CN108764944A - Verification method, device and computer readable storage medium - Google Patents
Verification method, device and computer readable storage medium Download PDFInfo
- Publication number
- CN108764944A CN108764944A CN201810547517.0A CN201810547517A CN108764944A CN 108764944 A CN108764944 A CN 108764944A CN 201810547517 A CN201810547517 A CN 201810547517A CN 108764944 A CN108764944 A CN 108764944A
- Authority
- CN
- China
- Prior art keywords
- block chain
- cryptographic hash
- file
- verified
- chain
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/018—Certifying business or products
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/06—Buying, selling or leasing transactions
- G06Q30/0601—Electronic shopping [e-shopping]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
Abstract
This disclosure relates to which a kind of verification method, device and computer readable storage medium, are related to field of information security technology.This method includes:It obtains the block chain chain code in the file to be verified that client uploads and uploads data;Cryptographic Hash corresponding with block chain chain code is obtained from block chain as the first cryptographic Hash;Hash calculation the second cryptographic Hash of acquisition is carried out to uploading data;It is whether consistent with the second cryptographic Hash by comparing the first cryptographic Hash, verify whether file to be verified is tampered with.The technical solution of the disclosure can improve the reliability of Information Authentication.
Description
Technical field
This disclosure relates to field of information security technology, more particularly to a kind of verification method, verification device and computer-readable
Storage medium.
Background technology
With the fast development of internet, net purchase has become the essential shopping approach of people.How net purchase is ensured
The quality of commodity is increasingly paid close attention to by consumers in general.Therefore, many businessmans can announce commodity each production phase stream
Turn trace to the source information of the situation as commodity, to confirm the authenticity and commercial quality of merchandise resources.But information of tracing to the source is mostly
It is announced in the form of text plus picture, information tampering not only dull uninteresting but also that businessman can not be prevented, it is difficult to allow consumption
Convince.
For the above situation, in the related art, the unique code of commodity mostly generated by businessman obtains the circulation of commodity
Situation, to which whether the relevant information for verifying commodity is true.
Invention content
The inventor of the disclosure has found that above-mentioned there are the following problems in the related technology:Quilt is easy by unique code that businessman generates
It distorts, causes verification result unreliable.In consideration of it, the present disclosure proposes a kind of verification technique scheme, can be carried out to information can
By verification.
According to some embodiments of the present disclosure, a kind of verification method is provided, including:Obtain the to be verified of client upload
Block chain chain code in file and upload data;Corresponding with block chain chain code cryptographic Hash is obtained from block chain as the
One cryptographic Hash;Hash calculation is carried out to the upload data and obtains the second cryptographic Hash;By comparing first cryptographic Hash and institute
It whether consistent states the second cryptographic Hash, verifies whether the file to be verified is tampered with.
Optionally, the file to be verified is generated by following steps:It is calculated by block chain and stores the Kazakhstan for uploading data
Uncommon value;Generate block chain chain code corresponding with the cryptographic Hash;The upload data and the block chain chain code are bound to generate
State file to be verified.
Optionally, include by the upload data and block chain chain code binding:To the upload data carry out shell adding processing with
Shell adding file is generated, the block chain chain code is stored in the shell head of the shell adding file.
Optionally, solution shell processing is carried out to the file to be verified, block chain chain code is obtained from the shell head.
Optionally, the upload data be in each production link with the relevant multimedia messages of the article of production.
According to other embodiments of the disclosure, a kind of verification device is provided, including:Data capture unit, for obtaining
Block chain chain code in the file to be verified that client uploads and upload data;Cryptographic Hash acquiring unit, for from block chain
Cryptographic Hash corresponding with the block chain chain code is obtained as the first cryptographic Hash;Cryptographic Hash computing unit, for the upload
Data carry out Hash calculation and obtain the second cryptographic Hash;Authentication unit, for by comparing first cryptographic Hash and described second
Whether cryptographic Hash is consistent, verifies whether the file to be verified is tampered with.
