technologies available:
one of them is to attach a label to an article object: for example, a printed label is adhered to the real object or a label is directly embossed, the label carries printed contents such as a two-dimensional code and the like, corresponds to a unique article number and can also be linked to a corresponding website, and a consumer can call to inquire the article number or obtain an inquiry result on the website to judge whether the article is a genuine article produced by a manufacturer; however, such labels have the disadvantage that they are easily lost, easily damaged, and reusable (e.g., torn or cut and then transferred to another object); in addition, some electronic tags with Radio Frequency Identification (RFID) circuits, smart circuits, etc. are attached to real objects, and the contents contained in the electronic tags are decrypted and read through communication to determine whether the objects are genuine, but the electronic tags need special equipment (such as an RFID reader) to read information and encrypt and decrypt, and an encryption and decryption algorithm is not commonly used by various manufacturers.
In addition, the comparison of images of genuine articles as reference for the counterfeit articles is adopted, but the two images naturally have differences in view angle, size, distance and the like, and even if the comparison is performed by an artificial intelligence model when going hot, the accuracy cannot be high in distinguishing highly counterfeit articles in the luxury article identification field.
In addition, article information of the article, such as information of a place of production, a manufacturer and the like, has reference value when a user judges whether the article is genuine, but the article information is stored in a centralized server, the security performance of the centralized server of different enterprises is different, and once the article information is cracked, the article information is also tampered; moreover, the centralized server storage has defects, such as easy tampering of data, incapability of recovering after tampering and incapability of being noticed, opaque data storage, non-uniform data access interfaces, poor expandability and the like.
In addition, generally, the circulation information of the goods cannot be recorded and safely stored, so that the buyer cannot trace the circulation process of the goods and know the authenticity of the goods accordingly.
Disclosure of Invention
In view of the above-mentioned prior related drawbacks, it is an object of the present application to provide an item information recording, transfer, authentication initiation and service method, terminal and system for solving the problem of the difficulty of authentication of items such as luxury items in the prior art.
To achieve the above and other related objects, a first aspect of the present application provides an article information recording method, including: recording the item information to a trusted distributed storage system by the identity of the registered first user; and/or storing at least one image shot at least one position of the article in an image library to be used as a reference image for feature comparison.
In certain embodiments of the first aspect of the present application, the registration process of the first user includes: and sending first identity information owned by the first user to an administrator terminal so as to register the first identity information to the trusted distributed storage system.
In certain embodiments of the first aspect of the present application, the first identity information comprises: a first public key of a first public-private key pair, or a first address generated from the first public key.
In certain embodiments of the first aspect of the present application, there are a plurality of images taken for each of said locations.
In certain embodiments of the first aspect of the present application, the plurality of images for each of said positions are obtained under different shooting conditions.
In certain embodiments of the first aspect of the present application, the plurality of images captured for each said location include image features of features in said location.
In certain embodiments of the first aspect of the present application, the image is a microscopic image.
In certain embodiments of the first aspect of the present application, the method for recording item information further includes: recording the image index ciphertext of the at least one image to the trusted distributed storage system by the identity of the first user; wherein the image index is used to index a reference image of an image library.
In certain embodiments of the first aspect of the present application, the identity of the first user is represented by an electronic signature signed by a private key of a first public-private key pair in its possession.
In certain embodiments of the first aspect of the present application, the method for recording item information includes: acquiring article circulation information which represents that the article attribution of the article circulation information is transferred from a first user to a new user; and transferring the article circulation information to the trusted distributed storage system for recording by the identity of the first user.
In certain embodiments of the first aspect of the present application, the images in the image library are encrypted.
To achieve the above and other related objects, a second aspect of the present application provides an article circulation registration method, including: acquiring article circulation information which represents that article attribution is transferred from an original user to a new user; and transferring the article circulation information to a trusted distributed storage system for recording according to the identity of the original user.
In certain embodiments of the second aspect of the present application, the identity of the original user is represented by an electronic signature completed by a current private key of a current public-private key pair in its possession.
To achieve the above and other related objects, a third aspect of the present application provides an article authentication initiation method, comprising: shooting at least one position of the article by using the identity of a second user to obtain at least one image to be compared; sending the at least one image to be compared to the outside by the identity of a second user; acquiring a comparison result of the at least one image to be compared and the at least one reference image from the outside; and the comparison result is also recorded in the trusted distributed storage system.
In certain embodiments of the third aspect of the present application, the at least one image to be compared is a microscopic image.
In certain embodiments of the third aspect of the present application, there are a plurality of images to be compared taken for each of the positions.
In some embodiments of the third aspect of the present application, the plurality of images to be compared taken for each of the positions are obtained under different shooting conditions.
In certain embodiments of the third aspect of the present application, the plurality of images to be compared for each of the locations includes image features of features in the location.
In certain embodiments of the third aspect of the present application, the at least one location is determined based on the guidance information.
In certain embodiments of the third aspect of the present application, the method for initiating authentication of an article comprises: acquiring article circulation information which represents that the article attribution is transferred from the second user to the new user; and transferring the article circulation information to the trusted distributed storage system for recording by the identity of the second user.
In certain embodiments of the third aspect of the present application, the identity of the second user is represented by an electronic signature signed by a second private key of a second public-private key pair in its possession.
To achieve the above and other related objects, a fourth aspect of the present application provides an article authentication service method including: receiving at least one image to be compared which is shot from at least one position of an article; obtaining a comparison result between the at least one image to be compared and a reference image in an image library; and sending the comparison result to the outside, and recording the comparison result to a trusted distributed storage system.
In certain embodiments of the fourth aspect of the present application, the at least one to-be-compared image and the reference image are microscopic images.
In certain embodiments of the fourth aspect of the present application, the item authentication service method comprises: sending guide information outwards; wherein the guiding information is used for indicating the at least one position for shooting.
In some embodiments of the fourth aspect of the present application, the obtaining a comparison result between the at least one image to be compared and a reference image in an image library includes: comparing the at least one image to be compared with the reference image extracted from the image library to obtain a comparison result; or, the at least one image to be compared is provided for the characteristic comparison and the comparison result is obtained.
In certain embodiments of the fourth aspect of the present application, the item authentication service method comprises: and according to the received display request, extracting corresponding content from the data which is synchronized and stored from the trusted distributed storage system, and responding to the display request.
To achieve the above and other related objects, a fifth aspect of the present application provides a reliable data recording method applied to the trusted distributed storage system; the method comprises the following steps: recording or providing item-related information, including: one or more combinations of article information, article circulation information and comparison results of images; the comparison result of the images is a result of feature comparison between at least one image to be compared and at least one reference image taken from at least one position of the article.
In certain embodiments of the fifth aspect of the present application, the method of reliably recording data further comprises: and pre-storing the ciphertext of each first image for verifying the first image to be verified.
In certain embodiments of the fifth aspect of the present application, the method of reliably recording data further comprises: verifying whether the authority of the request initiator recording or providing the article related information conforms to the request of the request initiator; and responding the request according to the result obtained by the verification.
In certain embodiments of the fifth aspect of the present application, the trusted distributed storage system comprises: a blockchain system.
In certain embodiments of the fifth aspect of the present application, the blockchain system comprises: a public or federation chain of intelligent contracts is supported.
To achieve the above and other related objects, a sixth aspect of the present application provides an electronic terminal comprising: an image pickup device for picking up an image; communication means for communicating with the outside; a storage device for storing at least one program; and the processing device is in communication connection with the camera device, the communication device and the storage device and is used for calling the at least one program so as to execute the article information recording method according to any one of the first aspect.
To achieve the above and other related objects, a seventh aspect of the present application provides an electronic terminal comprising: an image pickup device for picking up an image; communication means for communicating with the outside; a storage device for storing at least one program; and the processing device is in communication connection with the camera device, the communication device and the storage device and is used for calling the at least one program to execute the article authentication initiating method according to any one of the third aspects.
In certain embodiments of the seventh aspect of the present application, the imaging device comprises: a microscopic camera, or a camera equipped with a microscopic lens.
To achieve the above and other related objects, an eighth aspect of the present application provides an electronic terminal comprising: communication means for communicating with the outside; a storage device for storing at least one program; and the processing device is in communication connection with the communication device and the storage device and is used for calling the at least one program so as to execute the article circulation registration method according to the second aspect.
To achieve the above and other related objects, a ninth aspect of the present application provides a service terminal comprising: communication means for communicating with the outside; a storage device for storing at least one program; the processing device is in communication connection with the communication device and the storage device, and is used for calling the at least one program to execute the article authentication service method according to any one of the fourth aspects.
To achieve the above and other related objects, a tenth aspect of the present application provides the trusted distributed storage system, comprising: the trusted distributed storage system is used for recording or providing information related to articles, and comprises: one or more combinations of article information, article circulation information and comparison results of images; the comparison result of the images is a result of feature comparison between at least one image to be compared and at least one reference image taken from at least one position of the article.
In some embodiments of the tenth aspect of the present application, the trusted distributed storage system is further configured to pre-store a ciphertext of each reference image for use in verifying the reference image to be verified.
In certain embodiments of the tenth aspect of the present application, the trusted distributed storage system comprises: and the authority verification module is used for verifying whether the authority of the request initiator recording or providing the article related information conforms to the request of the request initiator and responding to the request according to the result obtained by verification.
In certain embodiments of the tenth aspect of the present application, the trusted distributed storage system comprises: a blockchain system.
In certain embodiments of the tenth aspect of the present application, the blockchain system comprises: a public or federation chain of intelligent contracts is supported.
To achieve the above and other related objects, an eleventh aspect of the present application provides an article authentication system comprising: at least a first electronic terminal, implemented by an electronic terminal according to the seventh aspect;
at least one second electronic terminal, implemented by an electronic terminal as described in the eighth aspect;
at least one service terminal according to the ninth aspect, capable of communicating with the at least one first electronic terminal and the second electronic terminal; wherein the first electronic terminal, the second electronic terminal and the service terminal can communicate with the trusted distributed storage system as described in the tenth aspect; and at least the first electronic terminal and the service terminal can access the image library.
To achieve the above and other related objects, a twelfth aspect of the present application is a computer storage medium storing at least one computer program, the at least one computer program being executed to perform the article information recording method according to any one of the first aspect; or, executing the article circulation registration method according to any one of the second aspect; or, performing the item authentication initiation method according to any of the third aspects; or, performing the item authentication service method of any one of the fourth aspects; alternatively, the data reliable recording method according to any one of the fifth aspects is performed.
As described above, according to the method, the terminal and the system for recording, transferring, initiating and serving the article information, an electronic terminal of a user may store a reference image of a genuine article on the cloud, and one or more of verification information of the reference image, article information, a comparison result of the article image, circulation information of the article, and the like may be stored in the trusted distributed storage system, such as a block chain system, and may be provided according to a legal user request, thereby ensuring the security and reliability of authenticating the article to be authenticated and querying related information, and also providing a feasible path for tracing, thereby well solving the problems in the prior art.
Drawings
Fig. 1 is a schematic diagram of an application scenario in an embodiment of the present application.
Fig. 2 is a schematic flow chart illustrating an article information recording method according to an embodiment of the present application.
Fig. 3 is a flowchart illustrating a registration process of a first user identity according to an embodiment of the present application.
Fig. 4 is a flowchart illustrating an article circulation registration method according to an embodiment of the present application.
Fig. 5 is a flowchart illustrating an article authentication initiation method according to an embodiment of the present application.
Fig. 6 is a flowchart illustrating a method for authenticating an article according to an embodiment of the present application.
Fig. 7 is a flowchart illustrating a method for reliably recording data according to an embodiment of the present application.
FIG. 8 illustrates a trusted registration process for a first user in an embodiment.
Fig. 9 illustrates the process of reliably recording item information in one embodiment.
FIG. 10 illustrates the process of registering reference images for a first user in one embodiment.
FIG. 11 illustrates a process for a user to register item flow information in one embodiment.
FIG. 12 illustrates the process of image matching in authenticating an article in one embodiment.
FIG. 13 is a diagram illustrating a process for a user terminal requesting presentation information from a service terminal in an embodiment.
Fig. 14 is a schematic structural diagram of an electronic terminal in an embodiment of the present application.
Detailed Description
The following description of the embodiments of the present application is provided for illustrative purposes, and other advantages and capabilities of the present application will become apparent to those skilled in the art from the present disclosure.
Although the terms first, second, etc. may be used herein to describe various elements in some instances, these elements should not be limited by these terms. These terms are only used to distinguish one element from another. For example, a first element could be termed a second element, and, similarly, a second element could be termed a first element, without departing from the scope of the various described embodiments. Both the first and second elements are described as one element, but they are not the same element unless the context clearly dictates otherwise.
Also, as used herein, the singular forms "a", "an" and "the" are intended to include the plural forms as well, unless the context indicates otherwise. It will be further understood that the terms "comprises," "comprising," "includes" and/or "including," when used in this specification, specify the presence of stated features, steps, operations, elements, components, items, species, and/or groups, but do not preclude the presence, or addition of one or more other features, steps, operations, elements, components, species, and/or groups thereof. The terms "or" and/or "as used herein are to be construed as inclusive or meaning any one or any combination. Thus, "A, B or C" or "A, B and/or C" means "any of the following: a; b; c; a and B; a and C; b and C; A. b and C ". An exception to this definition will occur only when a combination of elements, functions, steps or operations are inherently mutually exclusive in some way.
As mentioned earlier, luxury needs are becoming more pronounced as the purchasing power of consumers increases. Today, the development of e-commerce platforms is fast, and the online traffic is not negligible. Luxury goods are expensive, unlike other goods, so there is a second-hand channel where lawless persons can venture themselves to make a fake to gain profit, especially luxury goods, and is more dependent on luxury authentication. The traditional authentication method, i.e. carrying luxury goods to luxury goods counter for authentication, is reliable but very troublesome, and the authenticator needs to reserve a large amount of knowledge about related goods and to be familiar with the materials, the working process, the subject characteristics and the like used by the goods, so that the requirement of the user who purchases high-end goods on the accuracy, the timeliness and the like of the goods authentication by adopting the manual authentication method cannot be met.
Electronic anti-counterfeiting means adopted by the prior luxury goods have various defects such as poor accuracy and reliability and the like as listed in the background technology.
In view of the above, the present application provides a method, a terminal and a system for recording, transferring, authenticating, initiating and serving article information, so as to solve the above problems. It is to be noted that the solution of the present application can be applied not only to the authentication of luxury items, but also to the authentication of various other items, such as art, books, and even contracts, and not to the luxury item as a limitation.
The luxury items mentioned above include, but are not limited to, luxury bag, luxury watch, luxury jewelry, clothing, etc., and are not listed here.
Fig. 1 is a schematic diagram showing an application scenario in an embodiment of the present application.
In this embodiment, a trusted distributed storage system 101, a service terminal 102, a user terminal 103, and an image library 104 are shown.
The trusted distributed storage system 101 can securely store data in a distributed manner, "distributed" refers to decentralized, for example, data storage is performed through a blockchain system of "distributed accounting", and each transaction is recorded by each device on the blockchain, so that the transaction is considered to be valid in the case that a certain number of devices are exceeded to agree on one transaction record, and the transaction is related to data, which ensures that the data is difficult to be tampered and very reliable.
Alternatively, the blockchain system may be a public or federated chain implementation that supports intelligent contracts. Wherein, as the blockchain develops, the intelligent contracts begin to be applied in the blockchain. The intelligent contract is a computer transaction protocol for executing contract terms, and the intelligent contracts do not need to trust each other because the intelligent contract is not only defined by codes, but also is enforced by the codes, is completely automatic and cannot intervene; since the intelligent contracts are deployed on the blockchain, the contract contents are naturally publicly transparent and cannot be tampered. The intelligent contract well avoids divergence through the computing language, disputes are hardly caused, and the cost for achieving consensus is low. On the intelligent contract, the arbitration result comes out, and the execution is immediately effective, so that the intelligent contract has the advantages of economy and high efficiency.
The public chain is also called a 'public chain', and the public chain refers to a block chain which can be read by anyone all over the world, can send a transaction, can obtain effective confirmation of the transaction and can also participate in the consensus process. The blockchains used in some industries and organizations are called "alliance chains" or "industry chains". In some examples, other types of blockchains may be used, not limited to the current mainstream chains, and in some embodiments, the blockchain system used may interface across chains, not limited to a single blockchain.
It should be noted that, although the above example is described with respect to the trusted distributed storage system 101 being implemented by a block chain system, in practical cases, other reliable distributed storage may be substituted, and the above is not limited.
The user terminal 103 has communication capabilities and may communicate with the outside, e.g. with the service terminal 102, with the trusted distributed storage system 101, with the image repository 104, etc. The user terminal 103 is, for example, a portable electronic device or a wearable electronic device including, but not limited to, a desktop computer, a smart phone, a handheld computer, a tablet computer, a smart watch, smart glasses, a media player, a Personal Digital Assistant (PDA), and the like. The user terminal 103 may be connected to a communication network by wire or wirelessly to be able to communicate with the outside. Wherein the communications network comprises some combination of a Local Area Network (LAN) or a Wide Area Network (WAN) in communication with the internet, using standard communications techniques and/or protocols. Portions of any of these networks may be wired or wireless using associated technologies (e.g., ethernet, 802.11802.16, Integrated Services Digital Network (ISDN), Digital Subscriber Line (DSL)) and protocols (e.g., TCP/IP, HTTP, SMTP, and FTP).
The user terminal 103 has installed therein a computer software program, such as various applications or a system APP; various data processing, communication, and other functions are implemented by running a computer software program. For example, the user terminal 103 runs a program to log in a pre-registered account name (representing information of an identity) and access the trusted distributed storage system 101 with the identity, and the trusted distributed storage system 101 provides a corresponding data service after authenticating the identity.
In the context of the trading of an item (e.g., a luxury item) of the present application, the identity types of the users may be varied, e.g., a first user, a second user, wherein the first user may be a professional user with authentication capabilities, e.g., a staff associated with a luxury brand manufacturer, an authenticated professional authenticator, etc.; the second user may be a common consumer, a second-hand seller of merchandise, or not, with or without luxury qualification capability.
In some embodiments, users with different identity types may install clients corresponding to their identity types on their user terminals 103, for example, professional users may install "clients (professional edition)" on their user terminals 103, while ordinary consumers may install "clients (buyer edition)" on their user terminals 103, for example, and the functions possessed by clients of different editions are different; this is based on the C/S architecture, or based on the B/S architecture, the client may also be replaced by a background program installed at a far end of a website or other software platform through an entry, for example, a user accesses the far end through a browser of his user terminal 103 or accesses a remote server through, for example, a wechat applet, a pay-for-all applet, etc., logs in his user account, and utilizes the program in the background of the remote server to implement the function; of course, this is merely an example, and different user types may use the same user client or daemon, with different identities and corresponding restrictions on the software modules that can be used.
The service terminal 102 may be implemented as one or more servers that may be deployed on one or more physical servers depending on various factors such as functionality, load, etc. When distributed in a plurality of entity servers, the server may be composed of servers based on a cloud architecture. For example, a Cloud-based server includes a Public Cloud (Public Cloud) server and a Private Cloud (Private Cloud) server, wherein the Public or Private Cloud server includes Software-as-a-Service (SaaS), Platform-as-a-Service (PaaS), Infrastructure as a Service (IaaS), and Infrastructure as a Service (IaaS). The private cloud service end comprises an Ali cloud computing service platform, an Amazon (Amazon) cloud computing service platform, a Baidu cloud computing platform, a Tencent cloud computing platform and the like. The server may also be formed by a distributed or centralized cluster of servers.
In some examples, identity information corresponding to a user account is recorded in the trusted distributed storage system 101, where the identity information includes a public key in a public-private key pair of the user or an address generated according to the public key; in these embodiments, the trusted distributed storage system 101 may perform communication interaction with the accessing user terminal 103, so as to authenticate the identity of the user account and provide services with corresponding rights, such as uplink of data or reading of stored data. The data uplink is limited according to the authority corresponding to the user account so as to guarantee the legality of the user needing the data uplink, and therefore illegal users are prevented from uploading false data and being commonly identified by other users.
It is understood that the service terminal 102 may also be loaded with a service program, and log in with an administrator account name, so as to interact with the user terminal 103 and the trusted distributed storage system 101 in the administrator identity.
In some embodiments, each user account and the administrator account may hold a respective key based on security considerations; in the asymmetric encryption scheme, each user account holds its own private key pair, i.e., public and private keys, which can decrypt the ciphertext encrypted by the other party. The asymmetric encryption mode has a plurality of applications, and as a simpler example, the private key can be held by the user, and the public key is issued to the outside; when a user receives ciphertext encrypted by using the public key of the user and sent by other external users, the user can decrypt the ciphertext by using the private key of the user to obtain plaintext; or, the user encrypts (i.e., signs) a digest of a plaintext (e.g., calculates a hash value of a message) by using its private key, and then sends the message with the formed electronic signature to the outside, and other external users can use the public key of the user to unlock the electronic signature to obtain the digest and the message content, and use the same algorithm (e.g., hash) on the message content to obtain the hash value, and compare the hash value with the digest in the electronic signature to determine whether the hash value is consistent, and if so, the received message is considered to be an authentic message that has not been tampered. The two applications are commonly called 'public key encryption and private key decryption' and 'private key signature and public key signature verification'.
In practical situations, based on higher security considerations, there are also many applications, such as cutting the private key or the public key into pieces, separately storing the pieces, and performing operations such as encryption, decryption, signature verification, key update, and key transmission, using the key pieces to be directly combined to form the public key and the private key to perform the operations, or obtaining output results of the operations without obtaining the public key and the private key through Secure Multi-Party Computation (Secure Multi-Party Computation) to complete the applications, which can be applied in the scheme of the present application.
The image library 104 may be implemented based on a centralized storage system, or may be implemented based on the trusted distributed storage system 101. In some embodiments, the image library 104 may also be implemented on a blockchain system. Optionally, to enhance the security of the stored image data, the data in the image library 104 may be encrypted and decrypted by a corresponding decryption algorithm before being viewed by the user. Wherein the image data may be a picture, a video, or a combination thereof.
Specifically, the authenticity of the article may be identified by comparing image features, that is, the image taken from the article to be identified is compared with a reference image, the reference image is an image taken from a genuine article (i.e., a genuine good), and if the result of the comparison is consistent or the similarity is higher than a certain threshold, the article to be identified is considered as a genuine good. And the image library 104 is used for storing the reference image.
In some embodiments, the reference images corresponding to each article may be a set including images taken from different parts and different angles of the authentic article, particularly the part having the anti-counterfeiting feature; since in practical application scenarios the overall appearance of genuine and counterfeit articles to be authenticated is often very similar, the difficulty of authenticating from the overall appearance is high, whereas it is easier to authenticate articles by feature comparison using images such as leather labels for luxury bags, back-transparencies for watches, shoe labels for shoes, etc.
For example, for a certain brand of bags such as a backpack, a single-shoulder bag, a handbag, a cross-over bag, a travel bag and the like, the corresponding reference image may be an image of one or more of the overall appearance of the genuine bag, a leather label, a lettering locking head, a hardware rivet and a lettering locking head; for example, for a certain brand of sports shoes and casual shoes with side marks on a shoe box with a shoe mark, a shoe stretcher or an outer package thereof, the corresponding reference image can be an image of one or more of the overall appearance, the shoe mark, the shoe stretcher and the side marks of the genuine shoes; for example, a certain brand of mechanical watch, quartz watch, pocket watch, etc. with a back transmission, the corresponding reference image may be an image of one or more of the overall appearance, the back transmission of a genuine watch. Of course, without limitation, in some embodiments, the article may also be an article having writing, imprint, score, such as a bracelet, ring, contract, or the like. Among others, in some embodiments, brands for the pack include, but are not limited to, Amania (Herm's), Louis Velcro (Louis Vuitton), Amania (Giorgio Armani), Baogeli (BVLGARI), Fendi (FenDi), Paris family (BALANCIAGA), Chanel (CHANEL), Prada (PRADA), Gucci (Gucci), Chiuch (COACH), Dior (Dior), and the like; brands for footwear include, but are not limited to, Nike shoes, jodan (Air Jordan) shoes, Adidas (Adidas) shoes, and the like; brands for watches include, but are not limited to, the jadeite (Patek Philippie) table, the Jiangshiton (Vacheron Constantin) table, the Aidi (Audemars Piguet) table, the Breguet (Breguet) table, the Roger Dubois (Roger Dubuis) table, the Laolix (ROLEX) table, the OMEGA (OMEGA) table, and the like.
Other examples are not given regarding works of art, books, documents, and the like, as long as an image including a feature for authentication can be acquired as a reference image.
The format of the images in the image library 104 is the format of computer storage images, such as the format of storage of bmp, jpg, png, tiff, gif, pcx, tga, exif, fpx, svg, psd, cdr, pcd, dxf, ufo, eps, ai, raw, WMF, and the like.
In some embodiments, the reference image may be an image from, for example, a first user (i.e., a professional user) capturing and transmitting a held genuine article to the image repository 104 for storage, or the first user uploading a previously collected or captured image of the genuine article to the image repository 104 for storage.
In some embodiments, a second user, e.g., a consumer, may log in to the user account at their user terminal 103 and send out the images to be compared taken from the items to be authenticated for comparison; in some embodiments, the service terminal 102 may be configured to perform the comparison action, that is, extract the reference image from the image library 104 to compare with the image to be compared, and then send the comparison result to the outside.
In some embodiments, the trusted distributed storage system 101 may store one or more types of information about the item itself or related to authentication, to make the information trusted; such as item information, which may also be referred to as item base information, including, for example, origin, manufacturer, description of goods, code, etc., manufacturing data, such as manufacturer certification, for example, that a portion of a luxury package is from a supplier in a country, etc.; for another example, the article circulation information, such as the article sold to B via the special cabinet A, or sold to D via the second seller C, etc.; ciphertext such as a hash value or other encryption result of the reference image is stored in the trusted distributed storage system 101, and is used for verifying the reference image taken from the image library 104, so as to prevent the reference image from being tampered; such as the feature comparison result of the reference image and the image to be compared.
As shown in fig. 2, a schematic flow chart of the article information recording method in the embodiment of the present application is shown.
The item information recording method may be applied to a user terminal logged in with a user account of a first user, for example, the user terminal in the embodiment of fig. 1.
The item information recording method includes:
step S201: and recording the item information to the trusted distributed storage system by the identity of the registered first user.
In some embodiments, the first user may be a professional user, i.e. the first user may be a professional user with authentication capabilities, such as a staff member associated with a luxury brand manufacturer, an authenticated professional authenticator, etc.
In some embodiments, the first user identity is embodied by pre-registered user account information. The user account information comprises a user account name, a user account password and the like. In some cases, the user account name is unique and non-repeating, and the user account name can represent a unique user.
As shown in fig. 3, a registration process of the first user identity in the embodiment is shown: in S301, first identity information owned by the first user is sent to the administrator side; in S302, the administrator registers the first identity information to the trusted distributed storage system to implement registration. In some embodiments, the administrator terminal refers to a management program logged in by a user account name corresponding to an administrator identity, and the management program may be loaded in the user terminal of the administrator in a form of a client, or may be loaded in a remote server capable of communicating with the user terminal of the administrator.
In some embodiments, the first identity information comprises: the first public key of a first public-private key pair held by a first user, or a first address generated from the first public key. In some embodiments, the address may be, for example, a hash address.
In some examples, the administrator account name of the administrator side also has a public and private key pair, and the public and private key pair of the first user is used in the communication interaction with the trusted distributed storage system, and the public and private key pair of the first user is also used in the communication interaction between the user terminal of the first user and the administrator side, so that the secure communication between the parties is guaranteed.
For example, a first user encrypts first identity information of the first user by using a public key a1 of an administrator to form a ciphertext M, the obtained hash digest of the first identity information is encrypted by using a private key B2 of the first user to form a signature N, the signature N and the ciphertext M are sent to an administrator terminal through a user terminal, the administrator terminal decrypts M by using a private key B1 of the administrator terminal to obtain the first identity information, the obtained first identity information is obtained as a new hash digest, the N is decrypted by using a public key a2 of the first user to obtain an original hash digest, the original hash digest and the new hash digest are compared, and if the two are consistent, the first identity information is legal, and the first identity information is registered on a chain.
In some embodiments, taking the blockchain system as an example, during uplink, the blockchain system may store an upload request of an uploader (e.g., an administrator) and meta information of a file to be uploaded (e.g., a first user identity), where the information of the first user identity may be divided into different pieces of information to be uploaded to the blockchain system, the upload request may include the number of pieces of information, a description, a public key (e.g., a1) of the uploader (e.g., the administrator), an account name (e.g., an administrator account name ID) of the uploader, an ID of the information of the first user identity, and the meta information may include content of the pieces of information, the public key of the uploader (e.g., the administrator) and an account name of the uploader (e.g., the administrator account name ID); the intelligent contract of the block chain system can be compared with pre-registered information according to the uploading request so as to verify the identity of the uploader, and if the intelligent contract is identified as the administrator, the authority of the intelligent contract is judged to allow the first user to be registered.
Of course, the uplink registration method in this embodiment is only an example, and may be changed in practical applications, and those skilled in the art should understand that it is not limited to the above embodiment; for example, the user identity information is a public key or an address thereof, the information amount is small, and the user identity information may be uploaded as a whole without performing fragmentation.
The article information is feature information related to the article, such as one or more combinations of the first user's authenticity judgment result, the place of manufacture, the manufacturer, and the like. The article information of the article is stored in the trusted distributed storage system, so that the risk of tampering can be avoided.
Step S202: and storing at least one image shot at least one position of the article in an image library to be used as a reference image for feature comparison. It should be noted that, alternatively or together, steps S202 and S201 may be performed, for example, transmitting the item information of the item or transmitting the reference image to the trusted distributed storage system; or, the article information of the article and the reference image of the article are transmitted to the credible distributed storage system, and both the information are transmitted to be more beneficial to the trust and evidence obtaining of the article.
In some embodiments, to increase the accuracy of feature alignment, multiple reference images are captured corresponding to each of the positions. In a possible implementation, the plurality of images corresponding to each of the positions are obtained under different shooting conditions, the different shooting conditions including: different bright and dark light, different angles, etc. By shooting a plurality of reference images at different positions and carrying out various shooting modes of arrangement and combination with the different shooting conditions, a plurality of reference images containing more information are obtained, and high-fault-tolerance object visual feature extraction during subsequent image feature comparison is facilitated.
In some embodiments, the location may be any location on the genuine article, or may be some specific location. The specific position is, for example, a characteristic part containing an image characteristic for anti-counterfeiting purpose, such as a leather label, a lock catch, a hardware rivet, LOGO and the like of the bag; or shoe stretchers, shoe tongues, shoe labels, running lines and the like of the shoes; or, the dial, the back of the watch, etc.; or the falling money, the fingerprint, the pattern and the like of the artwork.
In some embodiments, the reference image may be a microscopic image. In a possible implementation manner, the microscopic image may be shot by a first user by using a professional microscopic camera, for example, on a special operating table, and the camera is controlled by a steering engine to scan point by point; in a simpler and more convenient implementation mode, for example, a smart phone, a tablet personal computer and the like are provided with cameras, and microscope images can be shot by correspondingly installing a microscope head and the like, so that the operation is more convenient for a user; of course, the user can also use other cameras capable of installing a microscope lens, and the invention is not limited to the foregoing.
In some embodiments, the first user records the image index ciphertext of the reference image to the trusted distributed storage system through the user terminal of the first user. In a possible implementation manner, the image index is used for indexing a reference image of an image library, and since images (such as pictures, videos and the like) are high-dimensional content, and the retrieval is very troublesome, the high-dimensional content features of the pictures are mapped into a low-dimensional space (such as a binary space corresponding to a hash index), and a low-dimensional vector is generated to represent one picture, so that the requirement of an image retrieval system on a memory space of a computer is reduced, the retrieval speed is increased, and the requirement of massive image retrieval can be better met; the image index is, for example, a hash value of the reference image, and the image index ciphertext is, for example, an encryption result, such as an obfuscation result, of the hash value; when the first user uploads the reference image to the image library, the first user uplinks the reference image to the distributed storage system by generating a hash value of the reference image and encrypting the reference image into ciphertext data.
Then, when a reference image needs to be called from the image library, an image index ciphertext may be requested from the trusted distributed storage system, and then a reference image corresponding to the ciphertext data is read from the image library, for example, a ciphertext to be compared (for example, a result obtained by obtaining a hash value and then performing obfuscation and encryption) generated in the same manner as the ciphertext data according to each reference image in the image library is compared with an original image index ciphertext extracted from the trusted distributed storage system, and if the ciphertext is consistent, the extracted reference image is considered to be trusted, so that the indexing is successful.
Furthermore, when tracing needs to be carried out later, the image index ciphertext and the parameters of the encryption mode are disclosed to an arbitration mechanism, so that the authenticity of the image can be ensured.
Of course, the hashing performed in this embodiment is only one way to generate the image index, and the encryption is not limited to obfuscation, and in other embodiments, it may be replaced by other technical means, such as one or more combinations of the hashing algorithms SHA-1, MD5, the symmetric encryption algorithms DES, 3DES, AES, the asymmetric encryption algorithms DES, 3DES, AES, and so on.
By encrypting the image index and storing the image index in the trusted distributed storage system, the storage system can avoid tampering, and the encryption means can avoid leakage of image characteristics.
In some embodiments, the first user is a predecessor owner of the item, and the transfer of the attribution of the item to a new user, i.e. for example a luxury store sells a luxury package to user a, occurs; in this case, the first user may generate (or may receive from the outside) article circulation information indicating that the first user transfers the article attribution to the new user through its user terminal, and record the article circulation information to the trusted distributed storage system with the identity of the first user. In some embodiments, the item flow information may include an address or public key of the new user; based on the consideration of the credibility, optionally, when recording to the trusted distributed storage system, the first user may first generate an electronic signature on the article circulation information through a private key thereof to indicate that the article circulation information is made in an original user identity to enhance the credibility, for example, encrypt a hash digest according to the article circulation information through the private key to generate the electronic signature, and then add the electronic signature to the article circulation information and record the article circulation information to the trusted distributed storage system so as to prevent the article circulation information from being tampered.
As shown in fig. 4, a flow chart of the article circulation registration method in the embodiment of the present application is shown.
The article circulation registration method may be applied to a user terminal, for example, in the embodiment of fig. 1, an implementer is not limited to a user terminal to which a user account of a first user or a second user is logged.
The article circulation registration method comprises the following steps:
step S401: and acquiring article circulation information which represents that the article attribution is transferred from the original user to the new user.
In this embodiment, the original user may be a first user (e.g., a professional user with authentication capability), or may be a second user (e.g., a common consumer, a second-hand seller), etc.; in some embodiments, the item flow information may include an address or public key of the new user.
Step S402: and transferring the article circulation information to a trusted distributed storage system for recording according to the identity of the original user.
Based on the consideration of the credibility, optionally, when recording to the trusted distributed storage system, the original user may generate an electronic signature on the article circulation information through its private key, so as to indicate that the article circulation information is made in the original user identity, so as to enhance the credibility, for example, encrypt the hash digest according to the article circulation information through the private key, so as to generate the electronic signature, and further add the electronic signature to the article circulation information and record the encrypted information to the trusted distributed storage system so as to prevent the electronic signature from being tampered.
As shown in fig. 5, a schematic flow chart of an article authentication initiation method in the embodiment of the present application is shown.
The item information recording method may be applied to a user terminal logged in with a user account of a second user, for example, the user terminal in the embodiment of fig. 1.
The article authentication initiating method comprises the following steps:
step S501: and shooting at least one position of the article by using the identity of the second user to obtain at least one image to be compared.
In some embodiments, to increase the accuracy of feature alignment, there may be multiple images to be aligned captured corresponding to each of the positions. In a possible implementation manner, the plurality of images to be compared corresponding to each of the positions are obtained under different shooting conditions, where the different shooting conditions include: different bright and dark light, different angles, etc. The multiple images to be compared are shot at different positions, and shooting modes of various arrangement and combination are carried out on the multiple images to be compared and the different shooting conditions, so that the multiple images to be compared containing more information are obtained, and high-fault-tolerance object visual feature extraction during subsequent image feature comparison is facilitated.
In some embodiments, the location may be any location on the article to be authenticated, or may be some specific location. The specific position is, for example, a characteristic part containing an image characteristic for anti-counterfeiting purpose, such as a leather label, a lock catch, a hardware rivet, LOGO and the like of the bag; or shoe stretchers, shoe tongues, shoe labels, running lines and the like of the shoes; or, the dial, the back of the watch, etc.; or the falling money, the fingerprint, the pattern and the like of the artwork.
In some embodiments, the images to be compared may be microscopic images. In a possible implementation manner, the microscopic image can be shot by a second user by using a professional microscopic camera, for example, on a special operating table, and the camera is controlled by a steering engine to scan and shoot point by point; in a simpler and more convenient implementation mode, for example, a smart phone, a tablet personal computer and the like are provided with cameras, and microscope images can be shot by correspondingly installing a microscope head and the like, so that the operation is more convenient for a user; of course, the user can also use other cameras capable of installing a microscope lens, and the invention is not limited to the foregoing.
In some embodiments, the provision behavior of the second user to the image to be compared may be guided, so as to accelerate the shooting speed of the second user and improve the user experience. The guiding information can include one or more of the position, sequence, quantity, shooting condition and the like of shooting corresponding to the article, and the guiding information is also related to the type of the article, such as leather labels, lock catches, hardware rivets, LOGO and the like of shooting corresponding to luxury bags in sequence; the user (e.g. the second user) may determine the image providing order on the basis of said guiding information, for example the second user performs an authentication operation through a human-machine interface provided by his user terminal, and after the user selects the item type as "luxury package", the authentication points that authenticate the "luxury package" are displayed: the method comprises the following steps of providing a leather label, a lock catch, a hardware rivet, a LOGO and the like, and prompting a user to provide guide information of images to be compared of corresponding parts one by one according to a sequence, wherein the providing refers to currently shooting to obtain the images or providing shot and stored images to be compared; as another example, after the user selects the article type as "shoe", the identification points for identifying "shoe" are displayed as: shoe stretcher, shoe tongue, shoe mark, wiring and the like, and prompts a user to provide the guide information of the images to be compared at the corresponding parts one by one according to the sequence. For example, after prompting "please take an image of a skin tag", the image taken or called by the user is taken as an image corresponding to the article to be authenticated whose authentication point is the skin tag. Alternatively, the authentication prompt may also determine the authentication point of the authentication by prompting the user to select a brand type. Here, a combination of identification points of multiple brands may be pre-stored, for example, a bag pre-storing CHANEL requires identification points such as a skin tag, a lock, a rivet, etc., and a user is sequentially prompted to provide images to be compared of corresponding parts.
In some embodiments, the guiding message may be pre-stored in the user terminal and triggered according to the selection of the user, or the guiding message may be received from the user terminal, for example, the service terminal.
Step S502: and sending the at least one image to be compared to the outside by using the identity of the second user.
In some embodiments, the second user sends the image to be compared to the service terminal through the user terminal logged in by the user account of the second user, so as to perform image feature comparison. And comparing the image to be compared with a reference image extracted from an image library by the image characteristic comparison. In some embodiments, to expedite the comparison process, the user terminal may select an item type, such as a luxury bag, a shoe, a watch, etc., when providing the image to be compared; and/or, selecting a brand as a category, such as a brand of a bag, shoe, watch, etc., and/or, selecting a model number as a category; the reference images can be classified and stored in the image library according to the types, brands, models and the like of the articles, so that the images to be compared and the reference images related to the same or similar articles can be matched conveniently and quickly, and the comparison is convenient. When a plurality of types of items, brands, models, and the like are selected for combined classification, one of the items may be used as another upper directory or one of the items may be used as another lower directory, which is not illustrated here.
Step S503: acquiring a comparison result of the at least one image to be compared and the at least one reference image from the outside; and the comparison result is also recorded in the trusted distributed storage system.
In some embodiments, the comparison result may be obtained by a service terminal, and the service terminal may store the comparison result in the trusted distributed storage system and feed the comparison result back to the user terminal of the second user. The comparison result is stored through the credible distributed storage system, so that the comparison result cannot be tampered and credible, and when the article needs to be transferred in the future, other users can inquire the comparison result from the credible distributed storage system through the service terminal or by themselves, so that the safety of transaction related to the article is effectively improved. Once the comparison result indicates that the article is counterfeit, the trusted distributed storage system can ensure that the user is that the article is counterfeit and is not tampered with.
Fig. 6 is a schematic flow chart showing a method for authenticating an article according to an embodiment of the present application.
The article authentication service method can be applied to a service terminal, such as the service terminal in the embodiment of fig. 1.
The item authentication service method includes:
step S601: at least one image to be compared is received and captured from at least one position of the article.
The image to be compared may be received from a user terminal. In some embodiments, in order to increase the accuracy of feature alignment, there may be multiple images to be aligned captured corresponding to each of the positions, and the same principle is applied to the reference image. In a possible implementation manner, a plurality of images to be compared or reference images corresponding to each of the positions are obtained under different shooting conditions, where the different shooting conditions include: different bright and dark light, different angles, etc. The multiple images to be compared or the reference images are shot at different positions, and various shooting modes of arrangement and combination are carried out on the multiple images to be compared or the reference images and the different shooting conditions, so that the multiple images to be compared or the reference images containing more information are obtained, and high-fault-tolerance object visual feature extraction during subsequent image feature comparison is facilitated.
In some embodiments, the location may be any location on the article to be authenticated, or may be some specific location. The specific position is, for example, a characteristic part containing an image characteristic for anti-counterfeiting purpose, such as a leather label, a lock catch, a hardware rivet, LOGO and the like of the bag; or shoe stretchers, shoe tongues, shoe labels, running lines and the like of the shoes; or, the dial, the back of the watch, etc.; or the falling money, the fingerprint, the pattern and the like of the artwork.
In some embodiments, the images to be compared and/or the reference image may be microscopic images. In a possible implementation manner, the microscopic image can be shot by a second user by using a professional microscopic camera, for example, on a special operating table, and the camera is controlled by a steering engine to scan and shoot point by point; in a simpler and more convenient implementation mode, for example, a smart phone, a tablet personal computer and the like are provided with cameras, and microscope images can be shot by correspondingly installing a microscope head and the like, so that the operation is more convenient for a user; of course, the user can also use other cameras capable of installing a microscope lens, and the invention is not limited to the foregoing.
Step S602: and obtaining a comparison result between the at least one image to be compared and the reference image in the image library.
In some embodiments, the obtaining manner of the comparison result may be that the service terminal performs feature comparison on the at least one image to be compared and a reference image extracted from an image library to obtain the comparison result; or, the at least one image to be compared is provided for the characteristic comparison and the comparison result is obtained.
In some embodiments, the comparison result is obtained by an image feature comparison method, which includes feature detection and matching, and the feature detection algorithm based on which the comparison is implemented may be based on, for example: SIFT (Scale-invariant feature transform) feature detection algorithm, SURF, FAST, BRIEF descriptor, ORB, FAST-12, etc., taking SIFT as an example, after feature detection is performed to obtain a keypoint descriptor, feature similarity is measured by, for example, euclidean distance, cosine distance, or other similarity measurement methods (e.g., FLANN), thereby completing the image feature comparison. It should be noted that, the above algorithms for comparing image features are all examples, and any computer image algorithm capable of performing feature comparison can be substituted, but not limited to the above.
In some embodiments, the comparison result may be a comparison result of a plurality of images about an item, for example a similarity result of 5 parts: 92.5%, 93.5%, 88.3%, 78%, 45% for user reference; of course, the determination of "true" may be given when the degree of similarity is higher than a certain threshold, and the determination of "false" may be given when the degree of similarity is lower than a certain threshold.
In some embodiments, the service terminal may send the task to an external device (such as a server, a server group, or a distributed network, which has processing capability) to complete the task, and only needs to obtain a comparison result; further optionally, the software module for comparing the image features in the service terminal may be pluggable, for example, exist as a plug-in, and perform comparison locally if the service terminal is locally provided, and send the comparison result to the outside to complete the comparison if the service terminal is not locally provided.
Step S603: and sending the comparison result to the outside, and recording the comparison result to a trusted distributed storage system.
In some embodiments, the service terminal feeds back the comparison result to the user terminal (e.g., the user account of the second user logs in); optionally, the service terminal may add a private key in its own public and private key pair to the comparison result, sign the comparison result, and transmit the signature to the outside, for example, send the signature to the user terminal, and upload the signature to a trusted distributed storage system.
In some embodiments, the image to be compared and/or the reference image are microscopic images, and specifically, in a possible implementation manner, the microscopic images may be taken by a user using a professional microscopic camera, for example, on a special console, and the camera is controlled by a steering engine to scan point by point; in a simpler and more convenient implementation mode, for example, a smart phone, a tablet personal computer and the like are provided with cameras, and microscope images can be shot by correspondingly installing a microscope head and the like, so that the operation is more convenient for a user; of course, the user can also use other cameras capable of installing a microscope lens, and the invention is not limited to the foregoing.
In some embodiments, in order to increase the shooting speed of the user on the images to be compared and improve the user experience, the service terminal sends guiding information to the user terminal to guide the user terminal to execute shooting operation. The guiding information can include one or more of the position, sequence, quantity, shooting condition and the like of shooting corresponding to the article, and the guiding information is also related to the type of the article, such as leather labels, lock catches, hardware rivets, LOGO and the like of shooting corresponding to luxury bags in sequence; the user (e.g. the second user) may determine the order of image delivery based on the guiding information, for example, the user performs an authentication operation through a human-machine interface provided by his user terminal, and after the user selects the type of item as "luxury bag", the authentication points for authenticating "luxury bag" are shown as: the method comprises the following steps of providing a leather label, a lock catch, a hardware rivet, a LOGO and the like, and prompting a user to provide guide information of images to be compared of corresponding parts one by one according to a sequence, wherein the providing refers to currently shooting to obtain the images or providing shot and stored images to be compared; as another example, after the user selects the article type as "shoe", the identification points for identifying "shoe" are displayed as: shoe stretcher, shoe tongue, shoe mark, wiring and the like, and prompts a user to provide the guide information of the images to be compared at the corresponding parts one by one according to the sequence. For example, after prompting "please take an image of a skin tag", the image taken or called by the user is taken as an image corresponding to the article to be authenticated whose authentication point is the skin tag. Alternatively, the authentication prompt may also determine the authentication point of the authentication by prompting the user to select a brand type. Here, a combination of identification points of multiple brands may be pre-stored, for example, a bag pre-storing CHANEL requires identification points such as a skin tag, a lock, a rivet, etc., and a user is sequentially prompted to provide images to be compared of corresponding parts.
In some embodiments, the service terminal may act as a proxy for a user terminal requesting presentation of data in the trusted distributed storage system. Specifically, the service terminal extracts corresponding content from the data synchronized and stored from the trusted distributed storage system according to the received display request, and responds to the display request.
Optionally, the cache area in the service terminal is periodically synchronized with the trusted distributed storage system, so as to continuously update the obtained data.
It can be understood that the data corresponding to the display request may be the article information, the image index ciphertext of the reference image, the article circulation information, the comparison result, and the like mentioned in the foregoing embodiment, the data may be displayed on the display screen of the user terminal in a text or graphic form by converting, the conversion action may be executed by the service terminal and then sent to the user terminal, or the user terminal may receive the data sent by the service terminal and then convert itself and display it on the human-computer interaction graphical interface.
Corresponding to the storage requirement of the data, the trusted distributed storage system may include, for example, an information database for storing the article information, article circulation information, comparison results, and the like; including, for example, an image index database for storing the image index ciphertext; an electronic signature database may be included for storing electronic signatures attached to received data, storing public keys of respective users, etc., and authenticating rights through a rights management module (e.g., a smart contract) to provide corresponding data reading/accessing services.
Fig. 7 is a schematic flow chart showing a reliable data recording method in the embodiment of the present application.
The data reliable recording method can be implemented in, for example, the trusted distributed storage system in the embodiment of fig. 1. As mentioned above, in some embodiments, the trusted distributed storage system may be a blockchain system, and further, may be a public chain or a federation chain implementation supporting intelligent contracts, but may also be replaced by other reliable distributed storage, and is not limited to the above.
The data reliable recording method comprises the following steps:
step S701: a record or a request for provision of information relating to the item is received.
Wherein the item-related information comprises: one or more combinations of article information, article circulation information and comparison results of images. Wherein, the article information includes the information of the producing area, the manufacturer, the authenticity, the model and the like of the article; the article circulation information is the public key or address of a new owner registered by the original owner of the article; the comparison result is the result of the feature comparison between at least one image to be compared and at least one reference image (taken from the genuine article) taken from at least one position of the article to be authenticated.
In some embodiments, the request initiator may be the aforementioned user terminal, or a service terminal, etc. which logs in the user account of the first user or the second user. The request may include an account name or identity information (e.g., a public key or address of the request originator) of the request originator, etc.
To avoid uplink of false information or to avoid providing data to illegal users, step S702 can be performed: it is authenticated whether the record or the authority of the request originator providing the information related to the item corresponds to its request.
In some embodiments, the trusted distributed storage system verifies an electronic signature of data to be recorded to the trusted distributed storage system for authentication according to a pre-stored public key of one or more users, or authenticates according to an account name or identity information of the request initiator, and determines whether the trusted distributed storage system has an authority to obtain a record or provide a request for a comparison result.
Step S703: if yes, recording or providing a comparison result;
step S704: if not, the request is rejected.
It will be appreciated that in some scenarios, the trusted distributed storage system may also store/retrieve image index ciphertext, e.g., of a reference image, upon request for indexing the reference image, and may also be used to verify a reference image extracted from an image library.
The following describes, with reference to the scenario of the embodiment of fig. 1, a specific implementation of the method flow in the above embodiment of the present application through a plurality of embodiments.
Fig. 8 shows a trusted registration process of a first user in an embodiment.
In this embodiment, a first user (professional user) sends a registration request including identity information (such as a public key and an address) of the first user to a user terminal B of an administrator through a user terminal a, the administrator attaches an electronic signature to the request through a private key, and sends the request to a trusted distributed storage system C through the user terminal B, the trusted distributed storage system C verifies the authority of the administrator according to the electronic signature, if the authority is verified to be in accordance with the verification, the identity information is recorded (such as uplink), and the registration of the professional user is completed; the execution sequence in this embodiment is shown with circled numbers in the figure.
As shown in fig. 9, a process for reliable recording of item information in one embodiment is shown.
In this embodiment, a registered first user (i.e., a professional user) attaches an electronic signature to item information through its own private key, and sends the electronic signature to the trusted distributed storage system C through the user terminal a to request recording, and the trusted distributed storage system C verifies the first user authority according to the electronic signature, and records the item information (e.g., uplink) if the verification conforms to the authority. The execution sequence in this embodiment is shown with circled numbers in the figure.
As shown in FIG. 10, a process for a first user to register a reference image in one embodiment is shown.
In this embodiment, a registered first user (i.e., a professional user) sends a reference image obtained by shooting to an image library D through a user terminal a for storage, generates an image index ciphertext of the reference image and attaches an electronic signature, sends the image index ciphertext to a trusted distributed storage system C for requesting recording, the trusted distributed storage system C verifies the first user authority according to the electronic signature, and records the image index ciphertext (e.g., uplink) if the verification conforms to the authority.
As shown in fig. 11, a process for a user to register information for article circulation in one embodiment is shown.
In this embodiment, assuming that an original user to whom an article belongs transfers the article attribution to a new user, the original user signs article circulation information of an address/public key of the new user, which represents the identity of the new user as a new owner of the article, through a private key of the original user, and sends the signature to a trusted distributed storage system C through a user terminal E of the original user to request recording; the trusted distributed storage system C verifies the electronic signature therein, and records the article transfer information (e.g., uplink) if the verification meets the authority.
FIG. 12 illustrates the image matching process for authenticating an article in one embodiment.
In this embodiment, a registered second user (i.e., a common user) user terminal F requests a service terminal G to identify an article to be identified, the service terminal G feeds back guidance information to the user terminal F to guide the user terminal F to provide an image to be compared, a user terminal E provides the image to be compared to the service terminal G, the service terminal G obtains a reference image from an image library D (an index of the reference image may be performed according to an image index ciphertext extracted from a trusted distributed storage system C), obtains the image to be compared and the reference image to compare, and generates a comparison result; further, the service terminal G signs the comparison result and then sends the signature to the trusted distributed storage system C to request for recording, the trusted distributed storage system C verifies the authority of the request, and if the verification conforms to the authority, the comparison result is recorded; optionally, the service terminal G sends the comparison result to the user terminal F.
As shown in fig. 13, a process of a user terminal requesting presentation information from a service terminal in an embodiment is shown.
In this embodiment, the user terminal a of the first user and the user terminal F of the second user request the service terminal G to read the data of the trusted distributed storage system C, the service terminal G periodically synchronizes and caches the data from the trusted distributed storage system C and stores the data in the local database, and the service terminal G searches for and provides the content corresponding to the request of A, F from the local database.
As shown in fig. 14, an electronic terminal 140 in the embodiment of the present application is shown, where the electronic terminal 140 may be used to implement a user terminal in the embodiment of fig. 1, for example, the electronic terminal 140 is the user terminal; alternatively, the electronic terminal 140 is a combination of some electronic components in the user terminal.
In this embodiment, the electronic terminal 140 includes:
and an image pickup device 141 for picking up an image. In some embodiments, the camera 141 may include a camera, which may optionally be a micro-camera or may cooperate with a micro-lens to take a photomicrograph from an article.
And a communication device 142 for communicating with the outside. In some embodiments, the communication device 142 may include: wired communication circuitry, such as a wired network card, and/or wireless communication circuitry, such as 2G-5G, WiFi, 315/433 radio frequency circuitry, etc., to enable access to a communication network, which may include any one or more of the internet, an intranet, a Wide Area Network (WAN), a Local Area Network (LAN), a wireless network, a Digital Subscriber Line (DSL) network, a frame relay network, an Asynchronous Transfer Mode (ATM) network, a Virtual Private Network (VPN), and/or any other suitable communication network.
The storage device 143 is used for storing at least one program. In some embodiments, the storage device 143 comprises one or more memories. The Memory may include Volatile Memory (Volatile Memory), such as Random Access Memory (RAM); the Memory may also include a Non-Volatile Memory (Non-Volatile Memory), such as a Read-Only Memory (ROM), a Flash Memory (Flash Memory), a Hard Disk (Hard Disk Drive, HDD), or a Solid-State Drive (SSD); the memory may also comprise a combination of memories of the kind described above.
In certain embodiments, the memory may also include memory that is remote from the one or more processors, such as network-attached memory accessed via RF circuitry or external ports and a communication network, which may be the internet, one or more intranets, Local Area Networks (LANs), wide area networks (WLANs), Storage Area Networks (SANs), and the like, or suitable combinations thereof. The memory controller may control access to the memory by other components of the device, such as the CPU and peripheral interfaces. The memory optionally includes high-speed random access memory, and optionally also includes non-volatile memory, such as one or more magnetic disk storage devices, flash memory devices, or other non-volatile solid-state memory devices. Access to the memory is optionally controlled by a memory controller by other components of the device, such as a CPU and peripheral interfaces.
The processing device 144 is communicatively connected to the image capturing device 141, the communication device 142, and the storage device 143, and is configured to call the at least one program to implement various method flows in the foregoing embodiments, for example, any one of the method flows in the embodiments of fig. 2 to 6. In some embodiments, the processing device 144 includes one or more processors, which may include any suitable hardware processor, such as a microprocessor, microcontroller, digital signal processor, dedicated logic, and/or any other suitable circuitry for controlling the operation of a general purpose or special purpose computer.
In some embodiments, the electronic terminal 140 may further have a display device, such as an LED, OLED, LCD display, etc., and may also be a touch display. In some embodiments, the electronic terminal 140 may also have input structures that may enable a user to interact with the computing device. Thus, the input structures may include buttons, keyboards, mice, touch pads, and the like. Alternatively, the input structure may be a touch member of a touch display that facilitates user input by detecting the occurrence and/or location of an object touching its screen.
It should be noted that the first user, the second user, and the administrator may log in a software program included in or communicated with the user terminal implemented by the electronic terminal 140 through respective user accounts, so as to run the program to implement the method flow in any one of fig. 2 to fig. 6.
It should be understood that the apparatus described in the embodiments of the present application is but one example of an application and that the components of the device may have more or fewer components than shown or a different configuration of components. The various components of the depicted figures may be implemented in hardware, software, or a combination of hardware and software, including one or more signal processing and/or application specific integrated circuits.
The present application also provides a computer-readable and writable storage medium storing at least one computer program of an authentication method, which when executed implements the method of any of the above embodiments with respect to fig. 2 to 6.
The functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application or portions thereof that substantially contribute to the prior art may be embodied in the form of a software product stored in a storage medium and including instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present application.
In the embodiments provided herein, the computer-readable and writable storage medium may include read-only memory, random-access memory, EEPROM, CD-ROM or other optical disk storage, magnetic disk storage or other magnetic storage devices, flash memory, a USB flash drive, a removable hard disk, or any other medium that can be used to store desired program code in the form of instructions or data structures and that can be accessed by a computer. Also, any connection is properly termed a computer-readable medium. For example, if the instructions are transmitted from a website, server, or other remote source using a coaxial cable, fiber optic cable, twisted pair, Digital Subscriber Line (DSL), or wireless technologies such as infrared, radio, and microwave, then the coaxial cable, fiber optic cable, twisted pair, DSL, or wireless technologies such as infrared, radio, and microwave are included in the definition of medium. It should be understood, however, that computer-readable-writable storage media and data storage media do not include connections, carrier waves, signals, or other transitory media, but are intended to be non-transitory, tangible storage media. Disk and disc, as used in this application, includes Compact Disc (CD), laser disc, optical disc, Digital Versatile Disc (DVD), floppy disk and blu-ray disc where disks usually reproduce data magnetically, while discs reproduce data optically with lasers.
In one or more exemplary aspects, the functions described in the computer program for the training method of the machine learning model for authentication and the authentication method described herein may be implemented in hardware, software, firmware, or any combination thereof. When implemented in software, the functions may be stored on or transmitted over as one or more instructions or code on a computer-readable medium. The steps of a method or algorithm disclosed herein may be embodied in a processor-executable software module, which may be located on a tangible, non-transitory computer-readable and/or writable storage medium. Tangible, non-transitory computer readable and writable storage media may be any available media that can be accessed by a computer.
The flowcharts and block diagrams in the figures described above of the present application illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present application. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
In summary, according to the method, the terminal and the system for recording, circulating, authenticating, initiating and serving the article information, an electronic terminal of a user can store a reference image of a genuine article on the cloud, and one or more of verification information of the reference image, article information, a comparison result of the article image, circulation information of the article and the like can be stored in the trusted distributed storage system, such as a block chain system, and can be provided according to a legal user request, so that the safety and reliability of authenticating the article to be authenticated and inquiring related information can be ensured, a feasible path for tracing can be provided, and the problems in the prior art can be well solved.
The above embodiments are merely illustrative of the principles and utilities of the present application and are not intended to limit the application. Any person skilled in the art can modify or change the above-described embodiments without departing from the spirit and scope of the present application. Accordingly, it is intended that all equivalent modifications or changes which can be made by those skilled in the art without departing from the spirit and technical concepts disclosed in the present application shall be covered by the claims of the present application.

Claims (43)

1. An article information recording method, comprising:
recording the item information to a trusted distributed storage system by the identity of the registered first user; and/or the like, and/or,
and storing at least one image shot at least one position of the article in an image library to be used as a reference image for feature comparison.
2. The item information recording method according to claim 1, wherein the registration process of the first user includes:
and sending first identity information owned by the first user to an administrator terminal so as to register the first identity information to the trusted distributed storage system.
3. The item information recording method according to claim 2, wherein the first identity information includes: a first public key of a first public-private key pair, or a first address generated from the first public key.
4. The item information recording method according to claim 1, wherein there are a plurality of images taken for each of the positions.
5. The item information recording method according to claim 4, wherein a plurality of images corresponding to each of the positions are obtained under different photographing conditions.
6. The item information recording method according to claim 4, wherein the plurality of images taken for each of the positions include image features of features in the position.
7. The article information recording method according to claim 1, wherein the image is a microscopic image.
8. The item information recording method according to claim 1, further comprising:
recording the image index ciphertext of the at least one image to the trusted distributed storage system by the identity of the first user;
wherein the image index is used to index a reference image of an image library.
9. The item information recording method according to claim 1, wherein the identity of the first user is represented by an electronic signature signed by a private key of a first public-private key pair owned by the first user.
10. The item information recording method according to claim 1, comprising:
acquiring article circulation information which represents that the article attribution of the article circulation information is transferred from a first user to a new user;
and transferring the article circulation information to the trusted distributed storage system for recording by the identity of the first user.
11. The item information recording method according to claim 1, wherein the images in the image library are encrypted.
12. An article circulation registration method, comprising:
acquiring article circulation information which represents that article attribution is transferred from an original user to a new user;
and transferring the article circulation information to a trusted distributed storage system for recording according to the identity of the original user.
13. The method of claim 12, wherein the identity of the original user is represented by an electronic signature completed by a current private key of a current public-private key pair owned by the original user.
14. An article authentication initiation method, comprising:
shooting at least one position of the article by using the identity of a second user to obtain at least one image to be compared;
sending the at least one image to be compared to the outside by the identity of a second user;
acquiring a comparison result of the at least one image to be compared and the at least one reference image from the outside; and the comparison result is also recorded in the trusted distributed storage system.
15. The method according to claim 14, wherein the at least one image to be compared is a microscopic image.
16. The method as claimed in claim 14, wherein there are a plurality of images to be compared taken corresponding to each of the positions.
17. The method as claimed in claim 16, wherein the plurality of images to be compared taken for each of the positions are obtained under different photographing conditions.
18. The method according to claim 16, wherein the plurality of images to be compared for each of the positions include image features of features in the position.
19. The article authentication initiation method of claim 14, wherein the at least one location is determined based on guidance information.
20. The article authentication initiation method of claim 14, comprising:
acquiring article circulation information which represents that the article attribution is transferred from the second user to the new user;
and transferring the article circulation information to the trusted distributed storage system for recording by the identity of the second user.
21. The item authentication initiation method of claim 14, wherein the identity of the second user is represented by an electronic signature signed by a second private key of a second public-private key pair in its possession.
22. An item authentication service method, comprising:
receiving at least one image to be compared which is shot from at least one position of an article;
obtaining a comparison result between the at least one image to be compared and a reference image in an image library;
and sending the comparison result to the outside, and recording the comparison result to a trusted distributed storage system.
23. The item authentication service method according to claim 22, wherein the at least one image to be compared and the reference image are microscopic images.
24. The item authentication service method according to claim 22, comprising:
sending guide information outwards;
wherein the guiding information is used for indicating the at least one position for shooting.
25. The item identification service method according to claim 22, wherein the obtaining of the comparison result between the at least one image to be compared and the reference image in the image library comprises:
comparing the at least one image to be compared with the reference image extracted from the image library to obtain a comparison result;
or, the at least one image to be compared is provided for the characteristic comparison and the comparison result is obtained.
26. The item authentication service method according to claim 22, comprising:
and according to the received display request, extracting corresponding content from the data which is synchronized and stored from the trusted distributed storage system, and responding to the display request.
27. The reliable data recording method is characterized by being applied to the trusted distributed storage system; the method comprises the following steps:
recording or providing item-related information, including: one or more combinations of article information, article circulation information and comparison results of images;
the comparison result of the images is a result of feature comparison between at least one image to be compared and at least one reference image taken from at least one position of the article.
28. The data reliable recording method of claim 27, further comprising:
and pre-storing the ciphertext of each first image for verifying the first image to be verified.
29. The data reliable recording method of claim 27, further comprising:
verifying whether the authority of the request initiator recording or providing the article related information conforms to the request of the request initiator;
and responding the request according to the result obtained by the verification.
30. The method of claim 27, wherein the trusted distributed storage system comprises: a blockchain system.
31. The method of claim 30, wherein the block chain system comprises: a public or federation chain of intelligent contracts is supported.
32. An electronic terminal, comprising:
an image pickup device for picking up an image;
communication means for communicating with the outside;
a storage device for storing at least one program;
a processing device, communicatively connected to the camera device, the communication device and the storage device, for calling the at least one program to execute the article information recording method according to any one of claims 1 to 11.
33. An electronic terminal, comprising:
an image pickup device for picking up an image;
communication means for communicating with the outside;
a storage device for storing at least one program;
processing means, communicatively connected to the camera means, the communication means and the storage means, for invoking the at least one program to perform the article authentication initiation method according to any one of claims 14 to 21.
34. The electronic terminal according to claim 32 or 33, wherein the camera device comprises: a microscopic camera, or a camera equipped with a microscopic lens.
35. An electronic terminal, comprising:
communication means for communicating with the outside;
a storage device for storing at least one program;
a processing device, communicatively connected to the communication device and the storage device, for invoking the at least one program to execute the article circulation registration method according to claim 12 or 13.
36. A service terminal, comprising:
communication means for communicating with the outside;
a storage device for storing at least one program;
processing means, communicatively connected to the communication means and the storage means, for invoking the at least one program to perform the item authentication service method according to any one of claims 22 to 26.
37. The trusted distributed storage system is used for recording or providing item-related information, and comprises: one or more combinations of article information, article circulation information and comparison results of images; the comparison result of the images is a result of feature comparison between at least one image to be compared and at least one reference image taken from at least one position of the article.
38. The trusted distributed storage system of claim 37, further configured to pre-store a ciphertext of each reference image for use in verifying the reference image to be verified.
39. The trusted distributed storage system of claim 37, comprising: and the authority verification module is used for verifying whether the authority of the request initiator recording or providing the article related information conforms to the request of the request initiator and responding to the request according to the result obtained by verification.
40. The trusted distributed storage system of claim 37, wherein said trusted distributed storage system comprises: a blockchain system.
41. The trusted distributed storage system of claim 40, wherein said blockchain system comprises: a public or federation chain of intelligent contracts is supported.
42. An article authentication system, comprising:
at least a first electronic terminal implemented by an electronic terminal according to claim 32;
at least one second electronic terminal implemented by an electronic terminal according to claim 33;
at least one service terminal according to claim 36, capable of communicating with said at least one first and second electronic terminals;
wherein the first electronic terminal, second electronic terminal and service terminal are capable of communicating with the trusted distributed storage system of claim 37; and at least the first electronic terminal and the service terminal can access the image library.
43. A computer storage medium storing at least one computer program which is executed to perform an article information recording method according to any one of claims 1 to 11; or, performing the item flow registration method of claim 12 or 13; or, performing the item authentication initiation method of any one of claims 14 to 21; or, performing the item authentication service method of any one of claims 22 to 26; alternatively, the data reliable recording method according to any one of claims 27 to 31 is performed.
CN202010145395.XA 2020-03-03 2020-03-03 Article information recording, circulation, authentication initiation and service method, terminal and system Pending CN113421100A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010145395.XA CN113421100A (en) 2020-03-03 2020-03-03 Article information recording, circulation, authentication initiation and service method, terminal and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010145395.XA CN113421100A (en) 2020-03-03 2020-03-03 Article information recording, circulation, authentication initiation and service method, terminal and system

Publications (1)

Publication Number Publication Date
CN113421100A true CN113421100A (en) 2021-09-21

Family

ID=77711602

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010145395.XA Pending CN113421100A (en) 2020-03-03 2020-03-03 Article information recording, circulation, authentication initiation and service method, terminal and system

Country Status (1)

Country Link
CN (1) CN113421100A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114970891A (en) * 2022-05-11 2022-08-30 上海霖承环保科技有限公司 Transaction platform system and method for recycling recovered household appliances under big data
CN116704496A (en) * 2023-08-01 2023-09-05 深圳市美孚电子有限公司 Article supervision method, system, equipment and storage medium based on intelligent electronic scale
CN117529746A (en) * 2021-12-24 2024-02-06 学校法人明治大学 Object recognition system, object recognition program, and object recognition method

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109146024A (en) * 2018-07-26 2019-01-04 宁波大红鹰学院 Art work Anti-fake electronic label System and method for based on block chain
CN109658111A (en) * 2018-12-06 2019-04-19 深圳超级区块链信息技术有限公司 A method of the art work true and false is identified by block chain
CN109961297A (en) * 2019-03-29 2019-07-02 深圳市元征科技股份有限公司 Article identification method, device, block chain node device and readable storage medium storing program for executing

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109146024A (en) * 2018-07-26 2019-01-04 宁波大红鹰学院 Art work Anti-fake electronic label System and method for based on block chain
CN109658111A (en) * 2018-12-06 2019-04-19 深圳超级区块链信息技术有限公司 A method of the art work true and false is identified by block chain
CN109961297A (en) * 2019-03-29 2019-07-02 深圳市元征科技股份有限公司 Article identification method, device, block chain node device and readable storage medium storing program for executing

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117529746A (en) * 2021-12-24 2024-02-06 学校法人明治大学 Object recognition system, object recognition program, and object recognition method
CN114970891A (en) * 2022-05-11 2022-08-30 上海霖承环保科技有限公司 Transaction platform system and method for recycling recovered household appliances under big data
CN116704496A (en) * 2023-08-01 2023-09-05 深圳市美孚电子有限公司 Article supervision method, system, equipment and storage medium based on intelligent electronic scale

Similar Documents

Publication Publication Date Title
US11777726B2 (en) Methods and systems for recovering data using dynamic passwords
US20220052852A1 (en) Secure biometric authentication using electronic identity
JP6756817B2 (en) Systems and methods for decentralized title recording and authentication
US11107088B2 (en) Open registry for internet of things
US11354676B2 (en) Open registry for identity of things
US20160162897A1 (en) System and method for user authentication using crypto-currency transactions as access tokens
US20220141036A1 (en) Electronic authentication device and method using blockchain
US20160098723A1 (en) System and method for block-chain verification of goods
US20190197562A1 (en) System and method for product authentication
CN113421100A (en) Article information recording, circulation, authentication initiation and service method, terminal and system
US11553105B2 (en) Secure document certification and execution system
WO2019233951A1 (en) A software application and a computer server for authenticating the identity of a digital content creator and the integrity of the creator's published content
US20220329446A1 (en) Enhanced asset management using an electronic ledger
CN110290134A (en) A kind of identity identifying method, device, storage medium and processor
KR20190038938A (en) SYSTEM, METHOD, AND SERVER COMPUTER SYSTEM FOR IMPLEMENTING CONVERTING ONE entity in a heterogeneous communication network environment to a verifiably authenticated entity
US20230177490A1 (en) Cryptographic asset generation using short range wireless communication
US20210049585A1 (en) Digital identity management device
TW202036339A (en) Securely performing cryptographic operations
US20150110361A1 (en) System and method for collection and validation of nutritional data
Salem et al. Blockchain-based biometric identity management
TWI772648B (en) Method of verifying partial data based on collective certificate
US20230224308A1 (en) User authentication and data encryption systems and methods
TW202134911A (en) Certification Method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination