CN110535819A - A kind of application method of asymmetric encryption techniques on block chain is anti-fake - Google Patents
A kind of application method of asymmetric encryption techniques on block chain is anti-fake Download PDFInfo
- Publication number
- CN110535819A CN110535819A CN201811235587.9A CN201811235587A CN110535819A CN 110535819 A CN110535819 A CN 110535819A CN 201811235587 A CN201811235587 A CN 201811235587A CN 110535819 A CN110535819 A CN 110535819A
- Authority
- CN
- China
- Prior art keywords
- block chain
- fake
- asymmetric encryption
- application method
- public key
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Storage Device Security (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
A kind of application method of asymmetric encryption techniques on block chain is anti-fake, this method are the technologies using asymmetric encryption, block chain intelligence contract will be written after merchandise news and the data public key encryption that needs to encrypt.User verifies the true and false of commodity by chain query on private key, using the transparent, openly of block chain data, can not distort, so that the interests of producer, user are all preferably ensured.This method allows commodity to realize primary packaging, the process of opening in virtual digital world, and whole process is irreversible, is applied to the fields such as anti-fake, logistics, can be very good the authenticity for guaranteeing commodity.Operation of the present invention is simple, and implementation cost is low, economic benefit, and social benefit is huge.
Description
Technical field
The method of the present invention is related to the technical field of block chain and asymmetric encryption, specifically a kind of to utilize asymmetric encryption
Technology can not distort in conjunction with the data transparency, openly of block chain, by the process for encrypting and decrypting, allow commodity in virtual number
Primary packaging, the process of opening are realized in the word world, and whole process is irreversible.
Background technique
Under traditional mode, the method for anti-counterfeit of product has very much, and the method for fraud is also very much, how should prevent by not
Method molecule is faked, and also to prevent producer oneself from faking, and this method is the data transparency, openly using block chain, can not be distorted, can
To supervise well, due to can not distorting for data, to make a fake products, it is necessary to there is the key of a genuine article to be corresponding to it,
Considerably increase the difficulty of fraud.
Summary of the invention
Intelligent contract and asymmetric encryption techniques of the method for the present invention based on block chain, encryption, decryption are all recorded in area
On block chain, data are open and clear, can be applied to product false proof, and logistics express delivery is signed for, and concrete operations process is as follows:
1, block chain intelligence contract is built;
2, the member that block chain is added is authenticated, enterprise, the organization and individual only voluntarily to follow rules can just add
Enter;
4, member's typing merchandise news, generation public key and private key two dimensional code on block chain intelligence contract, will need anti-fake
The information such as commodity data and the data public key encryption that needs to encrypt after block chain is written;
5, when commodity need to verify, private key two dimensional code is scanned, inquires the information that this commodity records on block chain, and solve
Close encryption data, generates verifying record on block chain, and verifying terminates.
Specific embodiment
By taking application of the invention method on commodity counterfeit prevention as an example
1, production firm registers on block chain first, and carries out authentication, obtains the number label by certification
Name;
2, with asymmetric encryption techniques, a pair of of public key and private key is generated, anti-fake product information will be needed and need to encrypt
Data public key encryption after be written block chain intelligence contract in;
3, the corresponding private key of this public key two dimensional code is generated to be placed in packaging bag, wherein two dimensional code is covered with coat,
Or private key is placed in recesses;
4, after client enrollment registration, private key two dimensional code is scanned using special-purpose software, logs in publicly-owned chain query merchandise news, and
Ciphertext data, confirmation private key have not been used, and verifying terminates.
By taking application of the invention method in express delivery industry as an example
1, express company registers on block chain first, and carries out authentication, obtains the number label by certification
Name;
2, with asymmetric encryption techniques, a pair of of public key and private key is generated, public key, private key two dimensional code are printed on express delivery list
On, private key is covered with coat, and public key replaces the odd numbers of existing express delivery, all to want the information of typing express delivery odd numbers all in the past
To pass through scanning public key two dimensional code typing information, and block chain is written;
5, after client enrollment registration, express delivery list is signed for using special-purpose software scanning private key two dimensional code, after signing for, block chain will
Receipt information, including recipient are recorded, the time is signed for, signs for place etc..
Claims (6)
1. a kind of application method of asymmetric encryption techniques on block chain is anti-fake, comprising: first using the technology of asymmetric encryption
Block chain intelligence contract is written after being encrypted the commodity data for needing to encrypt with public key in key to Mr. in a pair, when user needs
When verifying commodity, with the corresponding private key cochain ciphertext data of public key, encryption data is obtained, confirms commodity, and verifying record is write
Enter block chain.
2. application method of the asymmetric encryption techniques according to claim 1 on block chain is anti-fake, it is characterised in that: In
Main algorithm used in asymmetric encryption includes but is not limited to: RSA, Elgamal, knapsack algorithm, Rabin, D-H, ECC are (ellipse
Circular curve Encryption Algorithm) etc..
3. application method of the asymmetric encryption techniques according to claim 1 on block chain is anti-fake, it is characterised in that: such as
Fruit public key encryption, is just decrypted with private key, just uses public key decryptions with private key encryption, public key and private key are corresponding.
4. application method of the asymmetric encryption techniques according to claim 1 on block chain is anti-fake, it is characterised in that: will
Block chain intelligence contract is written in the data of public key encryption.
5. application method of the asymmetric encryption techniques according to claim 1 on block chain is anti-fake, it is characterised in that: private
After key cochain decryption verification, a verifying record will be generated on block chain.
6. application method of the asymmetric encryption techniques according to claim 1 on block chain is anti-fake, it is characterised in that: this
The block chain of inventive method meaning includes but is not limited to publicly-owned chain, privately owned chain and alliance's chain.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811235587.9A CN110535819A (en) | 2018-10-22 | 2018-10-22 | A kind of application method of asymmetric encryption techniques on block chain is anti-fake |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811235587.9A CN110535819A (en) | 2018-10-22 | 2018-10-22 | A kind of application method of asymmetric encryption techniques on block chain is anti-fake |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110535819A true CN110535819A (en) | 2019-12-03 |
Family
ID=68658957
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811235587.9A Pending CN110535819A (en) | 2018-10-22 | 2018-10-22 | A kind of application method of asymmetric encryption techniques on block chain is anti-fake |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110535819A (en) |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106570710A (en) * | 2016-10-27 | 2017-04-19 | 纸飞机(北京)科技有限公司 | Commodity anti-counterfeiting method and device |
CN107292629A (en) * | 2017-05-12 | 2017-10-24 | 深圳蜂链科技有限公司 | Anti-counterfeit tracking verification method based on block chain and the device using this method |
CN107341676A (en) * | 2017-07-17 | 2017-11-10 | 深圳天净喔溯源科技有限公司 | False proof mark and the method for tracing to the source |
CN107730278A (en) * | 2017-10-18 | 2018-02-23 | 上海唯链信息科技有限公司 | A kind of false proof and retroactive method of the medicine based on block chain technology |
US20180130050A1 (en) * | 2016-11-07 | 2018-05-10 | LedgerDomain, LLC | Extended blockchains for event tracking and management |
CN108681904A (en) * | 2018-04-01 | 2018-10-19 | 蒋欣言 | A kind of fake certification implementation method of bottled formula commodity |
-
2018
- 2018-10-22 CN CN201811235587.9A patent/CN110535819A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106570710A (en) * | 2016-10-27 | 2017-04-19 | 纸飞机(北京)科技有限公司 | Commodity anti-counterfeiting method and device |
US20180130050A1 (en) * | 2016-11-07 | 2018-05-10 | LedgerDomain, LLC | Extended blockchains for event tracking and management |
CN107292629A (en) * | 2017-05-12 | 2017-10-24 | 深圳蜂链科技有限公司 | Anti-counterfeit tracking verification method based on block chain and the device using this method |
CN107341676A (en) * | 2017-07-17 | 2017-11-10 | 深圳天净喔溯源科技有限公司 | False proof mark and the method for tracing to the source |
CN107730278A (en) * | 2017-10-18 | 2018-02-23 | 上海唯链信息科技有限公司 | A kind of false proof and retroactive method of the medicine based on block chain technology |
CN108681904A (en) * | 2018-04-01 | 2018-10-19 | 蒋欣言 | A kind of fake certification implementation method of bottled formula commodity |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101369306B (en) | Electronic label security system | |
ES2881289T3 (en) | Method to manage a trusted identity | |
JP2018516030A (en) | ID management service using blockchain | |
WO2021174927A1 (en) | Blockchain-based identity verification method and apparatus, device, and storage medium | |
CN109583219A (en) | A kind of data signature, encryption and preservation method, apparatus and equipment | |
CN102930307A (en) | Anti-counterfeiting authentication method for famous wine | |
CN107547203B (en) | Anti-counterfeiting tracing method and system | |
CN106998252B (en) | Lightweight RFID cluster label authentication method based on cloud database | |
CN102750496A (en) | Secure access authentication method for removable storage media | |
Khalil et al. | A novel RFID-based anti-counterfeiting scheme for retail environments | |
CN104809490A (en) | Card anti-counterfeiting system based on multidimensional code and authentication method based on card anti-counterfeiting system | |
CN106548353A (en) | A kind of commodity counterfeit prevention code is generated and verification method | |
CN110414193A (en) | A kind of safe encryption method and system of the close PDF document E-seal of state | |
CN109614802A (en) | The signature method and sealing system of anti-quantum calculation | |
CN108681904A (en) | A kind of fake certification implementation method of bottled formula commodity | |
CN102299793A (en) | Certificate authentication system based on trusted computing password support platform | |
CN106713336A (en) | Electronic data safekeeping system and method based on double and asymmetric encryption technology | |
CN104112205A (en) | Commodity authentication and source tracing system and method based on combined public-key cryptosystem | |
CN106953732A (en) | The key management system and method for chip card | |
CN104574119B (en) | A kind of method that commodity Jianzhen traces to the source | |
Parate et al. | Digital identity verification: transforming KYC processes in banking through advanced technology and enhanced security measures | |
CN107730280A (en) | A kind of design and realization of the Antiforge system based on block chain technology | |
CN109560935A (en) | The signature method and sealing system of anti-quantum calculation based on public asymmetric key pond | |
CN109413116A (en) | A kind of believable cloud identity identifying method and system | |
CN104424568A (en) | Authentication false-proof traceability system employing circuit core chip ID number as identification |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20191203 |