Optionally, the file to be verified is generated by following steps:It is calculated by block chain and stores the Kazakhstan for uploading data
Uncommon value;Generate block chain chain code corresponding with the cryptographic Hash;The upload data and the block chain chain code are bound to generate
State file to be verified.
Optionally, the file to be verified is by carrying out shell adding file of the shell adding processing to generate, institute to uploading data
It states and is stored with block chain chain code in the shell head of shell adding file.
Optionally, the data capture unit carries out solution shell processing to the file to be verified, is obtained from the shell head
Take block chain chain code.
Optionally, the upload data be in each production link with the relevant multimedia messages of the article of production.
According to the other embodiment of the disclosure, a kind of verification device is provided, including:Memory;Be coupled to described deposit
The processor of reservoir, the processor are configured as, based on the instruction being stored in the memory device, executing any of the above-described
One or more of verification method in a embodiment step.
According to the still other embodiments of the disclosure, a kind of computer readable storage medium is provided, computer is stored thereon with
Program, the program realize one or more of the verification method in any of the above-described a embodiment step when being executed by processor.
In the above-described embodiments, information is verified by block chain, the anti-tamper spy of block chain technology can be utilized
The uniqueness of property and Hash calculation provides reliable basis for Information Authentication, to improve the reliability of Information Authentication.
Description of the drawings
The attached drawing of a part for constitution instruction describes embodiment of the disclosure, and is used to solve together with the description
Release the principle of the disclosure.
The disclosure can be more clearly understood according to following detailed description with reference to attached drawing, wherein:
Fig. 1 shows the flow chart of some embodiments of the verification method of the disclosure;
Fig. 2 shows the flow charts of some embodiments of document generating method to be verified;
Fig. 3 shows the block diagram of some embodiments of the verification device of the disclosure;
Fig. 4 shows the block diagram of other embodiments of the verification device of the disclosure;
Fig. 5 shows the block diagram of the other embodiment of the verification device of the disclosure.
Specific implementation mode
The various exemplary embodiments of the disclosure are described in detail now with reference to attached drawing.It should be noted that:Unless in addition having
Body illustrates that the unlimited system of component and the positioned opposite of step, numerical expression and the numerical value otherwise illustrated in these embodiments is originally
Scope of disclosure.
Simultaneously, it should be appreciated that for ease of description, the size of attached various pieces shown in the drawings is not according to reality
Proportionate relationship draw.
It is illustrative to the description only actually of at least one exemplary embodiment below, is never used as to the disclosure
And its application or any restrictions that use.
Technology, method and apparatus known to person of ordinary skill in the relevant may be not discussed in detail, but suitable
In the case of, the technology, method and apparatus should be considered as authorizing part of specification.
In shown here and discussion all examples, any occurrence should be construed as merely illustrative, without
It is as limitation.Therefore, the other examples of exemplary embodiment can have different values.
It should be noted that:Similar label and letter indicate similar terms in following attached drawing, therefore, once a certain Xiang Yi
It is defined, then it need not be further discussed in subsequent attached drawing in a attached drawing.
Fig. 1 shows the flow chart of some embodiments of the verification method of the disclosure.
As shown in Figure 1, this method includes:Step 110, it obtains block chain chain code and uploads data;Step 120, according to area
Block chain chain code obtains the first cryptographic Hash;Step 130, the second cryptographic Hash for uploading data is calculated;Step 140, according to two Hash
Value is verified.
In step 110, it obtains the block chain chain code in the file to be verified that client uploads and uploads data.For example,
Upload data in file to be verified can be the information of tracing to the source of something product, and user can be by the article after having purchased the article
Information of tracing to the source is uploaded to block chain to verify the authenticity of the information of tracing to the source.
In some embodiments, it can be the multimedia messages acquired in each production link of the article to upload data.
Multimedia messages can be the video acquired by multimedia terminals such as mobile phone, computer, cameras, audio, picture, text, inspection
Observe and predict announcement, contract information etc..These multimedia messages can provide specific, intuitive article production information to the user, to increase
The trusting degree that strong user produces article improves the desire that user buys once again.
In some embodiments, the information of tracing to the source of article can be uploaded to block chain by businessman in advance, so that user is purchasing
It has bought and the information of tracing to the source of acquisition is compared verification with the information of tracing to the source being stored in block chain after the article.It is stored in block
Information in chain can not be changed arbitrarily, therefore can ensure the reliability of verification.
Block chain can generate and store cryptographic Hash according to the information of tracing to the source that businessman uploads, and then generate corresponding block chain
Chain code is used to indicate storage condition of the cryptographic Hash in block chain.It can be found and be traced back in block chain according to block chain chain code
The corresponding cryptographic Hash of source information, therefore, the information that can will trace to the source and block chain code form file to be verified and are handed down to each client,
It is verified so that user is uploaded to block chain after having purchased article by client.For example, the step in Fig. 2 can be passed through
Generate file to be verified.
Fig. 2 shows the flow charts of some embodiments of document generating method to be verified.
As shown in Fig. 2, this method includes:Step 210, it calculates and stores cryptographic Hash;Step 220, block chain chain code is generated;
Step 230, file to be verified is generated.
In step 210, it is calculated by block chain and stores the cryptographic Hash for uploading data.For example, businessman's tracing back acquisition
Source information is uploaded to the storage of block chain, and block chain obtains the cryptographic Hash of the information of tracing to the source by Hash calculation.
In a step 220, block chain chain code corresponding with the cryptographic Hash is generated.For example, block chain is in storage cryptographic Hash
The corresponding globally unique block chain chain codes of Shi Shengcheng.
In step 230, data and the binding of block chain chain code will be uploaded to generate file to be verified.For example, can be to upper
It passes data and carries out shell adding processing to generate shell adding file, block chain chain code is stored in the shell head of shell adding file.Shell adding file
The use of data and program in file is not influenced while realizing file encryption.Therefore, although after user's acquisition shell adding file
It cannot be modified, but still can use the multi-medium data in shell adding file, to improve the reliable of data
Property.
In some embodiments, the file to be verified of generation can be handed down to each client by block chain.User is purchasing
Corresponding file to be verified can be obtained later by having bought article, by the way that the file to be verified is uploaded block chain, can verify it
The authenticity of middle data.For example, can be verified by the step 120-140 in Fig. 1.
In the step 120, cryptographic Hash corresponding with block chain chain code is obtained from block chain as the first cryptographic Hash.Example
Such as, solution shell processing can be carried out to file to be verified, block chain chain code is obtained from shell head, and the is obtained according to block chain chain code
One cryptographic Hash.First cryptographic Hash is that businessman is previously stored in block chain.Block chain have technology disclose, in many ways endorsement,
The data of the characteristics of can not distorting, deposit block chain can not be changed.Therefore, the first cryptographic Hash can be used as verification user to upload number
According to the reliable basis of authenticity.
In step 130, Hash calculation the second cryptographic Hash of acquisition is carried out to uploading data.For example, block chain can pass through
Hash operation calculates the cryptographic Hash for uploading data automatically.What the second cryptographic Hash represented is the data that user obtains, such as by a variety of
The information of tracing to the source of the article of media data composition.
In step 140, whether consistent with the second cryptographic Hash by comparing the first cryptographic Hash, whether verify file to be verified
It is tampered with.The data that user obtains are compared with the data that block chain stores, the data of user's acquisition can be verified
Authenticity.
In above-described embodiment, information is verified by block chain, the anti-tamper characteristic of block chain technology can be utilized
Reliable basis is provided for Information Authentication with the uniqueness of Hash calculation, to improve the reliability of Information Authentication.
Fig. 3 shows the block diagram of some embodiments of the verification device of the disclosure.
As shown in figure 3, verification device 3 includes data capture unit 31, cryptographic Hash acquiring unit 32, cryptographic Hash computing unit
33 and authentication unit 34.
Data capture unit 31 obtains the block chain chain code in the file to be verified that client uploads and uploads data.Example
Such as, upload data can be in each production link with the relevant multimedia messages of the article of production.
In some embodiments, file to be verified is generated by following steps:It is calculated by block chain and stores upload data
Cryptographic Hash;Generate block chain chain code corresponding with cryptographic Hash;Data will be uploaded and block chain chain code binding is waited for generating
Verify file.
For example, can be by being used as file to be verified, shell adding text to uploading data progress shell adding processing generation shell adding file
Block chain chain code is stored in the shell head of part.Data capture unit 31 can carry out file to be verified solution shell processing, from shell
Block chain chain code is obtained in head.
Cryptographic Hash acquiring unit 32 obtains cryptographic Hash corresponding with block chain chain code as the first cryptographic Hash from block chain.
Cryptographic Hash computing unit 33 carries out Hash calculation the second cryptographic Hash of acquisition to uploading data.Authentication unit 34 is breathed out by comparing first
Whether uncommon value is consistent with second cryptographic Hash, verifies whether the file to be verified is tampered with.
In above-described embodiment, information is verified by block chain, the anti-tamper characteristic of block chain technology can be utilized
Reliable basis is provided for Information Authentication with the uniqueness of Hash calculation, to improve the reliability of Information Authentication.
Fig. 4 shows the block diagram of other embodiments of the verification device of the disclosure.
As shown in figure 4, the device 4 of the embodiment includes:Memory 41 and the processor 42 for being coupled to the memory 41,
Processor 42 is configured as, based on the instruction being stored in memory 41, executing the verification in any one embodiment in the disclosure
One or more of method step.
Wherein, memory 41 is such as may include system storage, fixed non-volatile memory medium.System storage
Such as be stored with operating system, application program, Boot loader (Boot Loader), database and other programs etc..
Fig. 5 shows the block diagram of the other embodiment of the verification device of the disclosure.
As shown in figure 5, in verifying device 5, processor 520 is coupled to memory 510 by BUS buses 530.Verification dress
External memory 550 can also be connected to call external data by memory interface 560 by setting 5, can also pass through network
Interface 560 is connected to network or an other computer system (not shown).It no longer describes in detail herein.
In some embodiments, data command is stored by memory 510, then above-metioned instruction is handled by processor 520,
It can realize the verification method of aforementioned any embodiment.
Those skilled in the art should be understood that embodiment of the disclosure can be provided as method, system or computer journey
Sequence product.Therefore, complete hardware embodiment, complete software embodiment or combining software and hardware aspects can be used in the disclosure
The form of embodiment.Moreover, the disclosure can be used in one or more wherein include computer usable program code calculating
Machine can use the meter implemented on non-transient storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.)
The form of calculation machine program product.
So far, the verification method according to the disclosure, verification device and computer readable storage medium is described in detail.
In order to avoid covering the design of the disclosure, some details known in the field are not described.Those skilled in the art are according to upper
The description in face, completely it can be appreciated how implementing technical solution disclosed herein.
Disclosed method and system may be achieved in many ways.For example, can by software, hardware, firmware or
Software, hardware, firmware any combinations realize disclosed method and system.The said sequence of the step of for the method
Merely to illustrate, the step of disclosed method, is not limited to sequence described in detail above, special unless otherwise
It does not mentionlet alone bright.In addition, in some embodiments, also the disclosure can be embodied as to record program in the recording medium, these programs
Include for realizing according to the machine readable instructions of disclosed method.Thus, the disclosure also covers storage for executing basis
The recording medium of the program of disclosed method.
Although some specific embodiments of the disclosure are described in detail by example, the skill of this field
Art personnel it should be understood that above example merely to illustrate, rather than in order to limit the scope of the present disclosure.The skill of this field
Art personnel are it should be understood that can modify to above example in the case where not departing from the scope of the present disclosure and spirit.This public affairs
The range opened is defined by the following claims.
Claims (12)
1. a kind of verification method, including:
It obtains the block chain chain code in the file to be verified that client uploads and uploads data;
Cryptographic Hash corresponding with the block chain chain code is obtained from block chain as the first cryptographic Hash;
Hash calculation is carried out to the upload data and obtains the second cryptographic Hash;
It is whether consistent by comparing first cryptographic Hash and second cryptographic Hash, verify whether the file to be verified is usurped
It corrects one's mistakes.
2. verification method according to claim 1, wherein the file to be verified is generated by following steps:
It is calculated by block chain and stores the cryptographic Hash for uploading data;
Generate block chain chain code corresponding with the cryptographic Hash;
The upload data and the block chain chain code are bound to generate the file to be verified.
3. verification method according to claim 2, wherein include by the upload data and block chain chain code binding:
Shell adding processing is carried out to generate shell adding file to the upload data, the block is stored in the shell head of the shell adding file
Chain chain code.
4. verification method according to claim 3, wherein obtaining block chain chain code includes:
Solution shell processing is carried out to the file to be verified, block chain chain code is obtained from the shell head.
5. according to claim 1-4 any one of them verification methods, wherein
The upload data be in each production link with the relevant multimedia messages of the article of production.
6. a kind of verification device, including:
Data capture unit, the block chain chain code and upload data in file to be verified for obtaining client upload;
Cryptographic Hash acquiring unit, for obtaining cryptographic Hash corresponding with the block chain chain code from block chain as the first Hash
Value;
Cryptographic Hash computing unit obtains the second cryptographic Hash for carrying out Hash calculation to the upload data;
Authentication unit, whether for consistent by comparing first cryptographic Hash and second cryptographic Hash, verification is described to be tested
Whether card file is tampered with.
7. verification device according to claim 6, wherein the file to be verified is generated by following steps:
It is calculated by block chain and stores the cryptographic Hash for uploading data;
Generate block chain chain code corresponding with the cryptographic Hash;
The upload data and the block chain chain code are bound to generate the file to be verified.
8. verification device according to claim 7, wherein
The file to be verified is to handle shell adding file to generate by carrying out shell adding to uploading data, the shell adding file
Block chain chain code is stored in shell head.
9. verification device according to claim 8, wherein
The data capture unit carries out solution shell processing to the file to be verified, and block chain chain is obtained from the shell head
Code.
10. verifying device according to claim 6-9 any one of them, wherein
The upload data be in each production link with the relevant multimedia messages of the article of production.
11. a kind of verification device, including:
Memory;With
It is coupled to the processor of the memory, the processor is configured as based on the finger being stored in the memory device
It enables, perform claim requires one or more of 1-5 any one of them verification methods step.
12. a kind of computer readable storage medium, is stored thereon with computer program, power is realized when which is executed by processor
Profit requires one or more of 1-5 any one of them verification methods step.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810547517.0A CN108764944A (en) | 2018-05-31 | 2018-05-31 | Verification method, device and computer readable storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810547517.0A CN108764944A (en) | 2018-05-31 | 2018-05-31 | Verification method, device and computer readable storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108764944A true CN108764944A (en) | 2018-11-06 |
Family
ID=64000879
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810547517.0A Pending CN108764944A (en) | 2018-05-31 | 2018-05-31 | Verification method, device and computer readable storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108764944A (en) |
Cited By (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109583219A (en) * | 2018-11-30 | 2019-04-05 | 国家电网有限公司 | A kind of data signature, encryption and preservation method, apparatus and equipment |
CN109729074A (en) * | 2018-12-11 | 2019-05-07 | 深圳市汇星数字技术有限公司 | A kind of encryption of audio data and reciprocity storage method and system |
CN109871709A (en) * | 2018-12-20 | 2019-06-11 | 顺丰科技有限公司 | Block chain private data deposits card method, system and storage medium |
CN110427346A (en) * | 2019-08-13 | 2019-11-08 | 河南中盾云安信息科技有限公司 | A kind of document storage system and its file memory method based on block chain |
CN110598478A (en) * | 2019-09-19 | 2019-12-20 | 腾讯科技(深圳)有限公司 | Block chain based evidence verification method, device, equipment and storage medium |
CN110889264A (en) * | 2019-11-11 | 2020-03-17 | 腾讯科技(深圳)有限公司 | Multimedia information processing method, device, equipment and storage medium |
CN111382463A (en) * | 2020-04-02 | 2020-07-07 | 中国工商银行股份有限公司 | Block chain system and method based on stream data |
CN111553450A (en) * | 2020-04-27 | 2020-08-18 | 中国银行股份有限公司 | Two-dimensional code generation and verification method and device |
CN112148789A (en) * | 2020-09-03 | 2020-12-29 | 京东数字科技控股股份有限公司 | Processing method and system for controlling multimedia playing |
CN112713996A (en) * | 2020-12-15 | 2021-04-27 | 中国联合网络通信集团有限公司 | Fault verification method based on block chain, server and terminal |
CN112950416A (en) * | 2021-03-11 | 2021-06-11 | 全链通有限公司 | Block chain-based electronic evidence processing method and device and readable medium |
CN112966306A (en) * | 2021-04-02 | 2021-06-15 | 西安慧博文定信息技术有限公司 | Processing method and device for blind verification file |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106548092A (en) * | 2016-10-31 | 2017-03-29 | 杭州嘉楠耘智信息科技有限公司 | File processing method and device |
CN106779737A (en) * | 2016-11-30 | 2017-05-31 | 电子科技大学 | Product based on block chain technology is traced to the source verification method |
CN107077557A (en) * | 2016-12-29 | 2017-08-18 | 深圳前海达闼云端智能科技有限公司 | The method and device that software application is issued and verified |
CN107657449A (en) * | 2016-07-25 | 2018-02-02 | 蓝树荣 | A kind of variation verification method of Chinese coin Transaction Information on block chain |
-
2018
- 2018-05-31 CN CN201810547517.0A patent/CN108764944A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107657449A (en) * | 2016-07-25 | 2018-02-02 | 蓝树荣 | A kind of variation verification method of Chinese coin Transaction Information on block chain |
CN106548092A (en) * | 2016-10-31 | 2017-03-29 | 杭州嘉楠耘智信息科技有限公司 | File processing method and device |
CN106779737A (en) * | 2016-11-30 | 2017-05-31 | 电子科技大学 | Product based on block chain technology is traced to the source verification method |
CN107077557A (en) * | 2016-12-29 | 2017-08-18 | 深圳前海达闼云端智能科技有限公司 | The method and device that software application is issued and verified |
Cited By (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109583219A (en) * | 2018-11-30 | 2019-04-05 | 国家电网有限公司 | A kind of data signature, encryption and preservation method, apparatus and equipment |
CN109729074A (en) * | 2018-12-11 | 2019-05-07 | 深圳市汇星数字技术有限公司 | A kind of encryption of audio data and reciprocity storage method and system |
CN109729074B (en) * | 2018-12-11 | 2021-10-01 | 深圳市汇星数字技术有限公司 | Audio data encryption and peer-to-peer storage method and system |
CN109871709A (en) * | 2018-12-20 | 2019-06-11 | 顺丰科技有限公司 | Block chain private data deposits card method, system and storage medium |
CN110427346A (en) * | 2019-08-13 | 2019-11-08 | 河南中盾云安信息科技有限公司 | A kind of document storage system and its file memory method based on block chain |
CN110598478A (en) * | 2019-09-19 | 2019-12-20 | 腾讯科技(深圳)有限公司 | Block chain based evidence verification method, device, equipment and storage medium |
CN110889264B (en) * | 2019-11-11 | 2021-06-22 | 腾讯科技(深圳)有限公司 | Multimedia information processing method, device, equipment and storage medium |
CN110889264A (en) * | 2019-11-11 | 2020-03-17 | 腾讯科技(深圳)有限公司 | Multimedia information processing method, device, equipment and storage medium |
CN111382463A (en) * | 2020-04-02 | 2020-07-07 | 中国工商银行股份有限公司 | Block chain system and method based on stream data |
CN111553450A (en) * | 2020-04-27 | 2020-08-18 | 中国银行股份有限公司 | Two-dimensional code generation and verification method and device |
CN111553450B (en) * | 2020-04-27 | 2023-04-18 | 中国银行股份有限公司 | Two-dimensional code generation and verification method and device |
CN112148789A (en) * | 2020-09-03 | 2020-12-29 | 京东数字科技控股股份有限公司 | Processing method and system for controlling multimedia playing |
CN112713996A (en) * | 2020-12-15 | 2021-04-27 | 中国联合网络通信集团有限公司 | Fault verification method based on block chain, server and terminal |
CN112713996B (en) * | 2020-12-15 | 2023-05-12 | 中国联合网络通信集团有限公司 | Block chain-based fault verification method, server and terminal |
CN112950416A (en) * | 2021-03-11 | 2021-06-11 | 全链通有限公司 | Block chain-based electronic evidence processing method and device and readable medium |
CN112950416B (en) * | 2021-03-11 | 2023-11-17 | 全链通有限公司 | Electronic evidence processing method and device based on blockchain and readable medium |
CN112966306A (en) * | 2021-04-02 | 2021-06-15 | 西安慧博文定信息技术有限公司 | Processing method and device for blind verification file |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108764944A (en) | Verification method, device and computer readable storage medium | |
US20200294293A1 (en) | Persistent augmented reality objects | |
US20230070389A1 (en) | System and method for creating nft from physical asset and validating authenticity of nft associated asset | |
KR20160010554A (en) | Systems and methods for emv chip and pin payments | |
CN107508826A (en) | Authentication method, device, VR terminals and VR service ends based on VR scenes | |
US10929526B2 (en) | User interface for tee execution of a device | |
CN114676799A (en) | Service processing method and device | |
KR20200065307A (en) | Method and system for providing smart letter of guarantee based on block chain | |
CN111967062A (en) | Data processing system, method and device based on block chain | |
WO2023122286A1 (en) | Blockchain bridge systems, methods, and storage media for trading non‑fungible token | |
JP2019509571A (en) | Public information processing method and device, and information disclosure system | |
JP2015531518A (en) | Method and apparatus for processing electronic transaction information | |
US20230334472A1 (en) | Automatically pairing physical assets to a non-fungible token or digital asset | |
US8904508B2 (en) | System and method for real time secure image based key generation using partial polygons assembled into a master composite image | |
CN111386543A (en) | Secure transactions using augmented reality | |
Esteban | Web engineering and e-commerce: Bridging technology and business in the Philippines | |
CN105719079B (en) | Information generation method and device | |
WO2018230185A1 (en) | Information processing device and information processing system | |
CN105701402B (en) | A kind of method and apparatus that monitoring and displaying is kidnapped | |
US20230224166A1 (en) | Systems and Methods for Associating Digital Media Files with External Commodities | |
US20230319373A1 (en) | Non-Fungible Token Minting in a Metaverse Environment | |
WO2024070028A1 (en) | Server device and program | |
US20230107705A1 (en) | Coordination and Management of Digital Asset Endorsements | |
US20240095332A1 (en) | Methods and systems for acoustic authentication | |
US20210258144A1 (en) | Systems and methods for marking and authenticating scarce items |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20181106 |