CN110535819A - A kind of application method of asymmetric encryption techniques on block chain is anti-fake - Google Patents

A kind of application method of asymmetric encryption techniques on block chain is anti-fake Download PDF

Info

Publication number
CN110535819A
CN110535819A CN201811235587.9A CN201811235587A CN110535819A CN 110535819 A CN110535819 A CN 110535819A CN 201811235587 A CN201811235587 A CN 201811235587A CN 110535819 A CN110535819 A CN 110535819A
Authority
CN
China
Prior art keywords
block chain
fake
asymmetric encryption
application method
public key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811235587.9A
Other languages
Chinese (zh)
Inventor
朱胜
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201811235587.9A priority Critical patent/CN110535819A/en
Publication of CN110535819A publication Critical patent/CN110535819A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

A kind of application method of asymmetric encryption techniques on block chain is anti-fake, this method are the technologies using asymmetric encryption, block chain intelligence contract will be written after merchandise news and the data public key encryption that needs to encrypt.User verifies the true and false of commodity by chain query on private key, using the transparent, openly of block chain data, can not distort, so that the interests of producer, user are all preferably ensured.This method allows commodity to realize primary packaging, the process of opening in virtual digital world, and whole process is irreversible, is applied to the fields such as anti-fake, logistics, can be very good the authenticity for guaranteeing commodity.Operation of the present invention is simple, and implementation cost is low, economic benefit, and social benefit is huge.

Description

A kind of application method of asymmetric encryption techniques on block chain is anti-fake
Technical field
The method of the present invention is related to the technical field of block chain and asymmetric encryption, specifically a kind of to utilize asymmetric encryption Technology can not distort in conjunction with the data transparency, openly of block chain, by the process for encrypting and decrypting, allow commodity in virtual number Primary packaging, the process of opening are realized in the word world, and whole process is irreversible.
Background technique
Under traditional mode, the method for anti-counterfeit of product has very much, and the method for fraud is also very much, how should prevent by not Method molecule is faked, and also to prevent producer oneself from faking, and this method is the data transparency, openly using block chain, can not be distorted, can To supervise well, due to can not distorting for data, to make a fake products, it is necessary to there is the key of a genuine article to be corresponding to it, Considerably increase the difficulty of fraud.
Summary of the invention
Intelligent contract and asymmetric encryption techniques of the method for the present invention based on block chain, encryption, decryption are all recorded in area On block chain, data are open and clear, can be applied to product false proof, and logistics express delivery is signed for, and concrete operations process is as follows:
1, block chain intelligence contract is built;
2, the member that block chain is added is authenticated, enterprise, the organization and individual only voluntarily to follow rules can just add Enter;
4, member's typing merchandise news, generation public key and private key two dimensional code on block chain intelligence contract, will need anti-fake The information such as commodity data and the data public key encryption that needs to encrypt after block chain is written;
5, when commodity need to verify, private key two dimensional code is scanned, inquires the information that this commodity records on block chain, and solve Close encryption data, generates verifying record on block chain, and verifying terminates.
Specific embodiment
By taking application of the invention method on commodity counterfeit prevention as an example
1, production firm registers on block chain first, and carries out authentication, obtains the number label by certification Name;
2, with asymmetric encryption techniques, a pair of of public key and private key is generated, anti-fake product information will be needed and need to encrypt Data public key encryption after be written block chain intelligence contract in;
3, the corresponding private key of this public key two dimensional code is generated to be placed in packaging bag, wherein two dimensional code is covered with coat, Or private key is placed in recesses;
4, after client enrollment registration, private key two dimensional code is scanned using special-purpose software, logs in publicly-owned chain query merchandise news, and Ciphertext data, confirmation private key have not been used, and verifying terminates.
By taking application of the invention method in express delivery industry as an example
1, express company registers on block chain first, and carries out authentication, obtains the number label by certification Name;
2, with asymmetric encryption techniques, a pair of of public key and private key is generated, public key, private key two dimensional code are printed on express delivery list On, private key is covered with coat, and public key replaces the odd numbers of existing express delivery, all to want the information of typing express delivery odd numbers all in the past To pass through scanning public key two dimensional code typing information, and block chain is written;
5, after client enrollment registration, express delivery list is signed for using special-purpose software scanning private key two dimensional code, after signing for, block chain will Receipt information, including recipient are recorded, the time is signed for, signs for place etc..

Claims (6)

1. a kind of application method of asymmetric encryption techniques on block chain is anti-fake, comprising: first using the technology of asymmetric encryption Block chain intelligence contract is written after being encrypted the commodity data for needing to encrypt with public key in key to Mr. in a pair, when user needs When verifying commodity, with the corresponding private key cochain ciphertext data of public key, encryption data is obtained, confirms commodity, and verifying record is write Enter block chain.
2. application method of the asymmetric encryption techniques according to claim 1 on block chain is anti-fake, it is characterised in that: In Main algorithm used in asymmetric encryption includes but is not limited to: RSA, Elgamal, knapsack algorithm, Rabin, D-H, ECC are (ellipse Circular curve Encryption Algorithm) etc..
3. application method of the asymmetric encryption techniques according to claim 1 on block chain is anti-fake, it is characterised in that: such as Fruit public key encryption, is just decrypted with private key, just uses public key decryptions with private key encryption, public key and private key are corresponding.
4. application method of the asymmetric encryption techniques according to claim 1 on block chain is anti-fake, it is characterised in that: will Block chain intelligence contract is written in the data of public key encryption.
5. application method of the asymmetric encryption techniques according to claim 1 on block chain is anti-fake, it is characterised in that: private After key cochain decryption verification, a verifying record will be generated on block chain.
6. application method of the asymmetric encryption techniques according to claim 1 on block chain is anti-fake, it is characterised in that: this The block chain of inventive method meaning includes but is not limited to publicly-owned chain, privately owned chain and alliance's chain.
CN201811235587.9A 2018-10-22 2018-10-22 A kind of application method of asymmetric encryption techniques on block chain is anti-fake Pending CN110535819A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811235587.9A CN110535819A (en) 2018-10-22 2018-10-22 A kind of application method of asymmetric encryption techniques on block chain is anti-fake

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811235587.9A CN110535819A (en) 2018-10-22 2018-10-22 A kind of application method of asymmetric encryption techniques on block chain is anti-fake

Publications (1)

Publication Number Publication Date
CN110535819A true CN110535819A (en) 2019-12-03

Family

ID=68658957

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811235587.9A Pending CN110535819A (en) 2018-10-22 2018-10-22 A kind of application method of asymmetric encryption techniques on block chain is anti-fake

Country Status (1)

Country Link
CN (1) CN110535819A (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106570710A (en) * 2016-10-27 2017-04-19 纸飞机(北京)科技有限公司 Commodity anti-counterfeiting method and device
CN107292629A (en) * 2017-05-12 2017-10-24 深圳蜂链科技有限公司 Anti-counterfeit tracking verification method based on block chain and the device using this method
CN107341676A (en) * 2017-07-17 2017-11-10 深圳天净喔溯源科技有限公司 False proof mark and the method for tracing to the source
CN107730278A (en) * 2017-10-18 2018-02-23 上海唯链信息科技有限公司 A kind of false proof and retroactive method of the medicine based on block chain technology
US20180130050A1 (en) * 2016-11-07 2018-05-10 LedgerDomain, LLC Extended blockchains for event tracking and management
CN108681904A (en) * 2018-04-01 2018-10-19 蒋欣言 A kind of fake certification implementation method of bottled formula commodity

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106570710A (en) * 2016-10-27 2017-04-19 纸飞机(北京)科技有限公司 Commodity anti-counterfeiting method and device
US20180130050A1 (en) * 2016-11-07 2018-05-10 LedgerDomain, LLC Extended blockchains for event tracking and management
CN107292629A (en) * 2017-05-12 2017-10-24 深圳蜂链科技有限公司 Anti-counterfeit tracking verification method based on block chain and the device using this method
CN107341676A (en) * 2017-07-17 2017-11-10 深圳天净喔溯源科技有限公司 False proof mark and the method for tracing to the source
CN107730278A (en) * 2017-10-18 2018-02-23 上海唯链信息科技有限公司 A kind of false proof and retroactive method of the medicine based on block chain technology
CN108681904A (en) * 2018-04-01 2018-10-19 蒋欣言 A kind of fake certification implementation method of bottled formula commodity

Similar Documents

Publication Publication Date Title
CN101369306B (en) Electronic label security system
ES2881289T3 (en) Method to manage a trusted identity
JP2018516030A (en) ID management service using blockchain
WO2021174927A1 (en) Blockchain-based identity verification method and apparatus, device, and storage medium
CN109583219A (en) A kind of data signature, encryption and preservation method, apparatus and equipment
CN102930307A (en) Anti-counterfeiting authentication method for famous wine
CN107547203B (en) Anti-counterfeiting tracing method and system
CN106998252B (en) Lightweight RFID cluster label authentication method based on cloud database
CN102750496A (en) Secure access authentication method for removable storage media
Khalil et al. A novel RFID-based anti-counterfeiting scheme for retail environments
CN104809490A (en) Card anti-counterfeiting system based on multidimensional code and authentication method based on card anti-counterfeiting system
CN106548353A (en) A kind of commodity counterfeit prevention code is generated and verification method
CN110414193A (en) A kind of safe encryption method and system of the close PDF document E-seal of state
CN109614802A (en) The signature method and sealing system of anti-quantum calculation
CN108681904A (en) A kind of fake certification implementation method of bottled formula commodity
CN102299793A (en) Certificate authentication system based on trusted computing password support platform
CN106713336A (en) Electronic data safekeeping system and method based on double and asymmetric encryption technology
CN104112205A (en) Commodity authentication and source tracing system and method based on combined public-key cryptosystem
CN106953732A (en) The key management system and method for chip card
CN104574119B (en) A kind of method that commodity Jianzhen traces to the source
Parate et al. Digital identity verification: transforming KYC processes in banking through advanced technology and enhanced security measures
CN107730280A (en) A kind of design and realization of the Antiforge system based on block chain technology
CN109560935A (en) The signature method and sealing system of anti-quantum calculation based on public asymmetric key pond
CN109413116A (en) A kind of believable cloud identity identifying method and system
CN104424568A (en) Authentication false-proof traceability system employing circuit core chip ID number as identification

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20191203