CN108830617A - Super code anti-counterfeiting method and system based on block chain - Google Patents
Super code anti-counterfeiting method and system based on block chain Download PDFInfo
- Publication number
- CN108830617A CN108830617A CN201810603327.6A CN201810603327A CN108830617A CN 108830617 A CN108830617 A CN 108830617A CN 201810603327 A CN201810603327 A CN 201810603327A CN 108830617 A CN108830617 A CN 108830617A
- Authority
- CN
- China
- Prior art keywords
- product
- dealer
- user
- information
- key
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/018—Certifying business or products
- G06Q30/0185—Product, service or business identity fraud
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/126—Applying verification of the received information the source of the received data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1095—Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1097—Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0866—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Development Economics (AREA)
- Accounting & Taxation (AREA)
- Entrepreneurship & Innovation (AREA)
- Economics (AREA)
- Finance (AREA)
- Marketing (AREA)
- Strategic Management (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Power Engineering (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
This application discloses a kind of super code anti-counterfeiting methods and system based on block chain.This method includes:Production time and the first quantity for receiving a collection of product of manufacturer's input, generate the number of each product, are stabbed according to private key, production time and number generates key, and the first quantity and production time stamp are broadcast to the node of block chain;The second quantity for receiving the product that the manufacturer that manufacturer inputs provides to dealer, according to dealer region by encryption key distribution to dealer;Receive being put in storage record and sales figure and the node that record and sales figure are broadcast to block chain being put in storage for dealer;With reception user to the verification information of at least one product in this batch of product.This method uses block chain technology, the true and false of product can be verified in production and sales overall process, it is ensured that the authenticity of information;Product in all processes from producing to using using encryption technology realize product information uniqueness and can not tamper.
Description
Technical field
This application involves data encryption technology field, more particularly to a kind of super code anti-counterfeiting method based on block chain and
System.
Background technique
Nowadays as the improvement of people's living standards, people are also higher and higher to product quality requirement, almost all of production
Product have anti-fake demand, and the identification authenticity of products that can be convenient consumer protects the interests of manufacturer and consumer not to be damaged
Evil.In face of the market of depth interconnection, the propagation and acquisition of information, unprecedented is extensive and convenient, simple to establish in technological layer
It is anti-fake, it not can avoid and be counterfeited or counterfeit.Radium-shine mark is anti-fake to look for factory to make;Coating is anti-fake can also be such as method big gun
System.So that the consumer of today is difficult to tell truth from falsehood by technological means, it is most it is anti-fake be like to take totally ineffective measures, not
Consumer can be really solved the problems, such as, so that the risk and cost of selection commodity is very high.More ironically, product has arrived market
On in addition producer oneself be all difficult to differentiate the difference of certified products and " mountain vallage goods ", right-safeguarding is even more difficult.So effective anti-
Puppet is the problem for allowing consumer in the urgent need to address with commercial city is produced now.
Summary of the invention
Aiming to overcome that the above problem or at least being partially solved or extenuate for the application solves the above problems.
According to the one aspect of the application, a kind of method for anti-counterfeit based on block chain is provided, including:
Manufacturer's information handling step:Receive name of product, the production time stamp and the of a collection of product of manufacturer's input
One quantity, wherein first quantity indicates the total amount of this batch of product, generates the number of each product of this batch of product, base
It is generated and the product in private key, the name of product, the production time stamp of manufacturer and the number of each product
Corresponding key, and the name of product, first quantity and the production time are stabbed to the node for being broadcast to block chain;
Product allocation step:Receive the supply of material instruction of manufacturer's input, wherein supply of material instruction is including manufacturer to warp
The second quantity for selling the product that quotient provides, according to the dealer region by the key equal with second quantity
The dealer is distributed to, and second quantity is broadcast to the node of block chain;
Distributor information processing step:Storage record and the sales figure of the dealer are received, and the storage is remembered
Record and the sales figure are broadcast to the node of block chain;With
User's checking step:It receives the user to request the activation of at least one product in this batch of product, and is swashed
Verifying living, the activation request includes the identification information of subscriber information message and dealer, and after activation is verified, updating should
The quantity of activated product in batch product, and the result of activation verifying is broadcast to the node of block chain.
This method can be realized in production and sales overall process using block chain technology using block chain technology as bottom architecture
Accurate validation is carried out to the true and false of verifying product, whole nodes participate in broadcast and ensure that the authenticity of information and quantity can not increase
Property;The uniqueness of product information is realized using encryption technology in all processes from producing to using in product and can not be distorted
Property.
Optionally, in manufacturer's information handling step, the private key based on manufacturer, production time stamp
Generating key with the number of each product includes:When private key based on the manufacturer is to name of product, the production
Between stamp and the number of each product encrypted, obtain ciphertext, the ciphertext be subjected to Hash operation, is obtained and described first
The identical key of quantity.
Since number of keys is identical as product quantity, it is ensured that certified products in the market can be verified, and be contained in key
Corresponding number, therefore it is conveniently distributed management.
Optionally, described to be counted with described second according to the dealer region in the product allocation step
Equal encryption key distribution, which is measured, to the dealer includes:According to the region where the dealer, the key is divided into section,
Wherein, the number of key is continuous in the section, and the quantity of key is equal to second quantity in the section.
Optionally, the user's checking step includes:
Activation instruction receiving step:The user is received to the activation instruction of at least one product, the activation refers to
Order includes:Information, user information and the identification information of dealer of at least one product;With
Activation instruction verification step:According to the identification information of the dealer, the activation instruction is sent to the warp
Quotient is sold, after the dealer confirms the activation instruction, after the confirmation message for receiving the dealer, to the use
Family send activation successfully prompt and key corresponding at least one described product, so as to user according to the key check with
The relevant information of described at least one product;
Product quantity updates step and updates activated product in this batch of product according to the quantity of user activated product
Quantity, and the result of activation verifying is broadcast to the node of block chain.
Optionally, after the activation instruction receiving step, the user's checking step further includes:
Location information verification step:The location information that the activation instruction obtains the user is issued based on the user,
In the case that the dealer region belonging to the location information and at least one described product is inconsistent, generate abnormal alert
Accuse information.
According to further aspect of the application, a kind of anti-counterfeiting system based on block chain is additionally provided, including:
Manufacturer's message processing module is disposed for receiving name of product, the life of a collection of product of manufacturer's input
Produce timestamp and the first quantity, wherein first quantity indicates the total amount of this batch of product, generates each production of this batch of product
The number of the number of product, private key, the name of product, production time stamp and each product based on manufacturer is raw
Area is broadcast at key corresponding with the product, and by the name of product, first quantity and the production time stamp
The node of block chain;
Product distribution module is disposed for receiving the supply of material instruction of manufacturer's input, wherein the supply of material instruction packet
The second quantity for including the product that manufacturer provides to dealer, will be with second number according to the dealer region
Equal encryption key distribution is measured to the dealer, and second quantity is broadcast to the node of block chain;
Distributor information processing module is disposed for receiving the storage record of the dealer and sales figure, and
The storage record and the sales figure are broadcast to the node of block chain;With
Subscriber authentication module is disposed for receiving the user and ask to the activation of at least one product in this batch of product
It asks, line activating of going forward side by side verifying, the activation request includes the identification information of subscriber information message and dealer, logical in activation verifying
Later, the quantity of activated product in this batch of product is updated, and the result of activation verifying is broadcast to the node of block chain.
The system can be realized in production and sales overall process using block chain technology using block chain technology as bottom architecture
Accurate validation is carried out to the true and false of verifying product, whole nodes participate in broadcast and ensure that the authenticity of information and quantity can not increase
Property;The uniqueness of product information is realized using encryption technology in all processes from producing to using in product and can not be distorted
Property.
Optionally, the subscriber authentication module includes:
Activation instruction receiving module, is disposed for receiving the user and refers to the activation of at least one product
It enables, the activation instruction includes:Information, user information and the identification information of dealer of at least one product;
Activation instruction confirmation module is disposed for the identification information according to the dealer, by the activation instruction
It is sent to the dealer, after the dealer confirms the activation instruction, receives the confirmation letter of the dealer
After breath, to the user send activation successfully prompt and key corresponding at least one described product, so as to user according to
The key checks information relevant at least one described product;With
Product quantity update module is disposed for the quantity according to user activated product, updates in this batch of product
The quantity of activated product, and the result of verifying will be activated to be broadcast to the node of block chain.
Optionally, the subscriber authentication module further includes location information verification module, the activation instruction receiving module with
The location information verification module connection, the location information verification module are configured to refer to based on the user sending activation
Enable the location information for obtaining the user, the dealer region belonging to the location information and at least one described product
In the case where inconsistent, abnormality warnings information is generated.
According to further aspect of the application, a kind of calculating equipment is additionally provided, including memory, processor and be stored in
In the memory and the computer program that can be run by the processor, wherein the processor execution computer journey
Method as described above is realized when sequence.
According to further aspect of the application, a kind of computer readable storage medium is additionally provided, it is preferably non-volatile
Readable storage medium storing program for executing, is stored with computer program, and the computer program is realized as described above when executed by the processor
Method.
According to the accompanying drawings to the detailed description of the specific embodiment of the application, those skilled in the art will be more
Above-mentioned and other purposes, the advantages and features of the application are illustrated.
Detailed description of the invention
Some specific embodiments of the application are described in detail by way of example and not limitation with reference to the accompanying drawings hereinafter.
Identical appended drawing reference denotes same or similar part or part in attached drawing.It should be appreciated by those skilled in the art that these
What attached drawing was not necessarily drawn to scale.In attached drawing:
Fig. 1 is the schematic flow chart according to one embodiment of the method for anti-counterfeit based on block chain technology of the application;
Fig. 2 is the production circulation sale link schematic diagram according to the present processes;
Fig. 3 is that the present processes is utilized to realize the schematic of anti-string goods;
Fig. 4 is according to the schematic block diagram of one embodiment of the anti-counterfeiting system based on block chain technology of the application;
Fig. 5 is the block diagram of one embodiment of the calculating equipment of the application;
Fig. 6 is the block diagram of one embodiment of the computer readable storage medium of the application.
Specific embodiment
According to the accompanying drawings to the detailed description of the specific embodiment of the application, those skilled in the art will be more
Above-mentioned and other purposes, the advantages and features of the application are illustrated.
Embodiment of the invention discloses a kind of method for anti-counterfeit based on block chain.Fig. 1 is according to the application based on area
The schematic flow chart of one embodiment of the method for anti-counterfeit of block chain technology.This method includes:
S100 manufacturer's information handling step:Receive name of product, the production time stamp of a collection of product of manufacturer's input
With the first quantity, wherein first quantity indicates the total amount of this batch of product, generates the volume of each product of this batch of product
Number, the number of private key, the name of product, production time stamp and each product based on manufacturer generates and should
The corresponding key of product, and the name of product, first quantity and the production time stamp are broadcast to block chain
Node.
S200 product allocation step:Receive the supply of material instruction of manufacturer's input, wherein the supply of material instruction includes manufacturer
Second quantity of the product provided to dealer, will be equal with second quantity according to the dealer region
Encryption key distribution gives the dealer, and second quantity is broadcast to the node of block chain.
S300 distributor information processing step:Receive the dealer storage record and sales figure, and by it is described enter
Library record and the sales figure are broadcast to the node of block chain.
S400 user's checking step:It receives the user to request the activation of at least one product in this batch of product, go forward side by side
Line activating verifying, the activation request include the identification information of subscriber information message and dealer, after activation is verified, more
The quantity of activated product in new this batch of product, and the result of verifying will be activated to be broadcast to the node of block chain.
This method can be realized in production and sales overall process using block chain technology using block chain technology as bottom architecture
Accurate validation is carried out to the true and false of verifying product, whole nodes participate in the authenticity that broadcast ensures information, and quantity can not increase
Property;The uniqueness of product information is realized using encryption technology in all processes from producing to using in product and can not be distorted
Property.
The application innovates anti-fake mode, and all participants is enable to reach benign common recognition, broadcasts by the whole network complete
The mode of verifying is netted, while solving trust and anti-pseudo problem, gets rid of the anti-fake mode of technology of " arms race " formula, fundamentally
Solves consumption and the difficulties of manufacturer.
Optionally, in the S100 manufacturer information handling step, when the private key based on manufacturer, the production
Between stamp and each product number generate key include:Private key based on the manufacturer is to name of product, the life
The number for producing timestamp and each product is encrypted, and ciphertext is obtained, and the ciphertext is carried out Hash operation, obtain with it is described
The identical key of first quantity.Wherein, the number containing the key in each key.
So-called key is by information relevant to product, for example, name of product, product number, quantity, life in the application
Timestamp etc. is produced, carries out the result obtained after Hash operation using obtaining ciphertext after asymmetric encryption, then by ciphertext.
Manufacturer obtains " private key " identity after the completion of login account on block chain, which uniquely determines.
It is alternatively possible to generate several public keys based on the private key, production time stamp and the first quantity.System it is super
Administrator holds the private key of product, and the administrator of system holds the public key of product.The public key can be unlocked for checking that key is compiled
Code is convenient for tracking and managing.
Key of the step based on asymmetric encryption techniques encrypts the product information and number using private key, utilizes
Private key generation is more key, and key can check encrypted content, but can not modify.Anti- private key can not be released according to ciphertext, thus
So that the identity of product is had uniqueness, can not be tampered or copied.The key is also referred to as DNA key.Fig. 2 is according to the application
Method production circulation sale link schematic diagram.For example, manufacturer is on April 15th, 2018 production A product population 2000,
After the completion of generation, each product is encoded, for example, format can be A001.The product coding is encrypted by private key, is obtained
To ciphertext:The ciphertext is calculated by hash function, obtains cryptographic Hash, as the A001 product is close by 2332ed2ud ...
Key.Using this method, be based on this batch of product, system can generate 2000 DNA keys, the number of these DNA keys be 1 to
2000.System broadcasts the information such as production quantity, batch and timestamp to the whole network.The administrator of system can will hold encryption key distribution
To dealer, and further, after user buys product and activates successfully, by encryption key distribution to user, the management of system
Member can use the public key held and check all keys.
This encryption system is known as " super code " herein, super code is established on the basis of existing product production procedure, can
It is again full of vitality to allow backward tissue to produce mechanism.As long as by data inputs such as the time of product, batch, quantity to super
Code system background, and synchronization is broadcasted on publicly-owned chain.Super code background management system, can automatically generate the product of corresponding number
DNA key.Key is encrypted using asymmetric encryption mode, can only be unlocked with public key, other people take public key and also can not reversely drill
Private key is calculated, full-range trackability and safety are improved.
Optionally, in the S200 product allocation step, it is described will be with described according to the dealer region
The equal encryption key distribution of two quantity includes to the dealer:According to the region where the dealer, the key is divided into
Section, wherein the number of key is continuous in the section, and the quantity of key is equal to second number in the section
Amount.
Manufacturer allots product and gives various regions dealer in this step, and typing corresponding information in systems.System according to
Different delivery regions, auto-partition configure different section coded key.For example, Shandong is the first section 001 to 500, extensively
East is the second section 501 to 1000, to do foundation for kinds of goods regionality and channel management.Referring to fig. 2, for example, manufacturer
200 in this batch of product are supplied into some dealer X on April 18th, 2018, by the product dna of number 1 to 200 in system
Encryption key distribution gives the dealer X.Meanwhile the information such as quantity of dealer's identity identification information, timestamp, distribution are uploaded into area
Block chain.
In S300 distributor information processing step, storage record is inserted super code and prevented by dealer after receiving product
Antiforge system is carrying out that sales figure is also inserted to super code anti-fake system post sales.Super code anti-fake system records the storage
With the node of the sales figure synchronized broadcast to block chain.According to these information, can carry out tracking of products, acquire, summarize,
Inquiry, management etc., to establish Product Information Management data-link and entire process of circulation supervisory systems.
Optionally, the S400 user's checking step includes activation instruction receiving step, activation instruction verification step and production
Product quantity updates step.
Activation instruction receiving step:The user is received to the activation instruction of at least one product, the activation refers to
Order includes:Information, user information and the identification information of dealer of at least one product.
Activation instruction verification step:According to the identification information of the dealer, the activation instruction is sent to the warp
Quotient is sold, after the dealer confirms the activation instruction, after the confirmation message for receiving the dealer, to the use
Family send activation successfully prompt and key corresponding at least one described product, so as to user according to the key check with
The relevant information of described at least one product.
Product quantity updates step:According to the quantity of user activated product, activated product in this batch of product is updated
Quantity, and the result of activation verifying is broadcast to the node of block chain.
User, also referred to as consumer can log in super code anti-fake system, example after buying product by scan operation
Such as, user can use smart phone or other terminal device scans pictures, packaging, picture in kind or two dimensional code as login
The entrance of super code anti-fake system.Activation operation is carried out first, and the information for needing to fill in systems includes:Subscriber data letter
It ceases, the identification information (ID) of dealer, wherein subscriber information message includes one or more of following information:Name, mobile phone
Number, age, the relevant informations such as address.User can be manually entered the ID of dealer or user can be by scanning dealer's
The ID of dealer is input to super code anti-fake system by two dimensional code.Super code anti-fake system receives the activation request of user, push
The information of user confirms to dealer, after dealer receives activation request, if it is confirmed that the information truth of the user, then click same
Meaning activation, super code anti-fake system will activate successfully instruction to be sent to user, deny activation failure, successful sending activation
While instruction, the corresponding key of product that user buys is also sent to user by super code anti-fake system.User can after activation
With production information, logistics information, the time of making the product, batch, the distributor information etc. for checking the product of purchase on the terminal device, produce
All information list nothing lefts of product, and all can not really distort, it seem that the DNA of product is the same, from birth, each link is complete
Journey is recorded in detail, convenient to transfer verifying at any time.The synchronous activation situation to the whole network broadcasting user of super code anti-fake system.
Referring to fig. 2, for example, user has purchased a product on April 22nd, 2018, by activating the DNA of the product close
Key binds terminal device, passes through transmission activation request and can obtain the key of the product after activating successfully, for example, number is 1
Key, thus verify the product be certified products.By user bound, user is enabled to be given for change according to the relevant information filled in close
Key, meanwhile, automatic bound device can limit bound device quantity, avoid abusing or usurp.
User is exactly the safety in support, maintenance and hardened system in the process of verifying activation.More users participates in
Verifying, the data of system are more safe and reliable, so that the pirate space that do not survive of malice.Even if occurring fake products in kind on the market to produce
Product, but since code key has uniqueness, total amount not can increase.Fake products product can not activate cochain, therefore user can differentiate at a glance,
It will not have dust thrown into the eyes.Counterfeiter also can eliminate malicious motive because can not therefrom make a profit.
Optionally, after the activation instruction receiving step, the S400 user's checking step further includes:
Location information verification step:The location information that the activation instruction obtains the user is issued based on the user,
In the case that the dealer region belonging to the location information and at least one described product is inconsistent, generate abnormal alert
Accuse information.
The step can prevent string goods.Fig. 3 is that the present processes is utilized to realize the schematic of anti-string goods.For example, selling
The key coding of the product of the sale of quotient A is 001 to 500, and the key coding of the product of the sale of dealer B is 501 to 1000,
The key coding of the product of the sale of dealer C is 1001 to 1500.What the user of the region dealer A used in activation
Key 001 then passes through the confirmation of dealer A, user's normal Activate success.It is assumed that the dealer C string goods in Shandong arrives Liaoning
Dealer B is sold region, and user activates in the region dealer B, obtains activation code to system, the activation code
Cipher key number is 1002, and being located at cipher key number is the section 1001-1500, and system judges the key point of the product according to encoded information
The dealer matched is C, but in active information under geographical location and the unmatched situation of above- mentioned information, it is different that system judges transaction
Often, system manager and related dealer is notified to confirm.It is possible thereby to identify whether to be implicitly present in the malice such as string goods in violation of rules and regulations
It disrupts the market situation, protects the equity of related operator without damage.
This method prevents intercepting thinking as strict as possible, is changed into and increases income and decreases expenditure, and controls and changes benefit sharing structure, and remodeling production is closed
System snipes pirate and malice and disrupts the market behavior, directly reduction production cost, by interests Pu Hui in the form of token or integral in
Each link in industry motivates manufacturer, dealer, and user participates in enthusiasm, while simple and easy-to-use participation threshold, so that mutually beneficial
Ecological chain is possibly realized, and is inherently eliminated the motivation of manufacturing and marketing the fake, so that Cleaning market, guarantees the development of industry environmental health,
And dynamics of strengthening intellectual property protection, power-assisted country is from " made in China " to " Created in China " strategic transformation.
It is to be appreciated that location information verification step can occur after activation instruction receiving step, or activation refers to
After enabling verification step, there is no the differentiations of sequencing between each step.
It is certified products identity that user, which activates the product for successfully showing to demonstrate purchase, is by that can reinforce to the whole network broadcast
System.User not only can verify certified products by system, moreover it is possible to the additional clothes checked all information relevant to product, enjoy product
Business or value-added service are rewarded by completion task, the activity that enjoys privileges etc..
For example, system can be set and upgrade according to the contribution margin of user the identity of user, user identity can be with sharp
Quantity upgrading living, that is to say, that as user activates amount of action to increase, the contribution margin for verifying positive edition system increases, can
To be embodied by token or integral, user identity rank can promote rank therewith;Different ranks corresponds to different equity, can also be with
Exchange corresponding product or service.While obtaining value-added service, moreover it is possible to obtain identity, such as intellectual property protection is big
Make identity etc., this identity also with the contribution margin Synchronous lifting, harvests the sense of accomplishment of spirit level.It, can using this method
Transfer and excite user to be actively engaged in the enthusiasm of verifying.
Super code provided by the present application has the following advantages that, first, without hard cost, it is any special not need to do product
Processing, for example, labeling, stamp, the operation of patch code etc, therefore without any actual hard cost, so that it may realize anti-fake, prevent
The function of string goods;Second, it is easy to operate, as long as one terminal device of user, small routine or application program are opened whenever and wherever possible
(app), so that it may realize and exclude fake products, contribute for intellectual property protection.Third, practical, super code anti-fake system is in original
Seamless implantation in some industry links does not need to increase new equipment, and all operations are completed in terminal device.The super anti-fake system of code
The information of links is uploaded to block chain by system, is participated in broadcasting and be verified good based on P2P technology the whole network using block chain
Property common recognition mechanism, by verifying broadcast big multinode, so that information be prevented to be tampered.Manufacturer, dealer, user are operating
It, can will be in product information synchronized broadcast to chain during use.Due to product population be it is fixed, the broadcast of links is dynamic
Synchronizing realizes, the whether legal effect of verifying source-information.Realize verifying node more higher good of multisystem safety
Property circulation.Different with other block chain projects, it is existing industrial chain amount body that super code, which is established on original industrial chain basis,
Customization, is the block chain application for meeting very much Vehicles Collected from Market environment.
The application makes manufacturer, dealer, the common recognition of user and interests reach an agreement.
Manufacturer:The problems such as wishing in the market without piracy, fake products, string goods, encroaches on the interests of oneself, then dynamic to make
With the system, participates in and moving system lands.
Dealer:It is desirable to verify that the legitimacy and authority of oneself agency, consolidates self-employed regional benefit and do not invaded
Evil, while the relationship of longer-term can be established with user again, dynamic participation broadcast and verifying.
User:Wish that the product oneself bought genuine goods at a fair price, equity maximize.It is legal that product cochain can solve product
Problem;The design of user's honor system meets the needs of user's spirit level, verifies reward mechanism, in proportion by the value of generation
It makes concessions to user, user's right is made to obtain maximum satisfaction.
Being actively engaged in of user, which directly results in pirate products, to be unable to cochain by verifying link.So that it is pirate and
Legal copy pulls open the wide gap that can not go beyond together.Super code, by the way that verifying supervision is delegated power to the lower levels to users, product institute
There is link information publicity the whole network, user forces industrial chain link, has accurately sniped pirate and violation operation.Interests are returned simultaneously
It is grouped into the node of each honesty of industry, user is allowed to benefit, service provider benefits.Polygon interests are balanced, remodeling industry is completed
Good ecological relationship.
Embodiments herein also discloses a kind of anti-counterfeiting system based on block chain technology.Fig. 4 is according to the base of the application
In the schematic block diagram of one embodiment of the anti-counterfeiting system of block chain.The device includes:
Manufacturer's message processing module 100, be disposed for receive manufacturer input a collection of product name of product,
Production time stamp and the first quantity, wherein first quantity indicates the total amount of this batch of product, generates this batch of product each
The number of product, the number of private key, the name of product, the production time stamp and each product based on manufacturer
Key corresponding with the product is generated, and the name of product, first quantity and the production time stamp are broadcast to
The node of block chain;
Product distribution module 200 is disposed for receiving the supply of material instruction of manufacturer's input, wherein the supply of material refers to
Enabling includes the second quantity of the product that manufacturer provides to dealer, will be with described the according to the dealer region
The equal encryption key distribution of two quantity gives the dealer, and second quantity is broadcast to the node of block chain;
Distributor information processing module 300 is disposed for receiving the storage record of the dealer and sales figure,
And the storage record and the sales figure are broadcast to the node of block chain;
Subscriber authentication module 400 is disposed for receiving the user and swash at least one product in this batch of product
Request living, line activating of going forward side by side verifying, the activation request include the identification information of subscriber information message and dealer, are tested in activation
After card passes through, the quantity of activated product in this batch of product is updated, and the result of activation verifying is broadcast to the section of block chain
Point.
The system can be realized in production and sales overall process using block chain technology using block chain technology as bottom architecture
Accurate validation is carried out to the true and false of verifying product, whole nodes participate in broadcast and ensure that the authenticity of information and quantity can not increase
Property;The uniqueness of product information is realized using encryption technology in all processes from producing to using in product and can not be distorted
Property.
Optionally, in manufacturer's message processing module 100, private key, production time stamp and institute based on manufacturer
The number for stating each product generates key and includes:Private key based on the manufacturer stabs name of product, the production time
It is encrypted with the number of each product, obtains ciphertext, the ciphertext is subjected to Hash operation, is obtained and first quantity
Identical key.
Optionally, in product distribution module 200, it is described will be with second quantity according to the dealer region
Equal encryption key distribution includes to the dealer:According to the region where the dealer, the key is divided into section,
In, the number of key is continuous in the section, and the quantity of key is equal to second quantity in the section.
Optionally, the subscriber authentication module 400 includes activation instruction receiving module and activation instruction confirmation module.
Activation instruction receiving module, is disposed for receiving the user and refers to the activation of at least one product
It enables, the activation instruction includes:Information, user information and the identification information of dealer of at least one product.
Activation instruction confirmation module is disposed for the identification information according to the dealer, by the activation instruction
It is sent to the dealer, after the dealer confirms the activation instruction, receives the confirmation letter of the dealer
After breath, activation successfully prompt and key corresponding at least one described product are sent to the user, so that user checks
Information relevant at least one described product.
Product quantity update module is disposed for the quantity according to user activated product, updates in this batch of product
The quantity of activated product, and the result of verifying will be activated to be broadcast to the node of block chain.
Optionally, the subscriber authentication module further includes location information verification module, the activation instruction receiving module with
The location information verification module connection, the location information verification module are configured to refer to based on the user sending activation
Enable the location information for obtaining the user, the dealer region belonging to the location information and at least one described product
In the case where inconsistent, abnormality warnings information is generated.
The activation instruction receiving module can be connect with the location information verification module, can also be connect with activation instruction
Receive module connection.
Embodiments herein additionally provides a kind of calculating equipment, referring to Fig. 5, the calculating equipment include memory 1120,
Processor 1110 and it is stored in the computer program that can be run in the memory 1120 and by the processor 1110, the calculating
Machine program is stored in the space 1130 for program code in memory 1120, which holds by processor 1110
It is realized when row for executing any one steps of a method in accordance with the invention 1131.
Embodiments herein additionally provides a kind of computer readable storage medium.Referring to Fig. 6, the computer-readable storage
Medium includes the storage unit for program code, which is provided with for executing steps of a method in accordance with the invention
Program 1131 ', the program are executed by processor.
The embodiment of the present application also provides a kind of computer program products comprising instruction.When the computer program product.
In the above-described embodiments, can come wholly or partly by software, hardware, firmware or any combination thereof real
It is existing.When implemented in software, it can entirely or partly realize in the form of a computer program product.The computer program
Product includes one or more computer instructions.When computer loads and executes the computer program instructions, whole or portion
Ground is divided to generate according to process or function described in the embodiment of the present application.The computer can be general purpose computer, dedicated computing
Machine, computer network obtain other programmable devices.The computer instruction can store in computer readable storage medium
In, or from a computer readable storage medium to the transmission of another computer readable storage medium, for example, the computer
Instruction can pass through wired (such as coaxial cable, optical fiber, number from a web-site, computer, server or data center
User's line (DSL)) or wireless (such as infrared, wireless, microwave etc.) mode to another web-site, computer, server or
Data center is transmitted.The computer readable storage medium can be any usable medium that computer can access or
It is comprising data storage devices such as one or more usable mediums integrated server, data centers.The usable medium can be with
It is magnetic medium, (for example, floppy disk, hard disk, tape), optical medium (for example, DVD) or semiconductor medium (such as solid state hard disk
Solid State Disk (SSD)) etc..
Professional should further appreciate that, described in conjunction with the examples disclosed in the embodiments of the present disclosure
Unit and algorithm steps, can be realized with electronic hardware, computer software, or a combination of the two, hard in order to clearly demonstrate
The interchangeability of part and software generally describes each exemplary composition and step according to function in the above description.
These functions are implemented in hardware or software actually, the specific application and design constraint depending on technical solution.
Professional technician can use different methods to achieve the described function each specific application, but this realization
It is not considered that exceeding scope of the present application.
Those of ordinary skill in the art will appreciate that implement the method for the above embodiments be can be with
By program come instruction processing unit completion, the program be can store in computer readable storage medium, and the storage is situated between
Matter is non-transitory (English:Non-transitory) medium, such as random access memory, read-only memory, flash
Device, hard disk, solid state hard disk, tape (English:Magnetic tape), floppy disk (English:Floppy disk), CD (English:
Optical disc) and any combination thereof.
The preferable specific embodiment of the above, only the application, but the protection scope of the application is not limited thereto,
Within the technical scope of the present application, any changes or substitutions that can be easily thought of by anyone skilled in the art,
Should all it cover within the scope of protection of this application.Therefore, the protection scope of the application should be with scope of protection of the claims
Subject to.
Claims (10)
1. a kind of method for anti-counterfeit based on block chain technology, including:
Manufacturer's information handling step:Receive the name of product, production time stamp and the first number of a collection of product of manufacturer's input
Amount, wherein first quantity indicates the total amount of this batch of product, generates the number of each product of this batch of product, based on life
The private key of business men, the name of product, the production time stabs and the generation of the number of each product is corresponding with the product
Key, and the name of product, first quantity and the production time stamp are broadcast to the node of block chain;
Product allocation step:Receive the supply of material instruction of manufacturer's input, wherein supply of material instruction is including manufacturer to dealer
Second quantity of the product provided, according to the dealer region by the encryption key distribution equal with second quantity
To the dealer, and second quantity is broadcast to the node of block chain;
Distributor information processing step:Receive the dealer storage record and sales figure, and by the storage record with
The sales figure is broadcast to the node of block chain;With
User's checking step:It receives the user to request the activation of at least one product in this batch of product, line activating of going forward side by side is tested
Card, the activation request includes the identification information of subscriber information message and dealer, after activation is verified, updates this batch production
The quantity of activated product in product, and the result of verifying will be activated to be broadcast to the node of block chain.
2. described to be based on the method according to claim 1, wherein in manufacturer's information handling step
The number of the private key of manufacturer, production time stamp and each product generates key:
Private key based on the manufacturer encrypts the number of name of product, production time stamp and each product,
Ciphertext is obtained, the ciphertext is subjected to Hash operation, obtains key identical with first quantity.
3. described according to the warp according to the method described in claim 2, it is characterized in that, in the product allocation step
The encryption key distribution equal with second quantity is included by pin quotient region to the dealer:According to where the dealer
Region, the key is divided into section, wherein the number of key is continuous in the section, and close in the section
The quantity of key is equal to second quantity.
4. according to the method in any one of claims 1 to 3, which is characterized in that the user's checking step includes:
Activation instruction receiving step:The user is received to the activation instruction of at least one product, the activation instruction packet
It includes:Information, user information and the identification information of dealer of at least one product;With
Activation instruction verification step:According to the identification information of the dealer, the activation instruction is sent to the dealer,
After the dealer confirms the activation instruction, after the confirmation message for receiving the dealer, sent out to the user
Send activation successfully prompt and key corresponding at least one described product, so as to user according to the key check with it is described
The relevant information of at least one product;With
Product quantity updates step:According to the quantity of user activated product, the number of activated product in this batch of product is updated
Amount, and the result of verifying will be activated to be broadcast to the node of block chain.
5. according to the method described in claim 4, it is characterized in that, after the activation instruction receiving step, the user
Verification step further includes:
Location information verification step:The location information that the activation instruction obtains the user is issued based on the user, in institute
State dealer region belonging to location information and at least one described product it is inconsistent in the case where, generate abnormality warnings letter
Breath.
6. a kind of anti-counterfeiting system based on block chain technology, including:
Manufacturer's message processing module, when being disposed for receiving name of product, the production of a collection of product of manufacturer's input
Between stamp and the first quantity, wherein first quantity indicates the total amount of this batch of product, generates each product of this batch of product
Number, the number of private key, the name of product based on manufacturer, production time stamp and each product generate with
The corresponding key of the product, and the name of product, first quantity and the production time stamp are broadcast to block chain
Node;
Product distribution module is disposed for receiving the supply of material instruction of manufacturer's input, wherein the supply of material instruction includes life
Second quantity of the product that business men is provided to dealer, will be with the second quantity phase according to the dealer region
Deng encryption key distribution give the dealer, and second quantity is broadcast to the node of block chain;
Distributor information processing module, is disposed for receiving storage record and the sales figure of the dealer, and by institute
It states storage record and the sales figure is broadcast to the node of block chain;With
Subscriber authentication module is disposed for receiving activation request of the user at least one product in this batch of product,
Line activating of going forward side by side verifying, the activation request include the identification information of subscriber information message and dealer, are verified in activation
Afterwards, the quantity of activated product in this batch of product is updated, and the result of activation verifying is broadcast to the node of block chain.
7. system according to claim 6, which is characterized in that the subscriber authentication module includes:
Activation instruction receiving module is disposed for receiving the user to the activation instruction of at least one product, institute
Stating activation instruction includes:Information, user information and the identification information of dealer of at least one product;With
Activation instruction confirmation module is disposed for the identification information according to the dealer, and the activation instruction is sent
To the dealer, after the dealer confirms the activation instruction, after the confirmation message for receiving the dealer,
Activation successfully prompt and key corresponding at least one described product are sent to the user, so that user is according to described close
Key checks information relevant at least one described product;With
Product quantity update module is disposed for the quantity according to user activated product, updates and has swashed in this batch of product
The quantity of product living, and the result of verifying will be activated to be broadcast to the node of block chain.
8. system according to claim 7, which is characterized in that the subscriber authentication module further includes location information verification mould
Block, the activation instruction receiving module are connect with the location information verification module, and the location information verification module is configured to
The location information that the activation instruction obtains the user is issued based on the user, in the location information and described at least one
In the case that dealer region belonging to a product is inconsistent, abnormality warnings information is generated.
9. a kind of calculating equipment, including memory, processor and storage can be run in the memory and by the processor
Computer program, wherein the processor is realized when executing the computer program such as any one of claims 1 to 5 institute
The method stated.
10. a kind of computer readable storage medium, preferably non-volatile readable storage medium, are stored with computer journey
Sequence, the computer program realize the method as described in any one of claims 1 to 5 when executed by the processor.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810603327.6A CN108830617A (en) | 2018-06-12 | 2018-06-12 | Super code anti-counterfeiting method and system based on block chain |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810603327.6A CN108830617A (en) | 2018-06-12 | 2018-06-12 | Super code anti-counterfeiting method and system based on block chain |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108830617A true CN108830617A (en) | 2018-11-16 |
Family
ID=64144692
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810603327.6A Pending CN108830617A (en) | 2018-06-12 | 2018-06-12 | Super code anti-counterfeiting method and system based on block chain |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108830617A (en) |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109472604A (en) * | 2018-12-07 | 2019-03-15 | 芯链(北京)科技有限公司 | Antifake method for products and system based on real name block chain |
CN110020824A (en) * | 2019-04-09 | 2019-07-16 | 张�浩 | Product stream information management system and method |
CN110232574A (en) * | 2019-05-07 | 2019-09-13 | 中国平安财产保险股份有限公司 | Product Validation method, apparatus, equipment and storage medium based on block chain |
CN110335051A (en) * | 2019-07-03 | 2019-10-15 | 烟台市同翔网络科技有限责任公司 | A kind of unique code publication of food labelling based on block chain major-minor chain technology and circulation source tracing method |
CN110601815A (en) * | 2019-09-17 | 2019-12-20 | 腾讯科技(深圳)有限公司 | Block chain data processing method and equipment |
CN110597836A (en) * | 2019-09-19 | 2019-12-20 | 腾讯科技(深圳)有限公司 | Information query request response method and device based on block chain network |
CN111127037A (en) * | 2019-12-19 | 2020-05-08 | 盐城工学院 | Commodity universal anti-counterfeiting method based on block chain account system |
CN111392303A (en) * | 2020-03-18 | 2020-07-10 | 浙江冒个泡电子商务有限公司 | Intelligent warehouse management method and system |
CN111464499A (en) * | 2020-03-06 | 2020-07-28 | 深圳壹账通智能科技有限公司 | Electronic warehouse receipt tracing method and device, computer equipment and storage medium |
WO2020223905A1 (en) * | 2019-05-07 | 2020-11-12 | 林晖 | Method for tracking product history |
CN113393293A (en) * | 2021-06-08 | 2021-09-14 | 深圳本地宝新媒体技术有限公司 | Distribution method, authentication method, terminal and system of travel product |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102004986A (en) * | 2010-10-26 | 2011-04-06 | 梁庆生 | Product anti-counterfeiting method based on digital signature and public key system and verifying method |
CN107220836A (en) * | 2017-05-31 | 2017-09-29 | 无锡井通网络科技有限公司 | A kind of block chain logistics based on Quick Response Code is traced to the source tracking method for anti-counterfeit |
CN107341676A (en) * | 2017-07-17 | 2017-11-10 | 深圳天净喔溯源科技有限公司 | False proof mark and the method for tracing to the source |
CN107679877A (en) * | 2017-10-18 | 2018-02-09 | 上海唯链信息科技有限公司 | A kind of cosmetics based on block chain technology are false proof and traceability system |
US20180130050A1 (en) * | 2016-11-07 | 2018-05-10 | LedgerDomain, LLC | Extended blockchains for event tracking and management |
-
2018
- 2018-06-12 CN CN201810603327.6A patent/CN108830617A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102004986A (en) * | 2010-10-26 | 2011-04-06 | 梁庆生 | Product anti-counterfeiting method based on digital signature and public key system and verifying method |
US20180130050A1 (en) * | 2016-11-07 | 2018-05-10 | LedgerDomain, LLC | Extended blockchains for event tracking and management |
CN107220836A (en) * | 2017-05-31 | 2017-09-29 | 无锡井通网络科技有限公司 | A kind of block chain logistics based on Quick Response Code is traced to the source tracking method for anti-counterfeit |
CN107341676A (en) * | 2017-07-17 | 2017-11-10 | 深圳天净喔溯源科技有限公司 | False proof mark and the method for tracing to the source |
CN107679877A (en) * | 2017-10-18 | 2018-02-09 | 上海唯链信息科技有限公司 | A kind of cosmetics based on block chain technology are false proof and traceability system |
Cited By (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109472604A (en) * | 2018-12-07 | 2019-03-15 | 芯链(北京)科技有限公司 | Antifake method for products and system based on real name block chain |
CN110020824A (en) * | 2019-04-09 | 2019-07-16 | 张�浩 | Product stream information management system and method |
WO2020223905A1 (en) * | 2019-05-07 | 2020-11-12 | 林晖 | Method for tracking product history |
CN110232574A (en) * | 2019-05-07 | 2019-09-13 | 中国平安财产保险股份有限公司 | Product Validation method, apparatus, equipment and storage medium based on block chain |
CN110335051A (en) * | 2019-07-03 | 2019-10-15 | 烟台市同翔网络科技有限责任公司 | A kind of unique code publication of food labelling based on block chain major-minor chain technology and circulation source tracing method |
CN110335051B (en) * | 2019-07-03 | 2023-12-19 | 烟台市同翔网络科技有限责任公司 | Food tag unique code release and circulation tracing method based on block chain main and auxiliary chain technology |
CN110601815A (en) * | 2019-09-17 | 2019-12-20 | 腾讯科技(深圳)有限公司 | Block chain data processing method and equipment |
CN110597836A (en) * | 2019-09-19 | 2019-12-20 | 腾讯科技(深圳)有限公司 | Information query request response method and device based on block chain network |
CN110597836B (en) * | 2019-09-19 | 2023-10-27 | 腾讯科技(深圳)有限公司 | Information inquiry request response method and device based on block chain network |
CN111127037A (en) * | 2019-12-19 | 2020-05-08 | 盐城工学院 | Commodity universal anti-counterfeiting method based on block chain account system |
CN111127037B (en) * | 2019-12-19 | 2024-01-05 | 盐城工学院 | Commodity universal anti-counterfeiting method based on blockchain account system |
CN111464499A (en) * | 2020-03-06 | 2020-07-28 | 深圳壹账通智能科技有限公司 | Electronic warehouse receipt tracing method and device, computer equipment and storage medium |
CN111392303A (en) * | 2020-03-18 | 2020-07-10 | 浙江冒个泡电子商务有限公司 | Intelligent warehouse management method and system |
CN113393293A (en) * | 2021-06-08 | 2021-09-14 | 深圳本地宝新媒体技术有限公司 | Distribution method, authentication method, terminal and system of travel product |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108830617A (en) | Super code anti-counterfeiting method and system based on block chain | |
CN114902195B (en) | Application program cooperation method, computer-readable storage medium, and application program cooperation system | |
US20230214792A1 (en) | Computer implemented systems and methods | |
CN109819443B (en) | Registration authentication method, device and system based on block chain | |
CN107979585B (en) | Data processing method, application client and system | |
US20230004970A1 (en) | Distributed Ledgers with Ledger Entries Containing Redactable Payloads | |
JP2020522927A (en) | Blockchain for general calculation | |
CN107480964B (en) | Directional transfer method for digital asset, central server and storage medium | |
WO2020015635A1 (en) | Distributed voting system, method and apparatus, and computer device and readable storage medium | |
CN107679045A (en) | Copyright authorization management method and system | |
CN106897902A (en) | Service transacting method, system and trading server based on block chain technology | |
EP3763078B1 (en) | Methods of electing leader nodes in a blockchain network using a role-based consensus protocol | |
US11533166B2 (en) | Method for controlling distribution of a product in a computer network and system | |
CN111177800A (en) | Data processing method and device based on block chain and electronic equipment | |
US11908273B2 (en) | Playing card with electronic authenticator | |
CN112908442A (en) | Medical data sharing method, device, equipment and computer readable medium | |
Daraghmi et al. | A Blockchain‐Based Editorial Management System | |
Augusto et al. | SoK: Security and Privacy of Blockchain Interoperability [Extended Version] | |
RU2707700C1 (en) | Method of remote verification of documents | |
CN111931230A (en) | Data authorization method and device, storage medium and electronic device | |
WO2023159203A2 (en) | Systems and methods for abuse safeguards in nft-directed environments | |
CN112734455A (en) | Prize exchanging result generating method, device and equipment and readable storage medium | |
CN112862466A (en) | Resource transfer method, account settling terminal and server node | |
CN117061089B (en) | Voting management method, device, equipment and storage medium | |
KR102309024B1 (en) | Data Privacy-Preserving Distributed Knowledge Discovery system based on the Blockchain and Method thereof |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |