CN111143466A - Data anti-counterfeiting method based on block chain - Google Patents

Data anti-counterfeiting method based on block chain Download PDF

Info

Publication number
CN111143466A
CN111143466A CN201911098040.3A CN201911098040A CN111143466A CN 111143466 A CN111143466 A CN 111143466A CN 201911098040 A CN201911098040 A CN 201911098040A CN 111143466 A CN111143466 A CN 111143466A
Authority
CN
China
Prior art keywords
data
platform
user
data platform
block
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201911098040.3A
Other languages
Chinese (zh)
Other versions
CN111143466B (en
Inventor
张新龙
王纯斌
李骥东
王波
李业晨
葛兵
张皖娜
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chengdu Sefon Software Co Ltd
Original Assignee
Chengdu Sefon Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chengdu Sefon Software Co Ltd filed Critical Chengdu Sefon Software Co Ltd
Priority to CN201911098040.3A priority Critical patent/CN111143466B/en
Publication of CN111143466A publication Critical patent/CN111143466A/en
Application granted granted Critical
Publication of CN111143466B publication Critical patent/CN111143466B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/50Information retrieval; Database structures therefor; File system structures therefor of still image data
    • G06F16/51Indexing; Data structures therefor; Storage structures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/50Information retrieval; Database structures therefor; File system structures therefor of still image data
    • G06F16/58Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually
    • G06F16/5866Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually using information manually generated, e.g. tags, keywords, comments, manually generated location and time information
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/70Information retrieval; Database structures therefor; File system structures therefor of video data
    • G06F16/71Indexing; Data structures therefor; Storage structures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/70Information retrieval; Database structures therefor; File system structures therefor of video data
    • G06F16/78Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually
    • G06F16/7867Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually using information manually generated, e.g. tags, keywords, comments, title and artist information, manually generated time, location and usage information, user ratings
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/16Program or content traceability, e.g. by watermarking

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Software Systems (AREA)
  • Multimedia (AREA)
  • Library & Information Science (AREA)
  • Computing Systems (AREA)
  • Technology Law (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a data anti-counterfeiting method based on a block chain, and provides a data anti-counterfeiting method based on an alliance chain. The block chain technology is used to protect the uniqueness of the data on the data platform, so as to achieve the method of identifying the ownership of the data. When a user uploads data to a data platform, the data platform processes the data to obtain tag codes of the data, the tag codes correspond to the data one by one, the data platform transmits the tag codes of the data and uploading time to a alliance chain established by the data platform and the user together, the data platform inquires the data on the alliance chain after receiving complaints of the user, judges the respective uploading time of the data uploaded by the user and the data complained, removes the later uploaded data, protects the uniqueness of the data on the data platform, and achieves the purpose of identifying the ownership of the data.

Description

Data anti-counterfeiting method based on block chain
Technical Field
The invention relates to the field of block chains, in particular to a data anti-counterfeiting method based on a block chain.
Background
The analysis of big data is more and more important in various industries, especially some high-quality preprocessed data have great value, and with the growth of artificial intelligence application, obtaining structured big data is more and more important. For example, in medical data, doctors and researchers need to spend a lot of manpower and material resources to label and clean raw data of hospitals. However, these data often cannot exert the value of the papers after the papers are published, and hospitals also set out many restrictive policies for the sharing of data.
The development of the block chain brings a new revolution to the modern digital economy era, and different organizations, different people and different identities can trust each other in the block chain, so that the problem of fraud in value transaction is fundamentally solved. The system of blockchains can be divided into such layers: a data layer, a network layer, a consensus layer, a stimulus layer, a contract layer, and an application layer. The bottom layer of the block chain forms a data storage mechanism of the bottom layer of the block chain through data blocks, an encryption algorithm and the like. Due to the data consensus property and mechanism of the blockchain, it is difficult to store large resources and data files in the blockchain, and as the resource data increases, the storage cost increases.
On the existing data platform, if data with higher similarity appears, the ownership of determining who uploads the data first is generally realized by looking up log data of the data platform, but the public credibility of the data authority is lower by judging the log, because the log is in the management system of the data platform, the suspicion of counterfeiting exists, and the suspicion is easily caused.
Disclosure of Invention
The invention aims to: the data anti-counterfeiting method based on the block chain solves the problems that when the similarity of the existing data is high, the data ownership public credibility is low through judging by logs of a data platform, and because the logs are all in a management system of the data platform, the data ownership is suspected to be fake, and the data ownership is easy to be suspected to be questioned.
The technical scheme adopted by the invention is as follows:
a data anti-counterfeiting method based on a block chain comprises the following steps:
s1, establishing a set of alliance chain system, and adding the data platform and the user of the data platform into the alliance chain;
s2, after the user uploads the data to the data platform, the data platform generates a block in which a tag code of the data and uploading time are recorded on the alliance chain, and meanwhile, the data platform adds the tag code of the data to the data uploaded by the user for storage;
s3, when the user finds that the data platform has the data which is the same as the data uploaded by the user, the user initiates complaints to the data platform;
s4, after receiving the complaint of the user, the data platform reads the tag codes in the data of the user initiating the complaint and the tag codes of the complaint data, then inquires the blocks corresponding to the two tag codes respectively on the alliance chain, judges the uploading time of the data corresponding to the two tag codes according to the uploading time recorded by the blocks, judges that the complaint is valid when the data of the user initiating the complaint is uploaded first, and judges that the complaint is invalid otherwise.
A data anti-counterfeiting method based on a alliance chain is provided. The block chain technology is used to protect the uniqueness of the data on the data platform, so as to achieve the method of identifying the ownership of the data. When a user uploads data to a data platform, the data platform processes the data to obtain tag codes of the data, the tag codes correspond to the data one by one, the data platform transmits the tag codes of the data and uploading time to a alliance chain established by the data platform and the user together, the data platform inquires the data on the alliance chain after receiving complaints of the user, judges the respective uploading time of the data uploaded by the user and the data complained, removes the later uploaded data, protects the uniqueness of the data on the data platform, and achieves the purpose of identifying the ownership of the data.
Further, in step S1, the data platform and each user of the data platform join the federation chain as independent enterprises.
Further, the method for joining the data platform and the user of the data platform into the federation chain in step S1 includes the following steps:
s101, setting all users needing to join the alliance chain and a data platform as mutually independent mechanisms;
s102, compiling an intelligent contract for data uplink;
s103, establishing a alliance, and adding the enterprises set in the step S101 into the alliance;
and S104, creating a channel, adding all mechanisms into the channel, and deploying the intelligent contract written in the S102 into the channel.
Further, the method for the data platform to generate a block with a tag code and an upload time recorded thereon in the federation chain in step S2 includes the following steps:
s201, after a user uploads data to a data platform, the data platform generates a block on a alliance chain;
s202, the data platform reads a block head of the block, and takes a block hash recorded by the block head as a tag code of the data uploaded in the step S201;
s203, the data platform writes the uploading time of the data into the block body and then carries out block discharging.
Further, the method for the data platform to generate a block with a tag code and an upload time recorded thereon in the federation chain in step S2 includes the following steps:
s211, after the user uploads the data to the data platform, the data platform generates a block on the alliance chain;
s212, reading the data by the data platform, and performing encryption operation on the data to obtain a tag code of the data;
s213, the data platform writes the tag code and the upload time of the data into the block generated in step S211, and then performs block output.
Further, the encryption operation in step S212 uses an irreversible encryption algorithm. The irreversible encryption algorithm is characterized in that a secret key is not needed in the encryption process, the system directly processes the input plaintext into a ciphertext through the encryption algorithm, the encrypted data cannot be decrypted, and the data can be really decrypted only by re-inputting the plaintext and re-processing the plaintext through the same irreversible encryption algorithm to obtain the same encrypted ciphertext which is re-identified by the system. Common irreversible encryption algorithms include MD5 and SHA 256.
Further, the type of the data is one of video or picture.
Further, the method for adding the data tag code to the data uploaded by the user for storage by the data platform in step S2 includes the following steps:
s221, processing the tag code of the data by the data platform, generating a two-dimensional code according to the tag code of the data, entering step S222 when the type of the data is a picture, and entering step S222 when the type of the data is a video;
s222, inserting the two-dimensional code into each picture by the data platform;
s223, inserting the two-dimensional code into the image of at least one frame of the video by the data platform.
Further, in step S4, after receiving the complaint of the user, the data platform reads the tag code in the data of the user who initiated the complaint and the tag code of the complaint data through the two-dimensional code.
In summary, due to the adoption of the technical scheme, the invention has the beneficial effects that:
1. the invention relates to a data anti-counterfeiting method based on a block chain, which utilizes an alliance chain to ensure that the attribution of data is more fair and not a data platform, so that the processing result is easier to convince;
2. the invention relates to a data anti-counterfeiting method based on a block chain, which is a method with a plurality of label code generation methods and is convenient for a data platform and a user to select;
3. according to the data anti-counterfeiting method based on the block chain, the data ownership public trust is judged to be low through the logs of the data platform when the existing data similarity is high, and the logs are all in the management system of the data platform, so that the problem of suspicion is easily caused.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention clearer, the present invention is further described in detail below, the described embodiments should not be construed as limiting the present invention, and all other embodiments obtained by a person of ordinary skill in the art without creative efforts shall fall within the protection scope of the present invention.
Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs. The terminology used herein is for the purpose of describing embodiments of the invention only and is not intended to be limiting of the invention.
Before further detailed description of the embodiments of the present invention, terms and expressions mentioned in the embodiments of the present invention are explained, and the terms and expressions mentioned in the embodiments of the present invention are applied to the following explanations.
The mechanism is as follows: a network entity for maintaining a set of containers for the Ledger, executive contracts;
a channel: the private atomic broadcast channel is divided and managed by the sequencing node, and the aim is to isolate the information of the channel, so that an entity outside the channel cannot access the information in the channel, and the privacy of transaction is realized;
intelligent contract: is a computer protocol intended to propagate, validate or execute contracts in an informational manner. Smart contracts allow trusted transactions to be conducted without third parties, which are traceable and irreversible, deployed on various nodes, and which may be invoked as a piece of program code that interacts with a distributed ledger.
Example 1
A data anti-counterfeiting method based on a block chain comprises the following steps:
s1, establishing a set of alliance chain system, and adding the data platform and the user of the data platform into the alliance chain;
s2, after the user uploads the data to the data platform, the data platform generates a block in which a tag code of the data and uploading time are recorded on the alliance chain, and meanwhile, the data platform adds the tag code of the data to the data uploaded by the user for storage;
s3, when the user finds that the data platform has the data which is the same as the data uploaded by the user, the user initiates complaints to the data platform;
s4, after receiving the complaint of the user, the data platform reads the tag codes in the data of the user initiating the complaint and the tag codes of the complaint data, then inquires the blocks corresponding to the two tag codes respectively on the alliance chain, judges the uploading time of the data corresponding to the two tag codes according to the uploading time recorded by the blocks, judges that the complaint is valid when the data of the user initiating the complaint is uploaded first, and judges that the complaint is invalid otherwise.
A data anti-counterfeiting method based on a alliance chain is provided. The block chain technology is used to protect the uniqueness of the data on the data platform, so as to achieve the method of identifying the ownership of the data. When a user uploads data to a data platform, the data platform processes the data to obtain tag codes of the data, the tag codes correspond to the data one by one, the data platform transmits the tag codes of the data and uploading time to a alliance chain established by the data platform and the user together, the data platform inquires the data on the alliance chain after receiving complaints of the user, judges the respective uploading time of the data uploaded by the user and the data complained, removes the later uploaded data, protects the uniqueness of the data on the data platform, and achieves the purpose of identifying the ownership of the data.
Example 2
In this embodiment, on the basis of embodiment 1, in step S1, the data platform and each user of the data platform are respectively added to the federation chain as independent enterprises.
Example 3
In this embodiment, based on embodiment 2, the method for joining the data platform and the user of the data platform into the federation chain in step S1 includes the following steps:
s101, setting all users needing to join the alliance chain and a data platform as mutually independent mechanisms;
s102, compiling an intelligent contract for data uplink;
s103, establishing a alliance, and adding the enterprises set in the step S101 into the alliance;
and S104, creating a channel, adding all mechanisms into the channel, and deploying the intelligent contract written in the S102 into the channel.
Further, the method for the data platform to generate a block with a tag code and an upload time recorded thereon in the federation chain in step S2 includes the following steps:
s201, after a user uploads data to a data platform, the data platform generates a block on a alliance chain;
s202, the data platform reads a block head of the block, and takes a block hash recorded by the block head as a tag code of the data uploaded in the step S201;
s203, the data platform writes the uploading time of the data into the block body and then carries out block discharging.
Example 4
The present embodiment is different from embodiment 3 in that the method for generating a block with a tag code and an upload time recorded thereon by the data platform in the federation chain in step S2 includes the following steps:
s211, after the user uploads the data to the data platform, the data platform generates a block on the alliance chain;
s212, reading the data by the data platform, and performing encryption operation on the data to obtain a tag code of the data;
s213, the data platform writes the tag code and the upload time of the data into the block generated in step S211, and then performs block output.
Further, the encryption operation in step S212 uses an irreversible encryption algorithm. The irreversible encryption algorithm is characterized in that a secret key is not needed in the encryption process, the system directly processes the input plaintext into a ciphertext through the encryption algorithm, the encrypted data cannot be decrypted, and the data can be really decrypted only by re-inputting the plaintext and re-processing the plaintext through the same irreversible encryption algorithm to obtain the same encrypted ciphertext which is re-identified by the system. Common irreversible encryption algorithms include MD5 and SHA 256.
Example 5
The present embodiment is different from embodiment 3 in that the type of data is one of video and picture.
Further, the method for adding the data tag code to the data uploaded by the user for storage by the data platform in step S2 includes the following steps:
s221, processing the tag code of the data by the data platform, generating a two-dimensional code according to the tag code of the data, entering step S222 when the type of the data is a picture, and entering step S222 when the type of the data is a video;
s222, inserting the two-dimensional code into each picture by the data platform;
s223, inserting the two-dimensional code into the image of at least one frame of the video by the data platform.
Further, in step S4, after receiving the complaint of the user, the data platform reads the tag code in the data of the user who initiated the complaint and the tag code of the complaint data through the two-dimensional code.
Example 6
The embodiment is a specific use scenario, which includes a video playing platform and a user a, and the implementation steps are as follows:
firstly, building a set of alliance chain system;
secondly, setting all video playing platforms and users needing to join the alliance chain as individual organizations;
thirdly, compiling an intelligent contract for chaining the video information;
fourthly, establishing alliance;
fifthly, all the organizations set in the second step are added into the alliance;
sixthly, creating a channel, and adding all mechanisms into the channel;
step seven, deploying the intelligent contract written in the step three into a channel;
eighthly, after the intelligent contract is deployed, the user A uploads the video to a video playing platform, and the video playing platform generates a block on the alliance chain;
ninth, the video playing platform reads the block head of the block, and the block hash recorded by the block head is used as the tag code of the video uploaded in the eighth step;
tenth, the video playing platform writes the uploading time of the data into the block body and then performs block outputting;
step eleven, the video playing platform generates a two-dimensional code according to the label code of the video, then the video playing platform carries out video transcoding, and the two-dimensional code is placed at the upper right corner of the video during transcoding so as to play a role of an anti-counterfeiting code;
twelfth, if the subsequent user A complains other users to steal his video; and then, taking out the hash values in the two-dimensional codes, and comparing the two hash values with the uploading time sequence on the chain, thereby obtaining a fair processing result. Because the video records on the hands of people are consistent, the processing result is easier to accept for users.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus and method can be implemented in other ways.
In addition, the functional modules in the embodiments of the present invention may be integrated together to form an independent part, or each module may exist separately, or two or more modules may be integrated to form an independent part.
The functions, if implemented in the form of software functional modules and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. It is noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
The above description is only for the specific embodiments of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present invention, and all the changes or substitutions should be covered within the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.

Claims (9)

1. A data anti-counterfeiting method based on a block chain is characterized in that: the method comprises the following steps:
s1, establishing a set of alliance chain system, and adding the data platform and the user of the data platform into the alliance chain;
s2, after the user uploads the data to the data platform, the data platform generates a block in which a tag code of the data and uploading time are recorded on the alliance chain, and meanwhile, the data platform adds the tag code of the data to the data uploaded by the user for storage;
s3, when the user finds that the data platform has the data which is the same as the data uploaded by the user, the user initiates complaints to the data platform;
s4, after receiving the complaint of the user, the data platform reads the tag codes in the data of the user initiating the complaint and the tag codes of the complaint data, then inquires the blocks corresponding to the two tag codes respectively on the alliance chain, judges the uploading time of the data corresponding to the two tag codes according to the uploading time recorded by the blocks, judges that the complaint is valid when the data of the user initiating the complaint is uploaded first, and judges that the complaint is invalid otherwise.
2. The data anti-counterfeiting method based on the blockchain according to claim 1, wherein the data anti-counterfeiting method comprises the following steps: in step S1, the data platform and each user of the data platform join the federation chain as independent enterprises.
3. The data anti-counterfeiting method based on the blockchain according to claim 2, characterized in that: the method for joining the data platform and the user of the data platform into the alliance chain in the step S1 comprises the following steps:
s101, setting all users needing to join the alliance chain and a data platform as mutually independent mechanisms;
s102, compiling an intelligent contract for data uplink;
s103, establishing a alliance, and adding the enterprises set in the step S101 into the alliance;
and S104, creating a channel, adding all mechanisms into the channel, and deploying the intelligent contract written in the S102 into the channel.
4. The data anti-counterfeiting method based on the blockchain according to claim 1, wherein the data anti-counterfeiting method comprises the following steps: the method for the data platform to generate a block with a tag code and an upload time recorded thereon in the federation chain in step S2 includes the following steps:
s201, after a user uploads data to a data platform, the data platform generates a block on a alliance chain;
s202, the data platform reads a block head of the block, and takes a block hash recorded by the block head as a tag code of the data uploaded in the step S201;
s203, the data platform writes the uploading time of the data into the block body and then carries out block discharging.
5. The data anti-counterfeiting method based on the blockchain according to claim 1, wherein the data anti-counterfeiting method comprises the following steps: the method for the data platform to generate a block with a tag code and an upload time recorded thereon in the federation chain in step S2 includes the following steps:
s211, after the user uploads the data to the data platform, the data platform generates a block on the alliance chain;
s212, reading the data by the data platform, and performing encryption operation on the data to obtain a tag code of the data;
s213, the data platform writes the tag code and the upload time of the data into the block generated in step S211, and then performs block output.
6. The data anti-counterfeiting method based on the blockchain according to claim 5, wherein the data anti-counterfeiting method comprises the following steps: the encryption operation in step S212 employs an irreversible encryption algorithm.
7. The data anti-counterfeiting method based on the blockchain according to claim 1, wherein the data anti-counterfeiting method comprises the following steps: the type of data is one of video or picture.
8. The data anti-counterfeiting method based on the blockchain according to claim 7, wherein the data anti-counterfeiting method comprises the following steps: the method for adding the data tag code to the data uploaded by the user for storage by the data platform in the step S2 includes the following steps:
s221, processing the tag code of the data by the data platform, generating a two-dimensional code according to the tag code of the data, entering step S222 when the type of the data is a picture, and entering step S222 when the type of the data is a video;
s222, inserting the two-dimensional code into each picture by the data platform;
s223, inserting the two-dimensional code into the image of at least one frame of the video by the data platform.
9. The data anti-counterfeiting method based on the blockchain according to claim 8, wherein the data anti-counterfeiting method comprises the following steps: in step S4, after receiving the complaint of the user, the data platform reads the tag code in the data of the user who initiated the complaint and the tag code of the complaint data through the two-dimensional code.
CN201911098040.3A 2019-11-12 2019-11-12 Data anti-counterfeiting method based on block chain Active CN111143466B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911098040.3A CN111143466B (en) 2019-11-12 2019-11-12 Data anti-counterfeiting method based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911098040.3A CN111143466B (en) 2019-11-12 2019-11-12 Data anti-counterfeiting method based on block chain

Publications (2)

Publication Number Publication Date
CN111143466A true CN111143466A (en) 2020-05-12
CN111143466B CN111143466B (en) 2022-06-24

Family

ID=70517028

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911098040.3A Active CN111143466B (en) 2019-11-12 2019-11-12 Data anti-counterfeiting method based on block chain

Country Status (1)

Country Link
CN (1) CN111143466B (en)

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106529951A (en) * 2016-12-30 2017-03-22 杭州云象网络技术有限公司 Node consensus verification method under league chain network through asynchronous mode
CN107657553A (en) * 2017-09-21 2018-02-02 浙江惠码科技有限公司 A kind of electronic contract generation method based on alliance's chain, information anti-fake method of tracing to the source
CN108650223A (en) * 2018-04-02 2018-10-12 江苏中控安芯信息安全技术有限公司 A kind of point-to-point authentic authentication method of the network equipment and system
CN109002725A (en) * 2018-07-19 2018-12-14 合肥工业大学 Data processing system based on block chain
CN109102308A (en) * 2018-09-05 2018-12-28 深圳正品创想科技有限公司 Merchandise news maintaining method, block chain node and its system based on block chain
CN109325785A (en) * 2018-09-29 2019-02-12 中山大学 A kind of multi-model source tracing method based on alliance's chain
CN109360008A (en) * 2018-11-20 2019-02-19 吴祥富 Product false proof electronic tag and product false proof certification update method and system
CN109522988A (en) * 2018-11-20 2019-03-26 王建新 Product false proof electronic tag and electronic labeling information update method and system
CN109584063A (en) * 2018-10-25 2019-04-05 阿里巴巴集团控股有限公司 Transaction processing method and device, electronic equipment based on block chain
CN109829724A (en) * 2018-12-27 2019-05-31 链极智能科技(上海)有限公司 A kind of traceability system based on block chain
CN110175855A (en) * 2019-05-06 2019-08-27 江苏链路区块链技术有限公司 A kind of two-dimension code anti-counterfeit based on block chain is traced to the source implementation method
CN110310130A (en) * 2019-06-19 2019-10-08 张学忠 A kind of method for anti-counterfeit and system

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106529951A (en) * 2016-12-30 2017-03-22 杭州云象网络技术有限公司 Node consensus verification method under league chain network through asynchronous mode
CN107657553A (en) * 2017-09-21 2018-02-02 浙江惠码科技有限公司 A kind of electronic contract generation method based on alliance's chain, information anti-fake method of tracing to the source
CN108650223A (en) * 2018-04-02 2018-10-12 江苏中控安芯信息安全技术有限公司 A kind of point-to-point authentic authentication method of the network equipment and system
CN109002725A (en) * 2018-07-19 2018-12-14 合肥工业大学 Data processing system based on block chain
CN109102308A (en) * 2018-09-05 2018-12-28 深圳正品创想科技有限公司 Merchandise news maintaining method, block chain node and its system based on block chain
CN109325785A (en) * 2018-09-29 2019-02-12 中山大学 A kind of multi-model source tracing method based on alliance's chain
CN109584063A (en) * 2018-10-25 2019-04-05 阿里巴巴集团控股有限公司 Transaction processing method and device, electronic equipment based on block chain
CN109360008A (en) * 2018-11-20 2019-02-19 吴祥富 Product false proof electronic tag and product false proof certification update method and system
CN109522988A (en) * 2018-11-20 2019-03-26 王建新 Product false proof electronic tag and electronic labeling information update method and system
CN109829724A (en) * 2018-12-27 2019-05-31 链极智能科技(上海)有限公司 A kind of traceability system based on block chain
CN110175855A (en) * 2019-05-06 2019-08-27 江苏链路区块链技术有限公司 A kind of two-dimension code anti-counterfeit based on block chain is traced to the source implementation method
CN110310130A (en) * 2019-06-19 2019-10-08 张学忠 A kind of method for anti-counterfeit and system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
陈腾: "浅谈区块链防伪溯源", 《互联网经济》 *

Also Published As

Publication number Publication date
CN111143466B (en) 2022-06-24

Similar Documents

Publication Publication Date Title
Liu et al. BPDS: A blockchain based privacy-preserving data sharing for electronic medical records
US20200059364A1 (en) Methods and systems for implementing zero-knowledge proofs in transferring partitioned tokens on distributed ledger-based networks
Joshi et al. Unified authentication and access control for future mobile communication‐based lightweight IoT systems using blockchain
Garg et al. RITS-MHT: Relative indexed and time stamped Merkle hash tree based data auditing protocol for cloud computing
CN114826703B (en) Block chain-based data search fine granularity access control method and system
US20150207621A1 (en) Method for creating asymmetrical cryptographic key pairs
Li et al. A Blockchain‐Based Public Auditing Scheme for Cloud Storage Environment without Trusted Auditors
CN111931195A (en) User private key management method, device and medium based on block chain
Benil et al. Blockchain based secure medical data outsourcing with data deduplication in cloud environment
Ren et al. How to authenticate a device? Formal authentication models for M2M communications defending against ghost compromising attack
Hou et al. Fine‐Grained and Controllably Redactable Blockchain with Harmful Data Forced Removal
Gao et al. BFR‐SE: A Blockchain‐Based Fair and Reliable Searchable Encryption Scheme for IoT with Fine‐Grained Access Control in Cloud Environment
Mishra et al. Enhancing privacy‐preserving mechanisms in Cloud storage: A novel conceptual framework
Deebak et al. Healthcare applications using blockchain with a cloud-assisted decentralized privacy-preserving framework
CN111143466B (en) Data anti-counterfeiting method based on block chain
Kutyłowski et al. Advanced electronic signatures and eIDAS–analysis of the concept
Li et al. Redactable signature-based public auditing scheme with sensitive data sharing for cloud storage
Elizabeth et al. A fog based security model for electronic medical records in the cloud database
Gao et al. Blockchain-based multi-hop permission delegation scheme with controllable delegation depth for electronic health record sharing
AU2021103828A4 (en) A novel system and auditing technique for cloud based digital forensic readiness with integrity and privacy preservation of health care data
Pan et al. Secure public cloud platform for medical images sharing
Ying et al. Fhpt: fine-grained ehr sharing in e-healthcare cloud with hidden policy and traceability
Sengupta et al. Editing-enabled signatures: A new tool for editing authenticated data
CN110910085A (en) Intelligent contract encryption implementation system based on block chain
CN110781419B (en) Multi-system cooperative use method based on block chain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant