CN108764944A - Verification method, device and computer readable storage medium - Google Patents

Verification method, device and computer readable storage medium Download PDF

Info

Publication number
CN108764944A
CN108764944A CN201810547517.0A CN201810547517A CN108764944A CN 108764944 A CN108764944 A CN 108764944A CN 201810547517 A CN201810547517 A CN 201810547517A CN 108764944 A CN108764944 A CN 108764944A
Authority
CN
China
Prior art keywords
block chain
cryptographic hash
file
verified
chain
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810547517.0A
Other languages
Chinese (zh)
Inventor
景明明
李宏旭
孙海波
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Jingdong Century Trading Co Ltd
Beijing Jingdong Shangke Information Technology Co Ltd
Original Assignee
Beijing Jingdong Century Trading Co Ltd
Beijing Jingdong Shangke Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Jingdong Century Trading Co Ltd, Beijing Jingdong Shangke Information Technology Co Ltd filed Critical Beijing Jingdong Century Trading Co Ltd
Priority to CN201810547517.0A priority Critical patent/CN108764944A/en
Publication of CN108764944A publication Critical patent/CN108764944A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0601Electronic shopping [e-shopping]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions

Abstract

This disclosure relates to which a kind of verification method, device and computer readable storage medium, are related to field of information security technology.This method includes:It obtains the block chain chain code in the file to be verified that client uploads and uploads data;Cryptographic Hash corresponding with block chain chain code is obtained from block chain as the first cryptographic Hash;Hash calculation the second cryptographic Hash of acquisition is carried out to uploading data;It is whether consistent with the second cryptographic Hash by comparing the first cryptographic Hash, verify whether file to be verified is tampered with.The technical solution of the disclosure can improve the reliability of Information Authentication.

Description

Verification method, device and computer readable storage medium
Technical field
This disclosure relates to field of information security technology, more particularly to a kind of verification method, verification device and computer-readable Storage medium.
Background technology
With the fast development of internet, net purchase has become the essential shopping approach of people.How net purchase is ensured The quality of commodity is increasingly paid close attention to by consumers in general.Therefore, many businessmans can announce commodity each production phase stream Turn trace to the source information of the situation as commodity, to confirm the authenticity and commercial quality of merchandise resources.But information of tracing to the source is mostly It is announced in the form of text plus picture, information tampering not only dull uninteresting but also that businessman can not be prevented, it is difficult to allow consumption Convince.
For the above situation, in the related art, the unique code of commodity mostly generated by businessman obtains the circulation of commodity Situation, to which whether the relevant information for verifying commodity is true.
Invention content
The inventor of the disclosure has found that above-mentioned there are the following problems in the related technology:Quilt is easy by unique code that businessman generates It distorts, causes verification result unreliable.In consideration of it, the present disclosure proposes a kind of verification technique scheme, can be carried out to information can By verification.
According to some embodiments of the present disclosure, a kind of verification method is provided, including:Obtain the to be verified of client upload Block chain chain code in file and upload data;Corresponding with block chain chain code cryptographic Hash is obtained from block chain as the One cryptographic Hash;Hash calculation is carried out to the upload data and obtains the second cryptographic Hash;By comparing first cryptographic Hash and institute It whether consistent states the second cryptographic Hash, verifies whether the file to be verified is tampered with.
Optionally, the file to be verified is generated by following steps:It is calculated by block chain and stores the Kazakhstan for uploading data Uncommon value;Generate block chain chain code corresponding with the cryptographic Hash;The upload data and the block chain chain code are bound to generate State file to be verified.
Optionally, include by the upload data and block chain chain code binding:To the upload data carry out shell adding processing with Shell adding file is generated, the block chain chain code is stored in the shell head of the shell adding file.
Optionally, solution shell processing is carried out to the file to be verified, block chain chain code is obtained from the shell head.
Optionally, the upload data be in each production link with the relevant multimedia messages of the article of production.
According to other embodiments of the disclosure, a kind of verification device is provided, including:Data capture unit, for obtaining Block chain chain code in the file to be verified that client uploads and upload data;Cryptographic Hash acquiring unit, for from block chain Cryptographic Hash corresponding with the block chain chain code is obtained as the first cryptographic Hash;Cryptographic Hash computing unit, for the upload Data carry out Hash calculation and obtain the second cryptographic Hash;Authentication unit, for by comparing first cryptographic Hash and described second Whether cryptographic Hash is consistent, verifies whether the file to be verified is tampered with.
Optionally, the file to be verified is generated by following steps:It is calculated by block chain and stores the Kazakhstan for uploading data Uncommon value;Generate block chain chain code corresponding with the cryptographic Hash;The upload data and the block chain chain code are bound to generate State file to be verified.
Optionally, the file to be verified is by carrying out shell adding file of the shell adding processing to generate, institute to uploading data It states and is stored with block chain chain code in the shell head of shell adding file.
Optionally, the data capture unit carries out solution shell processing to the file to be verified, is obtained from the shell head Take block chain chain code.
Optionally, the upload data be in each production link with the relevant multimedia messages of the article of production.
According to the other embodiment of the disclosure, a kind of verification device is provided, including:Memory;Be coupled to described deposit The processor of reservoir, the processor are configured as, based on the instruction being stored in the memory device, executing any of the above-described One or more of verification method in a embodiment step.
According to the still other embodiments of the disclosure, a kind of computer readable storage medium is provided, computer is stored thereon with Program, the program realize one or more of the verification method in any of the above-described a embodiment step when being executed by processor.
In the above-described embodiments, information is verified by block chain, the anti-tamper spy of block chain technology can be utilized The uniqueness of property and Hash calculation provides reliable basis for Information Authentication, to improve the reliability of Information Authentication.
Description of the drawings
The attached drawing of a part for constitution instruction describes embodiment of the disclosure, and is used to solve together with the description Release the principle of the disclosure.
The disclosure can be more clearly understood according to following detailed description with reference to attached drawing, wherein:
Fig. 1 shows the flow chart of some embodiments of the verification method of the disclosure;
Fig. 2 shows the flow charts of some embodiments of document generating method to be verified;
Fig. 3 shows the block diagram of some embodiments of the verification device of the disclosure;
Fig. 4 shows the block diagram of other embodiments of the verification device of the disclosure;
Fig. 5 shows the block diagram of the other embodiment of the verification device of the disclosure.
Specific implementation mode
The various exemplary embodiments of the disclosure are described in detail now with reference to attached drawing.It should be noted that:Unless in addition having Body illustrates that the unlimited system of component and the positioned opposite of step, numerical expression and the numerical value otherwise illustrated in these embodiments is originally Scope of disclosure.
Simultaneously, it should be appreciated that for ease of description, the size of attached various pieces shown in the drawings is not according to reality Proportionate relationship draw.
It is illustrative to the description only actually of at least one exemplary embodiment below, is never used as to the disclosure And its application or any restrictions that use.
Technology, method and apparatus known to person of ordinary skill in the relevant may be not discussed in detail, but suitable In the case of, the technology, method and apparatus should be considered as authorizing part of specification.
In shown here and discussion all examples, any occurrence should be construed as merely illustrative, without It is as limitation.Therefore, the other examples of exemplary embodiment can have different values.
It should be noted that:Similar label and letter indicate similar terms in following attached drawing, therefore, once a certain Xiang Yi It is defined, then it need not be further discussed in subsequent attached drawing in a attached drawing.
Fig. 1 shows the flow chart of some embodiments of the verification method of the disclosure.
As shown in Figure 1, this method includes:Step 110, it obtains block chain chain code and uploads data;Step 120, according to area Block chain chain code obtains the first cryptographic Hash;Step 130, the second cryptographic Hash for uploading data is calculated;Step 140, according to two Hash Value is verified.
In step 110, it obtains the block chain chain code in the file to be verified that client uploads and uploads data.For example, Upload data in file to be verified can be the information of tracing to the source of something product, and user can be by the article after having purchased the article Information of tracing to the source is uploaded to block chain to verify the authenticity of the information of tracing to the source.
In some embodiments, it can be the multimedia messages acquired in each production link of the article to upload data. Multimedia messages can be the video acquired by multimedia terminals such as mobile phone, computer, cameras, audio, picture, text, inspection Observe and predict announcement, contract information etc..These multimedia messages can provide specific, intuitive article production information to the user, to increase The trusting degree that strong user produces article improves the desire that user buys once again.
In some embodiments, the information of tracing to the source of article can be uploaded to block chain by businessman in advance, so that user is purchasing It has bought and the information of tracing to the source of acquisition is compared verification with the information of tracing to the source being stored in block chain after the article.It is stored in block Information in chain can not be changed arbitrarily, therefore can ensure the reliability of verification.
Block chain can generate and store cryptographic Hash according to the information of tracing to the source that businessman uploads, and then generate corresponding block chain Chain code is used to indicate storage condition of the cryptographic Hash in block chain.It can be found and be traced back in block chain according to block chain chain code The corresponding cryptographic Hash of source information, therefore, the information that can will trace to the source and block chain code form file to be verified and are handed down to each client, It is verified so that user is uploaded to block chain after having purchased article by client.For example, the step in Fig. 2 can be passed through Generate file to be verified.
Fig. 2 shows the flow charts of some embodiments of document generating method to be verified.
As shown in Fig. 2, this method includes:Step 210, it calculates and stores cryptographic Hash;Step 220, block chain chain code is generated; Step 230, file to be verified is generated.
In step 210, it is calculated by block chain and stores the cryptographic Hash for uploading data.For example, businessman's tracing back acquisition Source information is uploaded to the storage of block chain, and block chain obtains the cryptographic Hash of the information of tracing to the source by Hash calculation.
In a step 220, block chain chain code corresponding with the cryptographic Hash is generated.For example, block chain is in storage cryptographic Hash The corresponding globally unique block chain chain codes of Shi Shengcheng.
In step 230, data and the binding of block chain chain code will be uploaded to generate file to be verified.For example, can be to upper It passes data and carries out shell adding processing to generate shell adding file, block chain chain code is stored in the shell head of shell adding file.Shell adding file The use of data and program in file is not influenced while realizing file encryption.Therefore, although after user's acquisition shell adding file It cannot be modified, but still can use the multi-medium data in shell adding file, to improve the reliable of data Property.
In some embodiments, the file to be verified of generation can be handed down to each client by block chain.User is purchasing Corresponding file to be verified can be obtained later by having bought article, by the way that the file to be verified is uploaded block chain, can verify it The authenticity of middle data.For example, can be verified by the step 120-140 in Fig. 1.
In the step 120, cryptographic Hash corresponding with block chain chain code is obtained from block chain as the first cryptographic Hash.Example Such as, solution shell processing can be carried out to file to be verified, block chain chain code is obtained from shell head, and the is obtained according to block chain chain code One cryptographic Hash.First cryptographic Hash is that businessman is previously stored in block chain.Block chain have technology disclose, in many ways endorsement, The data of the characteristics of can not distorting, deposit block chain can not be changed.Therefore, the first cryptographic Hash can be used as verification user to upload number According to the reliable basis of authenticity.
In step 130, Hash calculation the second cryptographic Hash of acquisition is carried out to uploading data.For example, block chain can pass through Hash operation calculates the cryptographic Hash for uploading data automatically.What the second cryptographic Hash represented is the data that user obtains, such as by a variety of The information of tracing to the source of the article of media data composition.
In step 140, whether consistent with the second cryptographic Hash by comparing the first cryptographic Hash, whether verify file to be verified It is tampered with.The data that user obtains are compared with the data that block chain stores, the data of user's acquisition can be verified Authenticity.
In above-described embodiment, information is verified by block chain, the anti-tamper characteristic of block chain technology can be utilized Reliable basis is provided for Information Authentication with the uniqueness of Hash calculation, to improve the reliability of Information Authentication.
Fig. 3 shows the block diagram of some embodiments of the verification device of the disclosure.
As shown in figure 3, verification device 3 includes data capture unit 31, cryptographic Hash acquiring unit 32, cryptographic Hash computing unit 33 and authentication unit 34.
Data capture unit 31 obtains the block chain chain code in the file to be verified that client uploads and uploads data.Example Such as, upload data can be in each production link with the relevant multimedia messages of the article of production.
In some embodiments, file to be verified is generated by following steps:It is calculated by block chain and stores upload data Cryptographic Hash;Generate block chain chain code corresponding with cryptographic Hash;Data will be uploaded and block chain chain code binding is waited for generating Verify file.
For example, can be by being used as file to be verified, shell adding text to uploading data progress shell adding processing generation shell adding file Block chain chain code is stored in the shell head of part.Data capture unit 31 can carry out file to be verified solution shell processing, from shell Block chain chain code is obtained in head.
Cryptographic Hash acquiring unit 32 obtains cryptographic Hash corresponding with block chain chain code as the first cryptographic Hash from block chain. Cryptographic Hash computing unit 33 carries out Hash calculation the second cryptographic Hash of acquisition to uploading data.Authentication unit 34 is breathed out by comparing first Whether uncommon value is consistent with second cryptographic Hash, verifies whether the file to be verified is tampered with.
In above-described embodiment, information is verified by block chain, the anti-tamper characteristic of block chain technology can be utilized Reliable basis is provided for Information Authentication with the uniqueness of Hash calculation, to improve the reliability of Information Authentication.
Fig. 4 shows the block diagram of other embodiments of the verification device of the disclosure.
As shown in figure 4, the device 4 of the embodiment includes:Memory 41 and the processor 42 for being coupled to the memory 41, Processor 42 is configured as, based on the instruction being stored in memory 41, executing the verification in any one embodiment in the disclosure One or more of method step.
Wherein, memory 41 is such as may include system storage, fixed non-volatile memory medium.System storage Such as be stored with operating system, application program, Boot loader (Boot Loader), database and other programs etc..
Fig. 5 shows the block diagram of the other embodiment of the verification device of the disclosure.
As shown in figure 5, in verifying device 5, processor 520 is coupled to memory 510 by BUS buses 530.Verification dress External memory 550 can also be connected to call external data by memory interface 560 by setting 5, can also pass through network Interface 560 is connected to network or an other computer system (not shown).It no longer describes in detail herein.
In some embodiments, data command is stored by memory 510, then above-metioned instruction is handled by processor 520, It can realize the verification method of aforementioned any embodiment.
Those skilled in the art should be understood that embodiment of the disclosure can be provided as method, system or computer journey Sequence product.Therefore, complete hardware embodiment, complete software embodiment or combining software and hardware aspects can be used in the disclosure The form of embodiment.Moreover, the disclosure can be used in one or more wherein include computer usable program code calculating Machine can use the meter implemented on non-transient storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) The form of calculation machine program product.
So far, the verification method according to the disclosure, verification device and computer readable storage medium is described in detail. In order to avoid covering the design of the disclosure, some details known in the field are not described.Those skilled in the art are according to upper The description in face, completely it can be appreciated how implementing technical solution disclosed herein.
Disclosed method and system may be achieved in many ways.For example, can by software, hardware, firmware or Software, hardware, firmware any combinations realize disclosed method and system.The said sequence of the step of for the method Merely to illustrate, the step of disclosed method, is not limited to sequence described in detail above, special unless otherwise It does not mentionlet alone bright.In addition, in some embodiments, also the disclosure can be embodied as to record program in the recording medium, these programs Include for realizing according to the machine readable instructions of disclosed method.Thus, the disclosure also covers storage for executing basis The recording medium of the program of disclosed method.
Although some specific embodiments of the disclosure are described in detail by example, the skill of this field Art personnel it should be understood that above example merely to illustrate, rather than in order to limit the scope of the present disclosure.The skill of this field Art personnel are it should be understood that can modify to above example in the case where not departing from the scope of the present disclosure and spirit.This public affairs The range opened is defined by the following claims.

Claims (12)

1. a kind of verification method, including:
It obtains the block chain chain code in the file to be verified that client uploads and uploads data;
Cryptographic Hash corresponding with the block chain chain code is obtained from block chain as the first cryptographic Hash;
Hash calculation is carried out to the upload data and obtains the second cryptographic Hash;
It is whether consistent by comparing first cryptographic Hash and second cryptographic Hash, verify whether the file to be verified is usurped It corrects one's mistakes.
2. verification method according to claim 1, wherein the file to be verified is generated by following steps:
It is calculated by block chain and stores the cryptographic Hash for uploading data;
Generate block chain chain code corresponding with the cryptographic Hash;
The upload data and the block chain chain code are bound to generate the file to be verified.
3. verification method according to claim 2, wherein include by the upload data and block chain chain code binding:
Shell adding processing is carried out to generate shell adding file to the upload data, the block is stored in the shell head of the shell adding file Chain chain code.
4. verification method according to claim 3, wherein obtaining block chain chain code includes:
Solution shell processing is carried out to the file to be verified, block chain chain code is obtained from the shell head.
5. according to claim 1-4 any one of them verification methods, wherein
The upload data be in each production link with the relevant multimedia messages of the article of production.
6. a kind of verification device, including:
Data capture unit, the block chain chain code and upload data in file to be verified for obtaining client upload;
Cryptographic Hash acquiring unit, for obtaining cryptographic Hash corresponding with the block chain chain code from block chain as the first Hash Value;
Cryptographic Hash computing unit obtains the second cryptographic Hash for carrying out Hash calculation to the upload data;
Authentication unit, whether for consistent by comparing first cryptographic Hash and second cryptographic Hash, verification is described to be tested Whether card file is tampered with.
7. verification device according to claim 6, wherein the file to be verified is generated by following steps:
It is calculated by block chain and stores the cryptographic Hash for uploading data;
Generate block chain chain code corresponding with the cryptographic Hash;
The upload data and the block chain chain code are bound to generate the file to be verified.
8. verification device according to claim 7, wherein
The file to be verified is to handle shell adding file to generate by carrying out shell adding to uploading data, the shell adding file Block chain chain code is stored in shell head.
9. verification device according to claim 8, wherein
The data capture unit carries out solution shell processing to the file to be verified, and block chain chain is obtained from the shell head Code.
10. verifying device according to claim 6-9 any one of them, wherein
The upload data be in each production link with the relevant multimedia messages of the article of production.
11. a kind of verification device, including:
Memory;With
It is coupled to the processor of the memory, the processor is configured as based on the finger being stored in the memory device It enables, perform claim requires one or more of 1-5 any one of them verification methods step.
12. a kind of computer readable storage medium, is stored thereon with computer program, power is realized when which is executed by processor Profit requires one or more of 1-5 any one of them verification methods step.
CN201810547517.0A 2018-05-31 2018-05-31 Verification method, device and computer readable storage medium Pending CN108764944A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810547517.0A CN108764944A (en) 2018-05-31 2018-05-31 Verification method, device and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810547517.0A CN108764944A (en) 2018-05-31 2018-05-31 Verification method, device and computer readable storage medium

Publications (1)

Publication Number Publication Date
CN108764944A true CN108764944A (en) 2018-11-06

Family

ID=64000879

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810547517.0A Pending CN108764944A (en) 2018-05-31 2018-05-31 Verification method, device and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN108764944A (en)

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109583219A (en) * 2018-11-30 2019-04-05 国家电网有限公司 A kind of data signature, encryption and preservation method, apparatus and equipment
CN109729074A (en) * 2018-12-11 2019-05-07 深圳市汇星数字技术有限公司 A kind of encryption of audio data and reciprocity storage method and system
CN109871709A (en) * 2018-12-20 2019-06-11 顺丰科技有限公司 Block chain private data deposits card method, system and storage medium
CN110427346A (en) * 2019-08-13 2019-11-08 河南中盾云安信息科技有限公司 A kind of document storage system and its file memory method based on block chain
CN110598478A (en) * 2019-09-19 2019-12-20 腾讯科技(深圳)有限公司 Block chain based evidence verification method, device, equipment and storage medium
CN110889264A (en) * 2019-11-11 2020-03-17 腾讯科技(深圳)有限公司 Multimedia information processing method, device, equipment and storage medium
CN111382463A (en) * 2020-04-02 2020-07-07 中国工商银行股份有限公司 Block chain system and method based on stream data
CN111553450A (en) * 2020-04-27 2020-08-18 中国银行股份有限公司 Two-dimensional code generation and verification method and device
CN112148789A (en) * 2020-09-03 2020-12-29 京东数字科技控股股份有限公司 Processing method and system for controlling multimedia playing
CN112713996A (en) * 2020-12-15 2021-04-27 中国联合网络通信集团有限公司 Fault verification method based on block chain, server and terminal
CN112950416A (en) * 2021-03-11 2021-06-11 全链通有限公司 Block chain-based electronic evidence processing method and device and readable medium
CN112966306A (en) * 2021-04-02 2021-06-15 西安慧博文定信息技术有限公司 Processing method and device for blind verification file

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106548092A (en) * 2016-10-31 2017-03-29 杭州嘉楠耘智信息科技有限公司 File processing method and device
CN106779737A (en) * 2016-11-30 2017-05-31 电子科技大学 Product based on block chain technology is traced to the source verification method
CN107077557A (en) * 2016-12-29 2017-08-18 深圳前海达闼云端智能科技有限公司 The method and device that software application is issued and verified
CN107657449A (en) * 2016-07-25 2018-02-02 蓝树荣 A kind of variation verification method of Chinese coin Transaction Information on block chain

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107657449A (en) * 2016-07-25 2018-02-02 蓝树荣 A kind of variation verification method of Chinese coin Transaction Information on block chain
CN106548092A (en) * 2016-10-31 2017-03-29 杭州嘉楠耘智信息科技有限公司 File processing method and device
CN106779737A (en) * 2016-11-30 2017-05-31 电子科技大学 Product based on block chain technology is traced to the source verification method
CN107077557A (en) * 2016-12-29 2017-08-18 深圳前海达闼云端智能科技有限公司 The method and device that software application is issued and verified

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109583219A (en) * 2018-11-30 2019-04-05 国家电网有限公司 A kind of data signature, encryption and preservation method, apparatus and equipment
CN109729074A (en) * 2018-12-11 2019-05-07 深圳市汇星数字技术有限公司 A kind of encryption of audio data and reciprocity storage method and system
CN109729074B (en) * 2018-12-11 2021-10-01 深圳市汇星数字技术有限公司 Audio data encryption and peer-to-peer storage method and system
CN109871709A (en) * 2018-12-20 2019-06-11 顺丰科技有限公司 Block chain private data deposits card method, system and storage medium
CN110427346A (en) * 2019-08-13 2019-11-08 河南中盾云安信息科技有限公司 A kind of document storage system and its file memory method based on block chain
CN110598478A (en) * 2019-09-19 2019-12-20 腾讯科技(深圳)有限公司 Block chain based evidence verification method, device, equipment and storage medium
CN110889264B (en) * 2019-11-11 2021-06-22 腾讯科技(深圳)有限公司 Multimedia information processing method, device, equipment and storage medium
CN110889264A (en) * 2019-11-11 2020-03-17 腾讯科技(深圳)有限公司 Multimedia information processing method, device, equipment and storage medium
CN111382463A (en) * 2020-04-02 2020-07-07 中国工商银行股份有限公司 Block chain system and method based on stream data
CN111553450A (en) * 2020-04-27 2020-08-18 中国银行股份有限公司 Two-dimensional code generation and verification method and device
CN111553450B (en) * 2020-04-27 2023-04-18 中国银行股份有限公司 Two-dimensional code generation and verification method and device
CN112148789A (en) * 2020-09-03 2020-12-29 京东数字科技控股股份有限公司 Processing method and system for controlling multimedia playing
CN112713996A (en) * 2020-12-15 2021-04-27 中国联合网络通信集团有限公司 Fault verification method based on block chain, server and terminal
CN112713996B (en) * 2020-12-15 2023-05-12 中国联合网络通信集团有限公司 Block chain-based fault verification method, server and terminal
CN112950416A (en) * 2021-03-11 2021-06-11 全链通有限公司 Block chain-based electronic evidence processing method and device and readable medium
CN112950416B (en) * 2021-03-11 2023-11-17 全链通有限公司 Electronic evidence processing method and device based on blockchain and readable medium
CN112966306A (en) * 2021-04-02 2021-06-15 西安慧博文定信息技术有限公司 Processing method and device for blind verification file

Similar Documents

Publication Publication Date Title
CN108764944A (en) Verification method, device and computer readable storage medium
US20200294293A1 (en) Persistent augmented reality objects
US20230070389A1 (en) System and method for creating nft from physical asset and validating authenticity of nft associated asset
KR20160010554A (en) Systems and methods for emv chip and pin payments
CN107508826A (en) Authentication method, device, VR terminals and VR service ends based on VR scenes
US10929526B2 (en) User interface for tee execution of a device
CN114676799A (en) Service processing method and device
KR20200065307A (en) Method and system for providing smart letter of guarantee based on block chain
CN111967062A (en) Data processing system, method and device based on block chain
WO2023122286A1 (en) Blockchain bridge systems, methods, and storage media for trading non‑fungible token
JP2019509571A (en) Public information processing method and device, and information disclosure system
JP2015531518A (en) Method and apparatus for processing electronic transaction information
US20230334472A1 (en) Automatically pairing physical assets to a non-fungible token or digital asset
US8904508B2 (en) System and method for real time secure image based key generation using partial polygons assembled into a master composite image
CN111386543A (en) Secure transactions using augmented reality
Esteban Web engineering and e-commerce: Bridging technology and business in the Philippines
CN105719079B (en) Information generation method and device
WO2018230185A1 (en) Information processing device and information processing system
CN105701402B (en) A kind of method and apparatus that monitoring and displaying is kidnapped
US20230224166A1 (en) Systems and Methods for Associating Digital Media Files with External Commodities
US20230319373A1 (en) Non-Fungible Token Minting in a Metaverse Environment
WO2024070028A1 (en) Server device and program
US20230107705A1 (en) Coordination and Management of Digital Asset Endorsements
US20240095332A1 (en) Methods and systems for acoustic authentication
US20210258144A1 (en) Systems and methods for marking and authenticating scarce items

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20181106