CN115330413A - Block chain-based legal version code generation method and legal version code generation device - Google Patents

Block chain-based legal version code generation method and legal version code generation device Download PDF

Info

Publication number
CN115330413A
CN115330413A CN202210951351.5A CN202210951351A CN115330413A CN 115330413 A CN115330413 A CN 115330413A CN 202210951351 A CN202210951351 A CN 202210951351A CN 115330413 A CN115330413 A CN 115330413A
Authority
CN
China
Prior art keywords
code
authorized
legal
commodity
block chain
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210951351.5A
Other languages
Chinese (zh)
Inventor
刘文慧
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ant Blockchain Technology Shanghai Co Ltd
Original Assignee
Ant Blockchain Technology Shanghai Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ant Blockchain Technology Shanghai Co Ltd filed Critical Ant Blockchain Technology Shanghai Co Ltd
Priority to CN202210951351.5A priority Critical patent/CN115330413A/en
Publication of CN115330413A publication Critical patent/CN115330413A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • G06Q30/0185Product, service or business identity fraud
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1095Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD

Abstract

The embodiment of the specification provides a block chain-based legal version code generation method and a block chain-based legal version code generation device. In the legal copy code generating method, at an authorizing party, after the authorizing party completes authorization to an authorized party, a legal copy code for indicating authorized goods is generated according to authorization information; linking the legal version code to a block chain, wherein the legal version code is associated with authorization information, and the legal version code corresponds to the authorized commodities one by one; acquiring, at an authorized party, a copyright code from a blockchain; associating the commodity information of the authorized commodity with the legal edition code; the associated scrambling code is linked to the blockchain.

Description

Block chain-based legal version code generation method and legal version code generation device
Technical Field
The embodiment of the present specification relates to the technical field of block chains, and in particular, to a block chain-based legal version code generation method and a block chain-based legal version code generation device.
Background
Authorization is that a right owner grants the right owned by the right owner to an authorized person for use or operation, and is more commonly IP authorization, and the IP authorization is that a brand owner (or called a copyright party) grants the brand owned by the brand owner or an agent to the authorized person in a form of contract, and the authorized person engages in operation according to the contract and pays a corresponding fee to the copyright party.
For example, after the authorization is completed, the authorized party may use the corresponding IP on the authorized product according to the contract, for example, printing an IP image on a designated position on the package of the authorized product. In order to indicate to the consumer that the terminal commodity is an authorized genuine commodity, a widely used method is to paste a paper anti-counterfeiting label on the authorized commodity, and the paper anti-counterfeiting label can be used to prove that the terminal commodity has the genuine authorization quality.
Disclosure of Invention
In view of the foregoing, embodiments of the present specification provide an original code generation method and an original code generation apparatus based on a block chain. In the technical scheme of the embodiment of the specification, the authorized party and the authorized party are associated through the block chain to jointly complete the generation operation of the legal version code, and the participation of a third party is avoided. In addition, the original codes generated each time are linked in the generation process of the original codes, so that the credibility of the generation process of the original codes is ensured, and the non-tamper property and traceability of the original codes are ensured.
According to an aspect of the embodiments of the present specification, there is provided a block chain-based method for generating an original code, including: at an authorizing party, after the authorizing party completes authorization to an authorized party, generating a legal edition code for indicating an authorized commodity according to authorization information; linking the legal-copy code to a block chain, wherein the legal-copy code is associated with the authorization information and corresponds to the authorized goods one by one; obtaining, at an authorized party, the genuine code from the blockchain; associating the commodity information of the authorized commodity with the legal edition code; and linking the associated forward code to the block chain.
According to another aspect of the embodiments of the present specification, there is also provided a block chain-based legal version code generation method, performed by an authorized party, the legal version code generation method including: after the authorizing party completes authorization on the authorized party, generating a legal code for indicating authorized commodities according to authorization information, wherein the legal code is associated with the authorization information and corresponds to the authorized commodities one by one; and chaining the legal copy code to a block chain, so that the authorized party acquires the legal copy code from the block chain, associates the commodity information of the authorized commodity with the legal copy code, and chains the associated legal copy code to the block chain.
According to another aspect of the embodiments of the present specification, there is also provided a block chain-based legal system code generation method, performed by an authorized party, the legal system code generation method including: after an authorizer links a generated legal code for indicating an authorized commodity to a block chain, acquiring the legal code from the block chain, wherein the legal code is associated with authorization information authorized by the authorizer to the authorized party, and the legal code corresponds to the authorized commodity one to one; associating the commodity information of the authorized commodity corresponding to the legal code with the legal code; and linking the associated legal version code to the block chain, wherein, at the authorizer, after the authorizer authorizes the authorized party, the legal version code is generated according to the authorization information, and the legal version code is linked to the block chain.
According to another aspect of the embodiments of the present specification, there is also provided an apparatus for generating an original code based on a block chain, which is applied to an authorized party, the apparatus including: the authorized commodity authorization system comprises an authorized party authorization unit, an authorized code generation unit and an authorized commodity authorization unit, wherein the authorized party authorization unit is used for authorizing an authorized party to obtain authorized commodities; and a first uplink unit that uplinks the genuine code to a block chain, so that the authorized party acquires the genuine code from the block chain, associates the commodity information of the authorized commodity with the genuine code, and uplinks the associated genuine code to the block chain.
According to another aspect of the embodiments of the present specification, there is also provided an apparatus for generating an original code based on a block chain, which is applied to an authorized party, the apparatus including: the system comprises a legal code obtaining unit, a block chain obtaining unit and a block chain judging unit, wherein the legal code obtaining unit obtains the legal code from the block chain after the legal code which is generated by an authorizing party and used for indicating authorized commodities is linked to the block chain, the legal code is associated with authorization information which is authorized by the authorized party to the authorizing party, and the legal code corresponds to the authorized commodities one to one; the information association unit is used for associating the commodity information of the authorized commodity corresponding to the legal code with the legal code; and a second uplink unit which transmits the associated legal version code to the block chain, wherein, at the authorizer, after the authorizer authorizes the authorized party, the legal version code is generated according to the authorization information, and the legal version code is uplink to the block chain.
According to another aspect of embodiments herein, there is also provided an electronic device, including: at least one processor, a memory coupled to the at least one processor, and a computer program stored on the memory, the at least one processor executing the computer program to implement the blockchain-based scrambling code generating method as described in any of the above.
According to another aspect of embodiments of the present specification, there is also provided a computer-readable storage medium storing a computer program which, when executed by a processor, implements the block chain based scrambling code generating method as described above.
According to another aspect of embodiments of the present specification, there is also provided a computer program product including a computer program, which when executed by a processor implements the block chain based scrambling code generating method as described in any of the above.
Drawings
A further understanding of the nature and advantages of the contents of the embodiments of the present specification may be realized by reference to the following drawings. In the drawings, similar components or features may have the same reference numerals.
FIG. 1 illustrates a schematic diagram of an example environment, according to embodiments of the present description.
Fig. 2 illustrates an example architectural diagram of a blockchain network in accordance with an embodiment of this specification.
Fig. 3 is a flowchart illustrating an example of a block chain-based block cipher generation method according to an embodiment of the present disclosure.
Fig. 4 shows a schematic diagram of one example of a consensus process according to embodiments of the present specification.
Fig. 5 is a diagram illustrating an example of formats of a pre-preparation message, a preparation message, and an acknowledgement message in a consensus process according to an embodiment of the present specification.
Fig. 6 is a flowchart illustrating an example of an orthocode generation method based on a block chain according to an embodiment of the present specification.
Fig. 7 is a flowchart illustrating an example of an orthocode generation method based on a block chain according to an embodiment of the present specification.
Fig. 8 is a block diagram illustrating an example of an apparatus for block-chain-based orthocode generation according to an embodiment of the present disclosure.
Fig. 9 is a block diagram illustrating an example of an apparatus for block-chain-based orthocode generation according to an embodiment of the present disclosure.
Fig. 10 is a block diagram of an electronic device for implementing the legal code generation method according to an embodiment of the present disclosure.
Fig. 11 shows a block diagram of an electronic device for implementing an original code generation method according to an embodiment of the present specification.
Detailed Description
The subject matter described herein will be discussed with reference to example embodiments. It should be understood that these embodiments are discussed only to enable those skilled in the art to better understand and thereby implement the subject matter described herein, and are not intended to limit the scope, applicability, or examples set forth in the claims. Changes may be made in the function and arrangement of elements discussed without departing from the scope of the embodiments of the disclosure. Various examples may omit, substitute, or add various procedures or components as needed. In addition, features described with respect to some examples may also be combined in other examples.
As used herein, the term "include" and its variants mean open-ended terms in the sense of "including, but not limited to. The term "based on" means "based at least in part on". The terms "one embodiment" and "an embodiment" mean "at least one embodiment". The term "another embodiment" means "at least one other embodiment". The terms "first," "second," and the like may refer to different or the same object. Other definitions, whether explicit or implicit, may be included below. The definition of a term is consistent throughout the specification unless the context clearly dictates otherwise.
Authorization is that a right owner grants the right owned by the right owner to an authorized person for use or operation, and is more commonly IP authorization, and the IP authorization is that a brand owner (or called a copyright party) grants the brand owned by the brand owner or an agent to the authorized person in a form of contract, and the authorized person engages in operation according to the contract and pays a corresponding fee to the copyright party.
For example, after the authorization is completed, the authorized party may use the corresponding IP on the authorized product according to the contractual provisions, for example, printing an IP image on the package of the authorized product. In order to indicate to the consumer that the terminal commodity is an authorized genuine commodity, a widely used method is to paste a paper anti-counterfeiting label on the authorized commodity, and the paper anti-counterfeiting label can be used to prove that the terminal commodity has the genuine authorization quality.
However, the paper anti-counterfeit label needs to be manufactured by a third party and then pasted on the authorized commodity by an authorized party, which not only increases the cost, but also needs to be circulated by multiple parties, resulting in the circulation cost and the unreliability of the circulation process. In addition, the paper anti-counterfeiting label also has the problems of easy counterfeiting and incapability of tracing.
In view of the foregoing, embodiments of the present specification provide an original code generation method and an original code generation apparatus based on a block chain. In the legal copy code generating method, at an authorizing party, after the authorizing party completes authorization to an authorized party, a legal copy code for indicating authorized goods is generated according to authorization information; linking the original code to a block chain, wherein the original code is associated with the authorization information, the legal codes correspond to the authorized commodities one by one; acquiring, at an authorized party, a copyright code from a blockchain; associating the commodity information of the authorized commodity with the legal edition code; the associated scrambling code is linked to the blockchain. In the technical scheme of the embodiment of the specification, the authorized party and the authorized party are associated through the block chain to jointly complete the generation operation of the legal version code, and the participation of a third party is avoided. In addition, the original codes generated each time are linked in the generation process of the original codes, so that the credibility of the generation process of the original codes is ensured, and the non-tamper property and traceability of the original codes are ensured.
The block chain is a distributed shared account book and a database, and has the characteristics of decentralization, no tampering, trace retention, backtracking, openness and transparency and the like. The data on the block chain is stored in the form of data blocks, and the data blocks are connected in time sequence to form a chain data structure. Each block in the chain of blocks is linked to the previous block by an included cryptographic hash, and each block further includes a timestamp, a cryptographic hash, and one or more transactions. The individual transactions in the block form a Merkle tree by hashing. In a Merkle tree, the lowermost leaf node contains the underlying data, each intermediate node is a hash of its child node, the root node is a hash of its child node, representing the root of the Merkle tree, and the root node of the Merkle tree stores hash values representing all the data in the Merkle tree. When verifying whether a hash value is a transaction stored in the Merkle tree, quick verification can be performed by determining whether the hash value is consistent with the structure of the Merkle tree.
A blockchain network is a decentralized point-to-point network consisting of multiple computing nodes for managing, updating, and maintaining one or more blockchain structures. The types of blockchain networks may include public blockchain networks, private blockchain networks, and alliance blockchain networks, depending on the degree of openness of the nodes in the blockchain network.
The public blockchain network is a public network of participating entities, thousands of entities can cooperate in the public blockchain network, each entity operates at least one node in the public blockchain network, and accordingly, the consensus process in the public blockchain network is also completed by each node. In the consensus process, the node participating in the consensus signs the tile to indicate that the node confirms the consensus for the tile, and then the tile that completed the consensus is added to the tile chain of the tile chain network. In addition, the public blockchain network supports public transactions, and the public transactions are shared among all nodes in the public blockchain network and are stored in the global blockchain after being identified by all the nodes. A global blockchain refers to a blockchain that is replicated across all nodes. Consensus in a blockchain network is supported by a consensus mechanism, which is an algorithm for blockchain transactions to achieve distributed consensus, which may include: proof of work (POW), proof of rights (POS), and proof of authority (POA).
The private block chain network only aims at a specific entity, and the read-write permission of each node in the private block chain network is strictly controlled. In addition, the threshold for joining the private blockchain network is high, and permission is required to join the private blockchain network into one node. Based on this, private blockchain networks, also commonly referred to as licensed networks, place restrictions on who is allowed to participate in the network and on the level of participation in the network. For example, some nodes may participate in the uplink process of all transactions, and some nodes may participate in the uplink process of only a designated part of transactions. Various types of access control mechanisms may be used in private blockchain networks, such as voting of adding new entities by existing participants, regulatory agency control permissions, and the like.
The participating entities in the federated blockchain network are also private from each other and can be considered private networks of the participating entities. A federated blockchain network may be composed of several entities, each of which operates at least one node in the federated blockchain network. The consensus process in the federated coalition blockchain network is performed by authorized nodes, which may be all or part of the nodes in the federated coalition blockchain network, each of which signs a block to be uplinked to indicate a consensus acknowledgement for that block, which is then added to the blockchain.
FIG. 1 illustrates a schematic diagram of an example environment 100, according to embodiments of the present description. As shown in fig. 1, the example environment 100 allows entities to participate in a blockchain network 102. The blockchain network 102 may be, for example, a public, private, or alliance chain blockchain network. The example environment 100 may include computing devices 104, 106, 108, 110, 112 and a network 114. In one embodiment, the Network 114 may include a Local Area Network (LAN), a Wide Area Network (WAN), the Internet, or a combination thereof, and is connected to websites, user devices (e.g., computing devices), and backend systems. In an embodiment, the computing devices 104, 106, 108, 110, 112 may access the network 114 through wired and/or wireless communication.
In some cases, the computing devices 106, 108 may be nodes of a cloud computing system (not shown), or each computing device 106, 108 may be a separate cloud computing system, including multiple computers interconnected by a network and operating as a distributed processing system.
In an embodiment, computing devices 104-108 may run any suitable computing system that enables them to act as nodes in blockchain network 102. For example, computing devices 104-108 may include, but are not limited to, servers, desktop computers, laptops, tablet computing devices, and smartphones. In an embodiment, the computing devices 104-108 may be affiliated with a related entity and used to implement a corresponding service, which may be used to manage transactions between an entity or entities, for example.
In one embodiment, each of the computing devices 104-108 stores a corresponding blockchain ledger for the blockchain network 102. The computing device 104 may be (or include) a web server for providing browser functionality that may provide visualization information related to the blockchain network 102 based on the network 114. In some cases, the computing device 104 may not participate in the blockchain verification, but rather monitor the blockchain network 102 to determine when other nodes (e.g., which may include computing devices 106-108) agree, and generate a corresponding blockchain visualization user interface accordingly.
In an embodiment, computing devices 110 and 112 may be client devices connected to blockchain network 102. For example, computing device 110 may be a terminal device at a medical facility platform and computing device 112 may be a terminal device at an advertising administration platform. Computing devices 110 and 112 may include, but are not limited to, servers, desktop computers, laptops, tablet computing devices, and smartphones.
In an embodiment, computing device 104 may receive a request initiated by a client device (e.g., computing device 110 or computing device 112) for a blockchain visualization user interface. In some cases, the nodes of the blockchain network 102 may also act as client devices, such as a user of the computing device 108 may send the request to the computing device 104 using a browser running on the computing device 108.
In response to the request, computing device 104 may generate a blockchain visualization user interface (e.g., a web page) based on the stored blockchain ledger and send the generated blockchain visualization user interface to the requesting client device. If blockchain network 102 is a private type or a federated type blockchain network, the request for the blockchain visual user interface may include user authorization information, which may be verified by computing device 104 before generating and sending the blockchain visual user interface to the requesting client device, and the corresponding blockchain visual user interface returned after verification.
The blockchain visualization user interface may be displayed on the client device (e.g., as may be displayed in user interface 116 shown in fig. 1). When the blockchain ledger is updated, the display content of the user interface 116 may be updated accordingly. Further, user interaction with user interface 116 may result in requests to other user interfaces, such as a search results page that displays a block list, block details, transaction list, transaction details, account list, account details, contract list, contract details, or results of a user conducting a search of the block chain network, and so forth.
Fig. 2 illustrates an example architectural diagram of a blockchain network in accordance with an embodiment of this specification.
As shown in fig. 2, the authorizer 220 is a blockchain node in the blockchain network 214 or a component thereof, and the authorizer 220 may be a node constructed by the authorizer, so that the authorizer can perform data uplink via the authorizer 220 node. The authorizer 220 included in the blockchain network shown in fig. 2 is merely one example. In another example, the authorizer is communicatively connected to a blockchain node in the blockchain network 214. In this example, the authorizer sends the data to be uplinked to the block-link node of the communication connection, which then uplinks the data to be uplinked to the block-link for storage. This can prevent stored data from being deleted or tampered.
The blockchain network 214 also includes an authorized party 240, and the authorized party 240 may be a blockchain link point or a component thereof in the blockchain network 214. In another example, the authorized party 240 is communicatively connected with a blockchain node in the blockchain network 214. In addition, the authorized party 240 may perform a consensus operation with other consensus nodes as the consensus node in the blockchain network 214. The authorized party 240 included in the blockchain network 214 shown in fig. 2 is merely one example.
Further, blockchain network 214 may also include consumer side 260, and consumer side 260 may be a terminal device of each consumer, which may be a blockchain link point in blockchain network 214 or a component thereof, or a device communicatively connected to a blockchain link point. The customer 260 may perform consensus operations with other consensus nodes in the blockchain network 214 as a consensus node. The consumer side 260 included in the blockchain network 214 shown in fig. 2 is merely an example, and in this specification embodiment, the consumer side 260 may not be included in the blockchain network 214.
Fig. 3 shows a flowchart of an example 300 of a block chaining-based plate code generation method according to an embodiment of the present description.
The original code generation method shown in fig. 3 may be performed by both the authorizer and the authorized party, and the authorizer and the authorized party may perform corresponding operations on the blockchain, so that the blockchain may perform full-process recording and uplink on the original code generation method in the embodiment of the present specification. In one example, various operations of the authorizer and authorizee may be controlled and performed by intelligent contracts, each of which may be pre-deployed on a blockchain network.
In the embodiment of the present specification, the authorizing party is a party granted the related right, the authorized party is a party granted the related right, and the authorizing party can grant the right owned by the authorized party to the authorized party for use or operation. The authorized parties may include copyright owners, patentees, and the like, and the authorized parties may include merchants, manufacturers of goods, and the like.
In one example, the authorizer may be an IP authorizer and the authorization information may include information for IP authorization. In this example, the authorizer may be an owner of the IP, the authorizer may grant the owned IP to the authorized party for use, the IP authorization may be in a contractual manner, and the contract may restrict the usage manner, the usage object, the usage scale, the usage period, and the like of the authorized party so that the authorized party may use the IP as specified by the contract. Of course, the authorization addressed by the embodiments of the present specification is not limited to IP authorization, and may also include authorization of other rights such as patents. The following description will take IP authorization as an example.
As shown in fig. 3, at 310, at the authorizer, after the authorizer has completed authorizing the authorized party, a copyright code is generated according to the authorization information; the original code is linked to a block chain.
Before the technical scheme provided by the embodiment of the specification is executed, authorization needs to be completed between an authorizing party and an authorized party. After the authorization is completed, the authorized party can obtain the granted related rights and can use the granted rights according to the agreement of both parties.
After the authorization is completed, both the authorizing party and the authorized party can obtain corresponding authorization information, the authorization information is generated by authorizing the authorized party according to the authorizing party, and the authorization information can include information related to authorization operation between the authorizing party and the authorized party.
In one example, the authorization information may include: identification information of the authorizing party, identification information of the authorized party, authorized transaction information, authorized object information and the like. The identification information of the authorizing party may include a name, a unique identifier, and the like of the authorizing party, and the identification information of the authorized party may include a name, a unique identifier, and the like of the authorized party. The unique identification may include the same social credit code as the authorizing or authorized party of the enterprise, etc. The authorized transaction information may include a transaction contract, transaction ID, and other transaction information for the authorized transaction, among others.
In one example, the authorization object information includes information about an authorization object, the authorization object being an object that is transacted during an authorization transaction, the authorizing party having a right to the authorization object so that the authorizing party can grant the right to the authorized party. For example, if the authorized object is an IP, the object targeted in the IP authorization transaction process is an IP, and the authorized party grants the owned IP to the authorized party. In this example, the authorization object information may include information such as a name, an image, and a type of the authorization object, where the type of the authorization object is a type of a right owned by the authorizer, and the type of the authorization object may include an IP, a patent, and the like. For example, if the authorization object is a cartoon image, the type of authorization object may be IP.
In the embodiment of the present specification, the copyright code may be generated based on the authorization information. The legal copy code can be used for indicating that the authorized commodity belongs to the legal copy, the legal copy code corresponds to the authorized commodity one by one, each legal copy of the authorized commodity has only one legal copy code, and the legal copy codes corresponding to different authorized commodities are different. The presentation form of the legal code may include a two-dimensional code, a one-dimensional code, a character string, and the like. Based on the one-to-one correspondence relationship between the legal codes and the authorized commodities, the authorized party can conveniently control the number of the authorized commodities produced by the authorized party, and the authorized party can be prevented from illegally producing the commodities beyond the authorized number range.
The generated copyright codes are associated with the various authorization information, each authorization information can correspond to a unique copyright code, and each copyright code can be associated with a plurality of authorization information. After the authorization information is associated with the copyright code, the authorization information associated with the legal code can be acquired through the legal code.
In one mode of generating the legal copy code, hash processing may be performed on the authorization information to obtain a corresponding unique code, and the unique code may be used as the legal copy code corresponding to the authorization information.
After generating the scrambling code, the authorizer can uplink the scrambling code to the blockchain.
During the original code uplink, the original code and the corresponding associated authorization information can be recorded in association on the block chain. In one way of associatively recording, the corresponding relationship between the copyright code and the associated authorization information may be established, and the established corresponding relationship may be recorded in the same block on the block chain.
During uplink, the original code and the associated authorization information may be packaged into a block, and then the block is uplink to the blockchain, each blockchain link point in the blockchain network may be used as a common identification node to perform common identification processing on the block to be uplink, and after the common identification is achieved, the block is recorded on the blockchain.
Fig. 4 illustrates a schematic diagram of one example 400 of a consensus process in accordance with embodiments of the present specification. In the example of fig. 4, the accounting node (i.e., master node) is R0, referred to hereinafter as the master node in this example. The determined consensus nodes (i.e., backup nodes) participating in consensus may include R1, R2, and R3, referred to as backup nodes in the following of this example. It should be noted that the consensus process shown in fig. 4, which includes 4 network nodes R0, R1, R2, and R3, is for illustrative purposes only, and the consensus process may include any suitable number of network nodes.
The master node R0 performs a consensus process with all consensus nodes participating in the consensus in the blockchain network, for example, the master node R0 performs the consensus process with the backup nodes R1, R2, and R3.
In the present disclosure, the consensus process may be implemented using PoW (workload proof algorithm), poS (equity proof algorithm), PBFT (practical byzantine fault-tolerant algorithm), and the like. The following description will be made by taking the PBFT consensus process as an example.
As shown in fig. 4, the procedure of the PBFT consensus process includes: a Pre-Prepare phase (Pre-Prepare) 410, a Prepare phase (Prepare) 420, and a confirm phase (Commit) 430.
Specifically, at 410, the master node R0 packages the transaction data to be recorded into the blockchain into a message m, then generates a Pre-prepare message Pre-prepare, and sends (e.g., broadcasts) the Pre-prepare message Pre-prepare to the backup nodes R1, R2, and R3 within a given time interval. The Pre-prepare message Pre-prepare indicates that the master node R0 is initiating the consensus process.
In the present specification embodiment, fig. 5 is a schematic diagram illustrating an example of formats of a pre-preparation message, a preparation message, and an acknowledgement message in a consensus process according to the present specification embodiment. As shown in fig. 5, the format of the Pre-preparation message Pre-prepare may be: < < PRE-PREPARE, epoch, seq, D (m), signature-p >, m, j >. Here, "PRE-PREPARE" denotes a protocol identification of the preliminary preparation message, "epoch" denotes an age of R0 as a master node, "seq" denotes a proposal number of a proposal of a required consensus, "D (m)" denotes a digest of a request message set, "signature-p" denotes a signature of R0, "m" denotes a specific content of the request message (i.e., a specific content of each piece of authentication information in a block), and "j" denotes a node identification of R0. Here, D (m) is obtained by performing hash calculation on each authentication information set in the block.
In the preparation stage 420, for each backup node (R1, R2, or R3), after receiving the Pre-preparation message Pre-preparation and detecting that the Pre-preparation message Pre-preparation is legitimate, the Pre-preparation message Pre-preparation may be stored in a local log and a preparation message preparation for responding to the Pre-preparation message Pre-preparation may be generated and then broadcast to other nodes. The Prepare message Prepare indicates that the backup node has received the Pre-Prepare message Pre-Prepare from the primary node and is sending a reply in response to the Pre-Prepare message Pre-Prepare.
Accordingly, each backup node may also receive the Prepare message Prepare sent by the other backup nodes. Taking backup node R1 as an example, after receiving the Prepare message Pre-Prepare sent by master node R0, backup node R1 broadcasts the generated Prepare message Pre to master node R0, backup nodes R2, and R3. Accordingly, backup node R1 also receives Prepare message Prepare sent by master node R0, backup nodes R2 and R3.
In this illustrative embodiment, the Prepare message Prepare broadcast by the backup node may be used to indicate the consensus commitment made by the backup node during the Prepare phase 420.
In this embodiment, as shown in fig. 5, the format of the preparation message Prepare may be: < PREPARE, epoch, seq, D (m), i, signature-i >. Here, "PREPARE" represents a protocol identifier of the preparation message PREPARE, "i" represents a node identifier of a node that transmits the preparation message PREPARE, and "signature-i" represents a signature of the node that transmits the preparation message PREPARE. The meaning of "epoch", "seq", and "D (m)" in the preparation message Prepare is the same as that of "epoch", "seq", and "D (m)" in the aforementioned preparation message Pre-Prepare.
In the acknowledgement phase 430, when a network node receives a sufficient number of Prepare messages Prepare from other network nodes, the network node determines that consensus has been reached. For example, if primary node R0 or backup node R1, R2, or R3 receives a Quorum (e.g., 2f +1, where f represents the number of failed network nodes) Prepare message Prepare, it is determined that consensus is achieved between the network nodes. The master node R0 or the backup nodes R1, R2 or R3 will then broadcast an acknowledgement message Commit to the other nodes.
In this embodiment, as shown in fig. 5, the format of the acknowledgment message Commit may be: < COMMIT, epoch, seq, D (m), p, signature-p >. Wherein "COMMIT" represents a protocol identification of the acknowledgment message COMMIT, "p" represents a node identification of a node that transmits the acknowledgment message COMMIT, and "signature-p" represents a signature of the node that transmits the acknowledgment message COMMIT. The meaning of "epoch", "seq", and "D (m)" in the acknowledgment message Commit is the same as that of "epoch", "seq", and "D (m)" in the aforementioned prepare message Pre-prepare.
In this illustrative embodiment, a node sends a confirmation message Commit and stores the confirmation message Commit in a local log to represent consensus commitments made by the node during the confirmation phase 430.
Returning to FIG. 3, at 320, at the authorized party, the genuine code may be obtained from the blockchain; associating the commodity information of the authorized commodity with the legal edition code; the associated scrambling code is linked to the blockchain.
After obtaining the legal copy code from the blockchain, the authorized party can associate the commodity information of the authorized commodity with the legal copy code. In this embodiment, the authorized article is an authorized article that can use the authorized object, for example, if the type of the authorized object is IP, the authorized IP can be used on the authorized article. In one example, the type, quantity, and usage of the authorized object of the authorized goods may be agreed in the authorization process, and the authorized party may agree by both parties to use the authorized object on the authorized goods after completing authorization.
In one example, the merchandise information of the authorized merchandise may include at least one of the following information: a product name, a product view, a product link, a product identification, a store name selling authorized products, a store logo, and the like. The commodity view may include at least one basic view of a front view, a top view, a left view, a right view, a bottom view, a rear view, and the like. The merchandise link may include a description link for the authorized merchandise, a link for selling the authorized merchandise, and the like. The commodity identification can be a code for uniquely representing the corresponding authorized commodity, each authorized commodity corresponds to one commodity identification, and the commodity identifications of different authorized commodities can be different.
After the legal plate code is associated with the commodity information of the authorized commodity, the legal plate code can be simultaneously associated with the authorization information and the commodity information, so that the authorization information and the commodity information associated with the legal plate code can be simultaneously acquired through the legal plate code.
After the association between the original code and the merchandise information is successful, the associated original code can be linked to the block chain. After the uplink processing, the legal version code and the associated authorization information and commodity information are recorded in a block of the block chain, and on the block chain, the legal version code and the associated authorization information and commodity information are recorded in the block chain in an associated manner. In one way of the associated recording, a correspondence may be established between the copyright code and the associated authorization information and the merchandise, and the established correspondence may be recorded in the same block on the block chain.
For the uplink mode of the original code at the authorized party, the contents described above with reference to fig. 4 and 5 can be referred to.
The legal version code of the chain on the authorized party can be applied to the corresponding authorized goods, and the application mode can include printing on the package of the corresponding authorized goods, printing on the body of the corresponding authorized goods, and the like. The corresponding authorized commodity can be indicated to the consumer as the authorized genuine commodity through the genuine code.
In an application scenario, the authorized commodity is a high-value solitary commodity, and the unique legal-version code for the authorized commodity can be generated by the legal-version code generation method provided by the embodiment of the specification, and can prove that the authorized commodity is an authorized legal-version commodity, so that counterfeiting and pirating of the authorized commodity are avoided.
By the method for generating the legal version code, the legal version codes corresponding to the authorized commodities one to one are generated and recorded on the block chain, so that the generated legal version codes are prevented from being tampered. The authorization information and the commodity information corresponding to the authorized commodity can be inquired through the unique legal-version code corresponding to the authorized commodity, and the authorized commodity can be proved to be the authorized legal-version commodity through the authorization information and the commodity information. The legal version code generated through the embodiment of the specification ensures the authenticity and verifiability of the authorized goods and avoids counterfeiting and pirating goods.
In one example, after obtaining authorization and generating the authorized product, the authorized party may obtain the authorized product corresponding to the authorized product from the blockchain and associate the authorized product with the authorized product. The manner of association may include printing the proper code on the packaging of the authorized good, printing the proper code on the body of the authorized good, etc. Through the association mode, the consumer can conveniently obtain the legal edition code of the authorized commodity, so that the authorized commodity is confirmed to be the authorized legal commodity through the legal edition code.
In one example, at a consumer purchasing an authorized good, the authorized information and the good information associated with the genuine code may be obtained from the blockchain according to the genuine code.
In one way of obtaining information according to the genuine code, the genuine code may be a two-dimensional code or a one-dimensional code, so that the genuine code may be presented on the authorized goods in the form of the two-dimensional code or the one-dimensional code. The consumer can scan the two-dimensional code or the one-dimensional code on the authorized commodity through the terminal device so as to be connected with the block chain network for recording the legal edition code. Then, the authorization information and the commodity information associated with the recorded legal version code can be acquired from the block chain.
In another way of obtaining information from the legitimate code, the legitimate code may be a string of characters, so that the legitimate code may be presented on the authorized article in the form of a string of characters. The consumer can log in a platform connected with the blockchain network through the terminal device, and then obtains the authorization information and the commodity information associated with the recorded legal version code from the blockchain by inputting the character string of the legal version code on the platform.
After the authorization information and the commodity information associated with the legal-copy code are obtained, whether the authorized commodity is an authorized legal-copy commodity can be checked according to the obtained authorization information and the commodity information.
In one checking mode, whether the authorization information and the commodity information are both accurate can be checked, and when the authorization information and the commodity information are both accurate, the authorized commodity can be determined to be an authorized genuine commodity. When at least one error message exists in the authorization message and the commodity message, the authorized commodity can be determined to be at risk of piracy.
In another verification method, the commodity information recorded on the block chain comprises a commodity identification which is used for identifying a unique code of an authorized commodity. The item identification obtained from the blockchain may be compared to the ID on the authorized item, when the article identification is the same as the ID, it can be determined that the authorized article is an authorized genuine article. When the article identification is different from the ID, it can be determined that the authorized article is at risk of piracy.
Through the above example, the blockchain network can associate an authorizing party, an authorized party and a consumer party, help the authorizing party and the authorized party to establish a connection with the consumer party, and improve the user experience of the consumer party. In addition, the consumer obtains the authorization information and the commodity information associated with the legal-copy code from the block chain, so that the credibility of the authorization information and the commodity information is improved, and the accuracy of the legal-copy inspection result obtained according to the authorization information and the commodity information is improved.
In one example, at a consumer, user information of the consumer may be bound to a copyright code. The user information may include a mobile phone number, a name, a job number, and the like, and the type of the user information bound by the legal code may be specified. Each copyright code is configured to be capable of being bound with user information of one consumer only, and when one copyright code is bound with one user information, the copyright code cannot be bound with other user information. In one example, when the legal code to which one user information is bound also binds other user information, the binding operation cannot be completed, and a binding failure may be prompted.
In a binding mode, the authorized party may operate a member system, and in the member system, the related user information of each consumer as a member and the information of the commodity purchased by each member may be recorded, and the information of the commodity may include a commodity identification, a legal version code, and the like corresponding to the commodity. The consumer can log in the member system through the application program of the terminal device, and corresponding operations are performed in the member system, and the performed operations can include binding operations. Specifically, the consumer can bind own user information with the legal code corresponding to the purchased authorized commodity in the member system, and if the information that the legal code is bound with other user information does not exist in the member system, the binding is successful; if the legal version code is bound with other user information in the member system, the binding is failed.
When the user information of the consumer fails to be bound with the legal code, the authorized goods can be determined to have the piracy risk. When the user information of the consumer is successfully bound with the legal edition code, the authorized commodity can be determined to be the authorized legal edition commodity.
In the above example, each legal code can only bind user information of one consumer, so as to ensure that the legal codes and the authorized commodities are in one-to-one correspondence, and avoid the condition that one legal code corresponds to a plurality of authorized commodities. In addition, through the binding operation, the illegal behavior that one legal code corresponds to a plurality of authorized commodities can be detected, so that the pirate behavior can be timely found and restrained.
Fig. 6 shows a flowchart of an example 600 of a block chaining-based plate code generation method according to an embodiment of the present specification. The legal code generation method shown in fig. 6 may be performed by an authorized party.
As shown in fig. 6, at 610, after the authorizing party completes authorization of the authorized party, a legal code indicating an authorized good is generated based on the authorization information. The legal edition code is associated with the authorization information, and the legal edition code corresponds to the authorized commodities one to one.
At 620, the authenticity code is linked to the blockchain such that the authorized party obtains the authenticity code from the blockchain, associates the merchandise information of the authorized merchandise with the authenticity code, and links the associated authenticity code to the blockchain.
Fig. 7 shows a flowchart of an example 700 of a block chaining-based plate code generation method according to an embodiment of the present description. The legal code generation method shown in fig. 7 may be performed by an authorized party.
As shown in fig. 7, at 710, after the authorizer chains the generated genuine code indicating the authorized goods to the blockchain, the genuine code is obtained from the blockchain. The legal edition code is associated with authorization information authorized by an authorized party to the authorization direction, and the legal edition code corresponds to the authorized commodities one to one.
At 720, the product information of the authorized product corresponding to the genuine code is associated with the genuine code.
At 730, the associated scrambling code is linked to a block chain. And at the authorizing party, after the authorizing party completes authorization to the authorized party, generating a legal version code according to the authorization information, and chaining the legal version code to the block chain.
Fig. 8 is a block diagram illustrating an example of an apparatus 800 for generating an orthocode based on a block chain according to an embodiment of the present disclosure. The legal code generating apparatus 800 shown in fig. 8 can be applied to an authorized party.
As shown in fig. 8, the apparatus 800 for generating a legal version code includes a legal version code generating unit 810 and a first uplink unit 820.
And the legal version code generating unit 810 is configured to generate a legal version code for indicating authorized goods according to the authorization information after the authorizing party completes authorization to the authorized party. The legal edition code is associated with the authorization information, and the legal edition code corresponds to the authorized commodities one to one.
A first linking unit 820 configured to link the legal code to the blockchain, such that the authorized party acquires the legal code from the blockchain, associates the goods information of the authorized goods with the legal code, and links the associated legal code to the blockchain.
Fig. 9 is a block diagram illustrating an example of an apparatus 900 for generating an orthocode based on a block chain according to an embodiment of the present disclosure. The legal code generating apparatus 900 shown in fig. 9 can be applied to an authorized party.
As shown in fig. 9, the original code generating apparatus 900 includes an original code acquiring unit 910, an information associating unit 920, and a second uplink unit 930.
The copyright code acquiring unit 910 is configured to acquire a copyright code from the blockchain after the authorized party links the generated copyright code indicating the authorized goods to the blockchain. The legal edition code is associated with authorization information authorized by an authorized party to the authorization direction, and the legal edition code corresponds to the authorized commodities one to one.
An information associating unit 920 configured to associate the product information of the authorized product corresponding to the genuine code with the genuine code.
A second uplink unit 930 configured to uplink the associated scrambling code to a block chain. And at the authorizing party, after the authorizing party completes authorization to the authorized party, generating a legal version code according to the authorization information, and chaining the legal version code to the block chain.
Embodiments of an orthocode generation method and an orthocode generation apparatus based on a block chain according to an embodiment of the present specification are described above with reference to fig. 1 to 9.
The block chain-based legal code generation apparatus in the embodiments of the present specification may be implemented by hardware, or may be implemented by software, or by a combination of hardware and software. The software implementation is taken as an example, and is formed by reading corresponding computer program instructions in the storage into the memory for operation through the processor of the device where the software implementation is located as a logical means. In the embodiment of the present specification, the block chain-based legal code generation apparatus may be implemented by, for example, an electronic device.
Fig. 10 shows a block diagram of an electronic device 1000 for implementing the method for generating an original code according to the embodiment of the present specification.
As shown in fig. 10, the electronic device 1000 may include at least one processor 1010, storage (e.g., non-volatile storage) 1020, memory 1030, and a communication interface 1040, and the at least one processor 1010, storage 1020, memory 1030, and communication interface 1040 are connected together via a bus 1050. The at least one processor 1010 executes at least one computer-readable instruction (i.e., an element described above as being implemented in software) stored or encoded in memory.
In one embodiment, computer-executable instructions are stored in the memory that, when executed, cause the at least one processor 1010 to: after the authorizing party completes authorization on the authorized party, a legal code for indicating authorized commodities is generated according to the authorization information, wherein the legal code is associated with the authorization information, and the legal code corresponds to the authorized commodities one by one; and linking the legal copy code to the blockchain, so that the authorized party acquires the legal copy code from the blockchain, associating the commodity information of the authorized commodity with the legal copy code, and linking the associated legal copy code to the blockchain.
It should be appreciated that the computer-executable instructions stored in the memory, when executed, cause the at least one processor 1010 to perform the various operations and functions described above in connection with fig. 1-9 in the various embodiments of the present description.
Fig. 11 shows a block diagram of an electronic device 1100 for implementing the method for generating an original code according to the embodiment of the present disclosure.
As shown in fig. 11, electronic device 1100 may include at least one processor 1110, a memory (e.g., non-volatile storage) 1120, a memory 1130, and a communication interface 1140, and the at least one processor 1110, memory 1120, memory 1130, and communication interface 1140 may be connected together via a bus 1150. The at least one processor 1110 executes at least one computer-readable instruction (i.e., the elements described above as being implemented in software) stored or encoded in memory.
In one embodiment, computer-executable instructions are stored in the memory that, when executed, cause the at least one processor 1110 to: after the authorized party links the generated legal version code for indicating the authorized commodity to the block chain, acquiring the legal version code from the block chain, wherein the legal version code is associated with authorization information authorized by the authorized party in the authorization direction, and the legal version code corresponds to the authorized commodity one to one; associating the commodity information of the authorized commodity corresponding to the legal-copy code with the legal-copy code; and linking the associated legal version code to the block chain, wherein at the authorizing party, after the authorizing party completes authorization to the authorized party, the legal version code is generated according to the authorization information, and the legal version code is linked to the block chain.
It should be appreciated that the computer-executable instructions stored in the memory, when executed, cause the at least one processor 1110 to perform the various operations and functions described above in connection with fig. 1-9 in the various embodiments of the present description.
According to one embodiment, a program product, such as a machine-readable medium, is provided. A machine-readable medium may have instructions (i.e., elements described above as being implemented in software) that, when executed by a machine, cause the machine to perform various operations and functions described above in connection with fig. 1-9 in the various embodiments of the present specification.
Specifically, a system or apparatus may be provided which is provided with a readable storage medium on which software program code implementing the functions of any of the above embodiments is stored, and causes a computer or processor of the system or apparatus to read out and execute instructions stored in the readable storage medium.
In this case, the program code itself read from the readable medium can realize the functions of any of the above-described embodiments, and thus the machine-readable code and the readable storage medium storing the machine-readable code form part of the present invention.
Computer program code required for the operation of various portions of the present specification may be written in any one or more programming languages, including an object oriented programming language such as Java, scala, smalltalk, eiffel, JADE, emerald, C + +, C #, VB, NET, python, and the like, a conventional programming language such as C, visual Basic 2003, perl, COBOL2002, PHP, and ABAP, a dynamic programming language such as Python, ruby, and Groovy, or other programming languages. The program code may execute on the user's computer, or on the user's computer as a stand-alone software package, or in part on the user's computer and in part on a remote computer, or entirely on the remote computer or server. In the latter scenario, the remote computer may be connected to the user's computer through any network format, such as a Local Area Network (LAN) or a Wide Area Network (WAN), or the connection may be made to an external computer (for example, through the Internet), or in a cloud computing environment, or as a service, such as a software as a service (SaaS).
Examples of the readable storage medium include floppy disks, hard disks, magneto-optical disks, optical disks (e.g., CD-ROMs, CD-R, CD-RWs, DVD-ROMs, DVD-RAMs, DVD-RWs), magnetic tapes, nonvolatile memory cards, and ROMs. Alternatively, the program code may be downloaded from a server computer or from the cloud via a communications network.
The foregoing description has been directed to specific embodiments of this disclosure. Other embodiments are within the scope of the following claims. In some cases, the actions or steps recited in the claims may be performed in a different order than in the embodiments and still achieve desirable results. In addition, the processes depicted in the accompanying figures do not necessarily require the particular order shown, or sequential order, to achieve desirable results. In some embodiments, multitasking and parallel processing may also be possible or may be advantageous.
Not all steps and elements in the above flows and system structure diagrams are necessary, and some steps or elements may be omitted according to actual needs. The execution order of the steps is not fixed, and can be determined as required. The apparatus structures described in the above embodiments may be physical structures or logical structures, that is, some units may be implemented by the same physical entity, or some units may be implemented by a plurality of physical entities, or some units may be implemented by some components in a plurality of independent devices.
The term "exemplary" used throughout this specification means "serving as an example, instance, or illustration," and does not mean "preferred" or "advantageous" over other embodiments. The detailed description includes specific details for the purpose of providing an understanding of the described technology. However, the techniques may be practiced without these specific details. In some instances, well-known structures and devices are shown in block diagram form in order to avoid obscuring the concepts of the described embodiments.
Alternative embodiments of the present disclosure are described in detail above with reference to the drawings, however, the embodiments of the present disclosure are not limited to the specific details of the embodiments, and within the technical idea of the embodiments of the present disclosure, many simple modifications may be made to the technical solution of the embodiments of the present disclosure, and these simple modifications all belong to the protection scope of the embodiments of the present disclosure.
The previous description of the disclosure is provided to enable any person skilled in the art to make or use the disclosure. Various modifications to the disclosure will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other variations without departing from the scope of the disclosure. Thus, the description is not intended to be limited to the examples and designs described herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.

Claims (14)

1. A block chain-based legal version code generation method comprises the following steps:
at an authorizing party, after the authorizing party completes authorization to an authorized party, generating a legal edition code for indicating an authorized commodity according to authorization information; linking the legal version code to a block chain, wherein the legal version code is associated with the authorization information and corresponds to the authorized commodities one by one;
obtaining, at an authorized party, the genuine code from the blockchain; associating the commodity information of the authorized commodity with the legal edition code; and linking the associated forward code to the block chain.
2. The genuine code generation method according to claim 1, wherein the authorization information comprises: the identification information of the authorizing party, the identification information of the authorized party, the authorized transaction information and the authorized object information.
3. The legal version code generating method of claim 2, wherein the authorization object information includes at least one of: name, image, and type of the authorized object.
4. The genuine code generation method according to claim 1, wherein the commodity information comprises at least one of: a commodity name, a commodity view, a commodity link, a commodity identification, a store name for selling the authorized commodity, and a store logo.
5. The legal code generating method of claim 1, further comprising:
acquiring the authorization information and the commodity information related to the legal version code from the block chain according to the legal version code at a consumer purchasing the authorized commodity; and
and verifying whether the authorized commodity is an authorized legal commodity or not according to the acquired authorization information and the commodity information.
6. The legal code generating method of claim 5, further comprising:
at the consumer, binding user information of the consumer with the genuine codes, wherein each genuine code is configured to be bindable with user information of only one consumer; and
and when the binding fails, determining that the authorized goods have the piracy risk.
7. The copyright code generation method of claim 1, wherein the authorizer is an IP authorizer, and the authorization information includes information for IP authorization.
8. An original code generation method based on a block chain, which is executed by an authorized party, the original code generation method comprising:
after the authorizing party completes authorization on the authorized party, generating a legal code for indicating authorized commodities according to authorization information, wherein the legal code is associated with the authorization information and corresponds to the authorized commodities one by one; and
and linking the legal-copy code to a block chain, so that the authorized party acquires the legal-copy code from the block chain, associating the commodity information of the authorized commodity with the legal-copy code, and linking the associated legal-copy code to the block chain.
9. An authorized party performs an authorized code generation method based on a block chain, and the authorized code generation method comprises the following steps:
after an authorizer links a generated legal code for indicating an authorized commodity to a block chain, acquiring the legal code from the block chain, wherein the legal code is associated with authorization information authorized by the authorizer to the authorized party, and the legal code corresponds to the authorized commodity one to one;
associating the commodity information of the authorized commodity corresponding to the legal code with the legal code;
linking the associated forward code to the block chain,
and at the authorizer, after the authorizer authorizes the authorized party, generating the legal version code according to the authorization information, and uplink the legal version code to the block chain.
10. An authorized code generating device based on a block chain is applied to an authorized party, and comprises:
the authorized commodity authorization system comprises an authorized party authorization unit, an authorized code generation unit and an authorized commodity authorization unit, wherein the authorized party authorization unit is used for authorizing an authorized party to obtain authorized commodities; and
the first uplink unit is used for uplink of the legal version code to the block chain so that the authorized party can obtain the legal version code from the block chain, associate the commodity information of the authorized commodity with the legal version code, and uplink the associated legal version code to the block chain.
11. An authorized party's legal version code generating device based on block chain, the legal version code generating device includes:
the system comprises a legal code obtaining unit, a block chain obtaining unit and a block chain judging unit, wherein the legal code obtaining unit obtains the legal code from the block chain after the legal code which is generated by an authorizing party and used for indicating authorized commodities is linked to the block chain, the legal code is associated with authorization information which is authorized by the authorized party to the authorizing party, and the legal code corresponds to the authorized commodities one to one;
the information association unit is used for associating the commodity information of the authorized commodity corresponding to the legal-copy code with the legal-copy code;
a second uplink unit that uplink the associated scrambling code to the block chain,
and at the authorizer, after the authorizer authorizes the authorized party, generating the legal version code according to the authorization information, and uplink the legal version code to the block chain.
12. An electronic device, comprising: at least one processor, a memory coupled with the at least one processor, and a computer program stored on the memory, the at least one processor executing the computer program to implement the method of claim 8 or 9.
13. A computer-readable storage medium, in which a computer program is stored which, when being executed by a processor, carries out the method according to claim 8 or 9.
14. A computer program product comprising a computer program which, when executed by a processor, implements the method of claim 8 or 9.
CN202210951351.5A 2022-08-09 2022-08-09 Block chain-based legal version code generation method and legal version code generation device Pending CN115330413A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210951351.5A CN115330413A (en) 2022-08-09 2022-08-09 Block chain-based legal version code generation method and legal version code generation device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210951351.5A CN115330413A (en) 2022-08-09 2022-08-09 Block chain-based legal version code generation method and legal version code generation device

Publications (1)

Publication Number Publication Date
CN115330413A true CN115330413A (en) 2022-11-11

Family

ID=83922162

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210951351.5A Pending CN115330413A (en) 2022-08-09 2022-08-09 Block chain-based legal version code generation method and legal version code generation device

Country Status (1)

Country Link
CN (1) CN115330413A (en)

Similar Documents

Publication Publication Date Title
CN110620810B (en) Non-linked ownership of continuous asset transfer over blockchain
US11562375B2 (en) Blockchain-based data verification method, apparatus, and electronic device
CN109711858B (en) Method and system for preventing fraudulent gift cards via blockchain
US20200059362A1 (en) Methods and systems for enhancing privacy on distributed ledger-based networks
US20180063113A1 (en) Secure transaction systems and methods
US11764974B2 (en) Method and system for certification and authentication of objects
CN110582775A (en) Method for managing file based on block chain by using UTXO basic protocol and file management server using the same
CN109426868A (en) Life period of equipment distribution ledger
CN105096134A (en) Security scheme for authenticating digital entities and aggregate object origins
JP2020503579A (en) Blockchain-based method and system for specifying recipients of electronic communication
US11533166B2 (en) Method for controlling distribution of a product in a computer network and system
US11075766B1 (en) Method and system for certification and authentication of objects
CN109327312B (en) Authentication method and device and electronic equipment
KR20220115571A (en) Account holder financing for customer verification process through coin payment, renewal of accredited investor verification, and fee monitoring
CN111095863A (en) Block chain based system and method for communicating, storing and processing data over a block chain network
US20230259919A1 (en) Review engine verification with non-fungible authentication tokens
US20230100422A1 (en) Systems and Methods for Transaction Management in NFT-Directed Environments
CN115730277A (en) Supplemental digital content access control using non-homogeneous token NFT
Dash et al. Artificial intelligence models for blockchain-based intelligent networks systems: Concepts, methodologies, tools, and applications
US20210158372A1 (en) Secure management of ownership of physical objects
CN115131037A (en) Method and device for detecting commodity fleeing goods
US20230043223A1 (en) Methods for Securely Adding Data to a Blockchain Using Dynamic Time Quanta and Version Authentication
CN115131034A (en) Block chain-based rights and interests digital collection verification method and equipment
CN115330413A (en) Block chain-based legal version code generation method and legal version code generation device
CN115099800A (en) Block chain based method and device for transferring poor asset data

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination