CN108922012B - Invoice checking method without leakage of original information based on block chain technology - Google Patents

Invoice checking method without leakage of original information based on block chain technology Download PDF

Info

Publication number
CN108922012B
CN108922012B CN201810757523.9A CN201810757523A CN108922012B CN 108922012 B CN108922012 B CN 108922012B CN 201810757523 A CN201810757523 A CN 201810757523A CN 108922012 B CN108922012 B CN 108922012B
Authority
CN
China
Prior art keywords
invoice
address
template
unique
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810757523.9A
Other languages
Chinese (zh)
Other versions
CN108922012A (en
Inventor
付少庆
饶森林
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Dajingfang Network Technology Co.,Ltd.
Original Assignee
Beijing Dazhangfang Network Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Dazhangfang Network Technology Co ltd filed Critical Beijing Dazhangfang Network Technology Co ltd
Priority to CN201810757523.9A priority Critical patent/CN108922012B/en
Publication of CN108922012A publication Critical patent/CN108922012A/en
Application granted granted Critical
Publication of CN108922012B publication Critical patent/CN108922012B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/004Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using digital security elements, e.g. information coded on a magnetic thread or strip
    • G07D7/0047Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using digital security elements, e.g. information coded on a magnetic thread or strip using checkcodes, e.g. coded numbers derived from serial number and denomination
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/20Testing patterns thereon
    • G07D7/202Testing patterns thereon using pattern matching
    • G07D7/206Matching template patterns

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Computer Security & Cryptography (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The application provides an invoice checking method without revealing original information based on a block chain technology, which comprises the steps of S1 defining an invoice template and establishing an invoice template library; s2, performing invoice data templating on the invoice according to the corresponding invoice template; s3, calculating templated invoice feature data; s4 upper chain of invoice information; s5 verifies the invoice information. The invention verifies the authenticity of the invoice by using the public information query in the block chain, thereby realizing the online verification query of the invoice content. And related operations such as invoice invalidation, flushing and the like can be inquired. The entire history of changes for one invoice can be verified.

Description

Invoice checking method without leakage of original information based on block chain technology
Technical Field
The invention relates to the technical field of computers and the field of fiscal invoices, in particular to an invoice checking method without revealing original information based on a block chain technology.
Background
The invoice is a receipt and payment certificate issued and obtained by a unit and an individual in purchasing and selling goods, providing or receiving services and other business activities. In the economic development of China, an invoice is an indispensable part in enterprise and personal economic activities as an economic certificate. And because of the economic characteristics of the invoices, some illegal persons sell false invoices for economic benefit. In the financial accounting of a business, a unit enters cost fees in invoice entries, thereby determining profits. If the tax authority of the false invoice receives the tax payment evaluation or inspection, the cost expense is removed, and the enterprise is subjected to tax compensation. And can be penalized depending on the particular situation. Even if not a false invoice, the invoiced invoice can lose its effect if it is flushed by the enterprise, etc. There are many scenarios where it is necessary to verify the authenticity of an invoice. The invoice inquiry refers to a method for determining whether an invoice exists and the authenticity of the invoice according to necessary invoice information such as an invoice code, an invoice number, an invoice date and the like.
At present, the invoice of China is subject to the principle of localization of each province, invoice inspection websites of each province are scattered, classification items are different, input and output interfaces are not consistent, and phishing fraud websites are layered endlessly. If the relevant content of the invoice can be directly inquired, the privacy information of an enterprise or an organization can be leaked, and the data related to the national finance and tax can be leaked. Therefore, the current invoice checking website generally requires inputting various key information of the invoice and methods such as installing website certificates and the like. For example, invoice inspection https of the State tax administration:// inv-veri.
The blockchain technology generated from 2008 is also called as a distributed book technology, is an internet database technology, and is characterized in that centralization and public transparency are achieved, and everyone can participate in database recording and query. The method has certain advantages in the aspects of solving the authenticity of the information and inquiring the information. In the technology related to the block chain, if the privacy problem of the invoice can be solved, the method has good practical value in the aspect of invoice checking.
Disclosure of Invention
The invention aims to overcome the defects that the prior query technology is inconvenient to use and can reveal information in the aspect of user privacy and the like, and provides a method for solving the problem of checking by using a block chain technology and protecting the privacy of the checked information. The method can be used for private chains, alliance chains and public chains, and aims at different types of chains and mechanisms for controlling data uplink are needed. No matter which block chain technology is used, the real information of the invoice cannot be revealed, and the user can conveniently and quickly check the authenticity of the invoice information. The method comprises the following steps:
s1, defining an invoice template and establishing an invoice template library; the invoice template defines different invoice templates according to different formats and versions of invoices, each invoice template corresponds to a template identifier, and each invoice template at least needs to comprise a unique identification mark, invoice content and invoice distinguishing mark field:
the unique identification mark is the unique mark of each invoice and is formed by combining an invoice code and an invoice number;
the invoice content is as follows: at least comprising invoicing date, check code, purchaser name, seller name and invoice amount;
invoice distinguishing mark: to distinguish invoice properties;
s2, performing invoice data templating on the invoice according to the corresponding invoice template;
s3, according to the templated invoice data, generating an invoice unique address for the unique identification mark in the invoice template by using a first encryption algorithm, and generating an invoice characteristic value for the invoice content in the invoice template by using a second encryption algorithm;
s4, packaging the unique invoice address, the template identifier, the invoice distinguishing mark, the current time, the invoice characteristic value and the associated unique invoice address into invoice uplink information, and writing the invoice uplink information into a block chain; wherein: the current time is the time for packaging the invoice uplink information;
the associated invoice unique address is the invoice unique address of the invoice associated with the invoice, and the related invoice information is linked together by using the associated invoice unique address;
s5, verifying the invoice information;
performing invoice data templating on invoices to be verified by using invoice templates in the invoice template library, and calculating an invoice unique address by adopting a first encryption algorithm; retrieving invoice information on the public link through the unique invoice address, and if the invoice information is not retrieved, prompting that the invoice information is not linked; when the unique invoice address is searched, calculating the invoice characteristic value of the invoice needing to be verified by adopting a second encryption algorithm, comparing the calculated invoice characteristic value with the invoice characteristic value stored on the chain, and if the invoice characteristic value is the same as the invoice characteristic value, considering the invoice information to be valid, and if the invoice characteristic value is not the same as the invoice characteristic value, considering the invoice information to be invalid.
Preferably, in step S2: the first encryption algorithm is a double SHA256 Hash algorithm; the second encryption algorithm is the SHA256 hash algorithm.
Preferably, in step 3: the unique invoice address is an invoice hash address, and the unique associated invoice address is an associated invoice hash address; the invoice properties are divided into blue-word invoice, red-word invoice and waste invoice.
Preferably, in step S3: the invoice distinguishing mark of the blue invoice is set to be 0001, the hash address of the associated invoice of the blue invoice is 0, and the blue invoice is not associated with other invoices. The invoice distinguishing mark of the red invoice is set to-0002, and the associated invoice hash address is the hash address of the blue invoice for which the red invoice is flushed. The invoice distinguishing mark of the invalidated invoice is set to be-0001, and the associated invoice hash address of the invalidated invoice is the hash address of the invalidated blue invoice.
Preferably, the format of the invoice in step S1 includes at least a value-added tax special invoice, a motor vehicle sales unified invoice, a freight transportation industry value-added tax special invoice, a value-added tax general invoice, a value-added tax electronic general invoice, and a second-hand vehicle sales unified invoice.
Preferably, the multidimensional characteristic value in step S2 may store the invoice characteristic value of each dimension by using a merkel tree.
The invention verifies the authenticity of the invoice by using the public information query in the block chain, thereby realizing the online verification query of the invoice content. And related operations such as invoice invalidation, flushing and the like can be inquired. The entire history of changes for one invoice can be verified. Meanwhile, various sensitive information in the invoice can not be exposed by the public information, the related information of both the supplier and the seller in the invoice can not be caused, and the national tax data can not be revealed.
Drawings
FIG. 1 is a schematic diagram of the template definition of the present invention;
FIG. 2 is a schematic diagram of the process of converting invoice information into invoice feature values according to the present invention;
FIG. 3 is a diagram illustrating an exemplary process for converting blue invoice information into invoice feature values according to the present invention;
FIG. 4 is a top-up flow chart of invoice feature data of the present invention;
FIG. 5 is a flow chart of invoice verification according to the present invention.
Detailed Description
The embodiments of the present invention will be described below with reference to the drawings, but the present invention is not limited thereto. The components of the embodiments described below can be appropriately combined. In addition, some of the components may not be used.
And S1, defining an invoice template and establishing an invoice template library.
By using invoice templates, the purpose of which is to specify the data standard for extracting invoice characteristic values, invoice information in various formats is compatible by using different templates. Invoice templates are typically defined in terms of two dimensions, different formats and versions of the invoice. Different templates can be generally defined according to the format of the invoice, for example: the value-added tax special invoice, the motor vehicle sales unified invoice, the goods transportation industry value-added tax special invoice, the value-added tax common invoice, the value-added tax electronic common invoice, the value-added tax common invoice (roll invoice), the value-added tax electronic common invoice (toll), the second-hand vehicle sales unified invoice and the like. Different invoice templates are also defined for different time period versions of the same layout invoice type. Each invoice template corresponds to a template identification to identify the invoice template. The template identification of the invoice template in the application consists of an invoice format and an invoice version, for example, a 2005 invoice template of a common invoice of value-added tax, and the invoice identification is defined as 1000.2005; the first edition of invoice template of the value-added tax electronic invoice, the invoice identification is defined as 2000.0000. The template identifier is typically commonly assigned by the organization on the chain of the authorized data and is the unique identifier of the invoice template.
As shown in fig. 1, in the present invention, invoice templates can be established according to different formats of invoices and different time-period versions of the same format invoice file. The coordinate axes in fig. 1 represent the identifiers for distinguishing the templates from two directions, respectively, the first direction is a different layout file, and the second direction is the same layout and different versions. For example, from the format, the classification of invoices such as value-added tax special invoices, motor vehicle sales uniform invoices, freight transportation industry value-added tax special invoices, value-added tax common invoices, value-added tax electronic common invoices, value-added tax common invoices (roll tickets), value-added tax electronic common invoices (tolls), second-hand vehicle sales uniform invoices and the like are distinguished. The distinction from version includes each invoice category, which in turn includes versions first, 2015, etc. Fig. 1 is only an example, and the version may have a plurality of versions, and is not limited to two.
Each invoice template at least needs to comprise three fields of a unique identification mark, invoice content and an invoice distinguishing mark:
unique identification mark: is the unique mark of each invoice, and generally consists of an invoice code and an invoice number;
the invoice content is as follows: generally, the system at least comprises invoicing date, check code, purchaser name, seller name and invoice amount;
invoice distinguishing mark: the method is used for distinguishing invoice properties, and the invoice properties are generally divided into a blue invoice, a red invoice and a waste invoice.
S2, performing invoice data templating on the invoice data according to the corresponding invoice template;
selecting a corresponding invoice template according to the format and the version of the invoice, and obtaining a unique identification mark, invoice content and invoice distinguishing mark in the invoice template from the invoice;
and S3, calculating the characteristic value of the templated invoice.
The invoice characteristic value can be a one-dimensional characteristic value or a multi-dimensional characteristic value. The multidimensional characteristic value can expose more original invoice information, and the dimension of the invoice characteristic value to be saved can be determined according to the requirement of identification information to be made.
Multidimensional feature values may employ a merkel tree to store invoice feature values for each dimension.
And generating an invoice unique address for the unique identification mark in the invoice template by using a first encryption algorithm according to the templated invoice data, and generating an invoice characteristic value for the invoice content in the invoice template by using a second encryption algorithm. The first encryption algorithm that generates the invoice unique address and the second encryption algorithm that generates the invoice unique value may be the same or different. The first encryption algorithm and the second encryption algorithm are preferably hash algorithms.
As shown in fig. 2, the first encryption algorithm adopts a double SHA256 encryption algorithm, and the second encryption algorithm adopts a SHA256 encryption algorithm, so that the original data in the invoice is extracted according to the invoice template. Based on the unique identifier, i.e. the invoice code plus the invoice number, the double SHA256 encryption algorithm is used to generate the invoice unique address, i.e. SHA256 (unique identifier)) is used to generate the invoice unique address, which is also called the invoice hash address because of the hash algorithm. The invoice contents in the invoice template are generated into invoice characteristic values by using a SHA256 encryption algorithm. The invoice content generally comprises invoicing date, check code, purchaser name, seller name and invoice amount.
S4, linking invoice information;
the invoice chaining information comprises an invoice unique address, a template identifier, an invoice distinguishing mark, current time, an invoice characteristic value and an associated invoice unique address, and the invoice chaining information is subjected to data chaining operation. The current time is the time for packaging the uplink information of the invoice according to the requirement of a data structure; the associated invoice unique address is an invoice unique address for an invoice associated with the invoice, and the associated invoice information is linked together using the associated invoice unique address.
In the embodiment, a hash encryption algorithm is adopted, so that the unique invoice address is the hash invoice address, the unique associated invoice address is the hash associated invoice address, and the invoice distinguishing mark is divided into a blue invoice, a red invoice and a waste invoice according to the invoice property.
S41, upper chain of blue invoice information
The hash address of the invoice is calculated by the unique identification mark of the blue invoice, and the data chaining operation is carried out on the hash address of the invoice, the template information, the invoice distinguishing mark, the current date, the invoice characteristic value and the associated hash address of the invoice. The invoice distinguishing mark of the blue invoice is set to be 0001, the hash address of the associated invoice of the blue invoice is 0, and the blue invoice is not associated with other invoices.
S42, upper chain of information of red invoice
And calculating the invoice hash address of the red invoice through the unique identification mark, and performing data chaining operation on the invoice hash address, the template information, the invoice distinguishing mark, the current date, the invoice characteristic value and the associated invoice hash address. The invoice distinguishing mark of the red invoice is set to-0002, and the associated invoice hash address is the hash address of the blue invoice for flushing red invoice.
S43, upper chain of invalid invoice information
If the blue invoice information has been linked up, but the invoiced invoice needs to be voided. And the obsolete invoice calculates an invoice hash address through the unique identification mark, and performs data chaining operation on the invoice hash address, the template information, the invoice distinguishing mark, the current date, the invoice characteristic value and the associated invoice hash address. The invoice distinguishing mark of the invalidated invoice is-0001, and the associated invoice hash address of the invalidated invoice is the hash address of the invalidated blue invoice.
Fig. 4 is a diagram of an exemplary process for converting the blue invoice information into invoice feature values, which includes specific numerical values in the invoice template and values of the uplink data.
S5, verifying the invoice information;
this application is only verified invoice information, still uses the invoice information anti-fake measure that provides in the traditional mode to the work of discerning of invoice itself true and false, for example: the color of the light angle color-changing ring fiber, the papermaking anti-counterfeiting line, the anti-counterfeiting ink can be changed by wiping, and the special-shaped number and the composite information are used for anti-counterfeiting.
Using the same template as the template in the step S1 for the invoice needing to be verified, carrying out invoice data templating on the invoice, and calculating an invoice unique address by adopting a first encryption algorithm; retrieving related information on the public link through the unique invoice address, and if the related information is not retrieved, prompting that the invoice information is not linked; when the unique invoice address is searched, calculating the invoice characteristic value of the invoice needing to be verified by adopting a second encryption algorithm, comparing the calculated invoice characteristic value with the invoice characteristic value stored on the chain, and if the invoice characteristic value is the same as the invoice characteristic value, considering the invoice information to be valid, and if the invoice characteristic value is not the same as the invoice characteristic value, considering the invoice information to be invalid.
By associating the unique invoice address with the unique invoice address, the relevant invoice associated with an invoice can be retrieved. For example, a blue invoice associated with a red invoice may also be retrieved based on the associated invoice unique address.
Fig. 5 is a flowchart of verifying invoice information when the first encryption algorithm is a hash algorithm and the unique invoice address is an invoice hash address.
The invention can also be applied to the fields of certificate inquiry related to academic calendar inquiry, certificate inquiry, authentication inquiry and the like. The scene of the requirements of information checking authenticity, information leakage prevention and the like can be well solved. If it is necessary to check whether the multiple values are correct, the data can be stored and checked using a multidimensional invoice feature value structure.
Finally, it should be noted that: the above-mentioned embodiments are only used for illustrating the technical solution of the present invention, and not for limiting the same; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some or all of the technical features may be equivalently replaced; and the modifications or the substitutions do not make the essence of the corresponding technical solutions depart from the scope of the technical solutions of the embodiments of the present invention.

Claims (3)

1. An invoice checking method without revealing original information based on a block chain technology is characterized by comprising the following specific steps:
s1, defining an invoice template and establishing an invoice template library; the invoice template defines different invoice templates according to different formats and versions of invoices, each invoice template corresponds to a template identifier, and each invoice template at least needs to comprise a unique identification mark, invoice content and invoice distinguishing mark field:
the unique identification mark is the unique mark of each invoice and is formed by an invoice code and an invoice number;
the invoice content is as follows: at least comprising invoicing date, check code, purchaser name, seller name and invoice amount;
invoice distinguishing mark: the method is used for distinguishing invoice properties and comprises a blue invoice, a red invoice and a waste invoice;
s2, performing invoice data templating on the invoice according to the corresponding invoice template;
selecting a corresponding invoice template according to the format and the version of the invoice, and obtaining a unique identification mark, invoice content and invoice distinguishing mark in the invoice template from the invoice;
s3, according to the templated invoice data, generating an invoice unique address for the unique identification mark in the invoice template by using a first encryption algorithm, and generating an invoice characteristic value for the invoice content in the invoice template by using a second encryption algorithm;
s4, packing the unique invoice address, the template identifier, the invoice distinguishing mark, the current time, the invoice characteristic value and the associated unique invoice address into invoice uplink information, and writing the invoice uplink information into a block chain; wherein: the current time is the time for packaging the invoice uplink information;
the associated invoice unique address is the invoice unique address of the invoice associated with the invoice, and the related invoice information is linked together by using the associated invoice unique address;
s5, verifying the invoice information;
performing invoice data templating on invoices to be verified by using invoice templates in the invoice template library, and calculating an invoice unique address by adopting a first encryption algorithm; retrieving invoice information on the public link through the unique invoice address, and if the invoice information is not retrieved, prompting that the invoice information is not linked; when the unique invoice address is searched, calculating the invoice characteristic value of the invoice content by adopting a second encryption algorithm, comparing the calculated invoice characteristic value with the invoice characteristic value stored on the chain, if the invoice characteristic value is the same as the invoice characteristic value, considering the invoice information to be valid, if the invoice characteristic value is different from the invoice characteristic value, considering the invoice information to be invalid,
in step S3, the first encryption algorithm is a double SHA256 hash algorithm; the second encryption algorithm is SHA256 Hash algorithm; the unique invoice address is an invoice hash address, and the unique associated invoice address is an associated invoice hash address;
wherein, in the step S4:
the invoice distinguishing mark of the blue invoice is set to be 0001, the hash address of the associated invoice of the blue invoice is 0, and the blue invoice is not associated with other invoices;
the invoice distinguishing mark of the red invoice is set to-0002, and the associated invoice hash address is the hash address of the blue invoice for flushing red;
the invoice distinguishing mark of the invalidated invoice is set to be-0001, and the associated invoice hash address of the invalidated invoice is the hash address of the invalidated blue invoice.
2. The method for checking an invoice without revealing original information based on the blockchain technology as claimed in claim 1, wherein in step S1:
the format of the invoice at least comprises a value-added tax special invoice, a motor vehicle sales unified invoice, a goods transportation industry value-added tax special invoice, a value-added tax common invoice, a value-added tax electronic common invoice and a second-hand vehicle sales unified invoice.
3. The method for checking an invoice without revealing original information based on the blockchain technology as claimed in claim 1, wherein in step S2:
the invoice characteristic value is a one-dimensional characteristic value or a multi-dimensional characteristic value; the multidimensional feature values may employ a merkel tree to store invoice feature values for each dimension.
CN201810757523.9A 2018-07-11 2018-07-11 Invoice checking method without leakage of original information based on block chain technology Active CN108922012B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810757523.9A CN108922012B (en) 2018-07-11 2018-07-11 Invoice checking method without leakage of original information based on block chain technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810757523.9A CN108922012B (en) 2018-07-11 2018-07-11 Invoice checking method without leakage of original information based on block chain technology

Publications (2)

Publication Number Publication Date
CN108922012A CN108922012A (en) 2018-11-30
CN108922012B true CN108922012B (en) 2020-05-19

Family

ID=64411895

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810757523.9A Active CN108922012B (en) 2018-07-11 2018-07-11 Invoice checking method without leakage of original information based on block chain technology

Country Status (1)

Country Link
CN (1) CN108922012B (en)

Families Citing this family (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111311270A (en) * 2018-12-11 2020-06-19 航天信息股份有限公司 Method and device for checking electronic invoice based on block chain
CN110060111A (en) 2018-12-12 2019-07-26 阿里巴巴集团控股有限公司 Based on the invoice access method and device of block chain, electronic equipment
CN110020900A (en) * 2018-12-25 2019-07-16 阿里巴巴集团控股有限公司 Invoice based on block chain rushes red method and device and electronic equipment
CN110046900B (en) 2018-12-27 2024-04-05 创新先进技术有限公司 Invoice revocation method and device based on block chain and electronic equipment
CN110020902B (en) * 2018-12-27 2021-01-08 创新先进技术有限公司 Cross-link certificate storage method, access method, device and electronic equipment
CN109889343B (en) * 2018-12-29 2023-04-14 航天信息股份有限公司 Electronic invoice circulation control method, device and system
CN110599265B (en) * 2019-05-05 2021-05-14 腾讯科技(深圳)有限公司 Electronic bill processing method, electronic bill processing device, computer equipment and computer storage medium
CN110245945B (en) * 2019-05-20 2021-03-23 创新先进技术有限公司 Receipt storage method and node combining code marking and user type
CN110348441B (en) * 2019-07-10 2021-08-17 深圳市华云中盛科技股份有限公司 Value-added tax invoice identification method and device, computer equipment and storage medium
CN110599271A (en) * 2019-09-17 2019-12-20 腾讯科技(深圳)有限公司 Bill detection method and device, computer equipment and storage medium
CN110599207A (en) * 2019-09-20 2019-12-20 腾讯科技(深圳)有限公司 Invoice verification method, invoice verification device, invoice verification server and storage medium
CN110928534B (en) * 2019-10-14 2021-11-09 上海唯链信息科技有限公司 Workflow node authentication method and device based on block chain
CN110884535A (en) * 2019-11-20 2020-03-17 中车青岛四方机车车辆股份有限公司 Intelligent train system implementation method

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105610578B (en) * 2016-01-25 2019-05-03 杭州复杂美科技有限公司 Block chain information deposits card and method for secret protection
CN107786339A (en) * 2016-08-31 2018-03-09 陈新 It is layered controllable alliance's block catenary system
CN106952153A (en) * 2017-03-13 2017-07-14 广东网金控股股份有限公司 A kind of method of charging out based on block chain
CN106952124A (en) * 2017-03-16 2017-07-14 北京牛链科技有限公司 Electronic bill management system and method based on distribution book keeping operation
CN111865586B (en) * 2017-11-23 2023-01-10 创新先进技术有限公司 Method and device for encrypting product information
CN108197957A (en) * 2018-01-12 2018-06-22 北京欧链科技有限公司 A kind of method for anti-counterfeit and system based on block chain
CN108269351B (en) * 2018-01-15 2019-06-07 中链科技有限公司 A kind of digital ticket information processing method and system

Also Published As

Publication number Publication date
CN108922012A (en) 2018-11-30

Similar Documents

Publication Publication Date Title
CN108922012B (en) Invoice checking method without leakage of original information based on block chain technology
US20230334480A1 (en) Decentralized title transfer and validation of assets
US20220253868A1 (en) Title registration system and protocol
US20220391926A1 (en) Blockchain-based product authentication system
US20200111068A1 (en) Title Registration System and Protocol
CN109416815B (en) Electronic file platform
CN111177275A (en) Block chain-based management method, terminal, device and storage medium
JP2021519488A (en) Systems and methods for using code and images within the blockchain
US11418336B2 (en) Digital ledger for unique item IDs with ownership
US20050234823A1 (en) Systems and methods to prevent products from counterfeiting and surplus production also of tracking their way of distribution.
CN116671087A (en) System and method for building blockchains to validate smart contract assets
KR20000069550A (en) Method and system for processing electronic documents
US20120136792A1 (en) Method for managing commodity circulation based on internet
CN112288442A (en) Associated customized image code anti-counterfeiting tracing system and application component
CN111125785A (en) Account checking method based on block chain, account checking device and readable storage medium
CN111967821A (en) Method, device, equipment and system for generating clearance confirmation information
BR112019017659A2 (en) METHODS, SYSTEM, ELECTRONIC DEVICES FOR DATABASE RECORDS AND COMPUTER PROGRAM PRODUCT
Liotine et al. The supply blockchain: integrating blockchain technology within supply chain operations
WO2015044693A1 (en) A method of providing content
JP7477937B1 (en) Appraisal and certification system and appraisal and certification method
US20170323106A1 (en) System and method for encrypting data in electronic documents
Saxena et al. Blockchain Based Fake Item Identification System
Nagar et al. Product Authentication System using Blockchain
CN113159768B (en) Transaction certificate storage method, device and equipment
JP7371301B2 (en) Product authentication system and method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP03 Change of name, title or address

Address after: 501-018, floor 5, No. 15, wanquanzhuang Road, Haidian District, Beijing 100089

Patentee after: Dajingfang Network Technology Co.,Ltd.

Address before: 100000 405, No. 15, wanquanzhuang Road, Haidian District, Beijing

Patentee before: BEIJING DAZHANGFANG NETWORK TECHNOLOGY Co.,Ltd.

CP03 Change of name, title or address