CN111382462A - Anti-counterfeiting method based on block chain - Google Patents

Anti-counterfeiting method based on block chain Download PDF

Info

Publication number
CN111382462A
CN111382462A CN202010140731.1A CN202010140731A CN111382462A CN 111382462 A CN111382462 A CN 111382462A CN 202010140731 A CN202010140731 A CN 202010140731A CN 111382462 A CN111382462 A CN 111382462A
Authority
CN
China
Prior art keywords
certificate
management
centralized
block chain
function
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN202010140731.1A
Other languages
Chinese (zh)
Inventor
杨宁波
陈�峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Anhui Gaoshan Technology Co ltd
Original Assignee
Anhui Gaoshan Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Anhui Gaoshan Technology Co ltd filed Critical Anhui Gaoshan Technology Co ltd
Priority to CN202010140731.1A priority Critical patent/CN111382462A/en
Publication of CN111382462A publication Critical patent/CN111382462A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6227Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • G06Q30/0185Product, service or business identity fraud
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Finance (AREA)
  • Accounting & Taxation (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Economics (AREA)
  • Development Economics (AREA)
  • General Business, Economics & Management (AREA)
  • Strategic Management (AREA)
  • Computer Hardware Design (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Software Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Marketing (AREA)
  • Data Mining & Analysis (AREA)
  • Technology Law (AREA)
  • Computing Systems (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses an anti-counterfeiting method based on a block chain, which belongs to the technical field of the block chain, and comprises the steps of allocating a processing unit to each user, wherein the processing unit is used for generating a management certificate during transaction between any users and synchronously operating the certificate, so that the processing unit can replace the function of a centralized notarization center, and the certificate distribution and processing synchronous functions are stripped from the centralized notarization center; the management certificate uses an encryption function to digitally encrypt the certificate, and uses a Mercker tree to store certificate data, so as to ensure that any changed certificate is automatically changed into invalid; and carrying out asymmetric digital signature on the certificate, wherein the digital signature carries out key management of a public key and a private key according to the applicant, the owner, the issuer and the verifier of the certificate. The functions of certificate distribution and synchronous processing of the centralized notarization center system are separated by distributing a processing unit to each user, and the safety of the certificate is greatly improved.

Description

Anti-counterfeiting method based on block chain
Technical Field
The invention relates to the technical field of block chains, in particular to an anti-counterfeiting method based on a block chain.
Background
After the bit currency concept is proposed, the block chain is widely concerned as the underlying technology of the bit currency. In a narrow sense, a block chain is a string of data blocks containing transaction information which are generated by using a cryptographic method in a correlation mode, and the data blocks are connected in sequence according to time stamps to form a chain data structure; broadly, the blockchain technique is a completely new distributed infrastructure and computing approach that utilizes blockchain data structures to verify and store data, utilizes distributed node consensus algorithms to generate and update data, utilizes cryptography to secure data transmission and access, and utilizes intelligent contracts composed of automated script code to program and manipulate data. The block chain has the characteristics of decentralization, openness, autonomy, data tamper resistance, high transparency and the like, so that the block chain can be widely applied to the fields of securities trading, electronic commerce, social communication, file storage, existence certification, identity verification and the like.
The traditional block chain management certificate is issued and synchronized through a centralized notarization center, although the credit degree of the centralized notarization center is very high, when a large number of certificates are processed, a centralized system is congested due to insufficient central processing capacity, so that the performance of the centralized system is reduced; when a single-point disaster happens, namely when the centralized notarization center is in a state, the whole network is broken down, and all users cannot obtain certificate service; the security requirement of the central notarization center is very high, if potential safety hazards exist, denial of service attacks can be easily caused, even distributed denial of service attacks initiated by a plurality of machines can be easily caused, the security of the whole block chain system is reduced, and management certificates can be easily tampered.
Disclosure of Invention
The invention aims to provide an anti-counterfeiting method based on a block chain, aiming at solving the problems that potential safety hazards exist in the synchronization of issuing the management certificate of the block chain and the anti-counterfeiting effect of the certificate is poor due to the fact that the data of the certificate is easy to be distorted.
The invention realizes the aim through the following technical scheme, and an anti-counterfeiting method based on a block chain comprises the following steps:
each user is distributed with a processing unit which is used for generating a management certificate during the transaction between any users and synchronously operating the certificate so that the processing unit can replace the function of a centralized notarization center, thereby separating the certificate distribution and processing synchronous function from the centralized notarization center;
the management certificate uses an encryption function to digitally encrypt the certificate, and uses a Mercker tree to store certificate data, so as to ensure that any changed certificate is automatically changed into invalid;
and carrying out asymmetric digital signature on the certificate, wherein the digital signature carries out key management of a public key and a private key according to the applicant, the owner, the issuer and the verifier of the certificate.
Preferably, the centralized notarization center is used for verifying authenticity of the management certificate.
Preferably, the certificate synchronization is used for performing synchronous diffusion of each subscriber unit on the management certificate, so that any user can obtain the management certificate of each subscriber unit, and the performance needs are differentiated into a plurality of centers from a single center.
Preferably, the encryption function performs digital encryption by using a sha256 hash value encryption function or an elliptic curve public key cryptographic algorithm.
Preferably, the leaf of the merkel tree is a hash value of the data block, and the non-leaf node is a hash value of the series string of its corresponding child nodes.
Preferably, the asymmetric digital signature is used for sending a request for storing the certificate, the notarization and the anti-counterfeiting identification to the centralized notarization center when the management certificate data changes, capturing a change characteristic value, performing hash function encryption on metadata of the characteristic value, and storing the metadata into a storage module of the block chain.
Compared with the prior art, the invention has the beneficial effects that:
1. the invention separates the functions of certificate distribution and synchronous processing of a centralized notarization center system by distributing a processing unit to each user, reduces the risk of paralysis caused by the attack of the notarization center, and the processing unit has the function of certificate synchronization, so that each processing unit can take the management certificate of any unit after synchronization, thus the certificate content is synchronized and informed without difference at the moment of generation or modification, effectively preventing the certificate from being tampered, and any unit can obtain the management certificate of other units to avoid the existence and the intervention of a trusted third party.
2. The management certificate is encrypted by using an encryption function, certificate data are stored by adopting a Mercury tree, any changed certificate is ensured to be automatically changed into invalid, the management certificate is encrypted by using an asymmetric digital signature after the encryption function is encrypted, the encrypted certificate captures a change characteristic value when applying for anti-counterfeiting identification to a centralized notarization center every time, and the change process of any certificate are recorded on a case, so that the effect of tracing can be achieved.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
An anti-counterfeiting method based on a block chain comprises the following steps:
each user is distributed with a processing unit which is used for generating a management certificate during the transaction between any users and synchronously operating the certificate so that the processing unit can replace the function of a centralized notarization center, thereby separating the certificate distribution and processing synchronous function from the centralized notarization center;
the management certificate uses an encryption function to digitally encrypt the certificate, and uses a Mercker tree to store certificate data, so as to ensure that any changed certificate is automatically changed into invalid;
and carrying out asymmetric digital signature on the certificate, wherein the digital signature carries out key management of a public key and a private key according to the applicant, the owner, the issuer and the verifier of the certificate.
Aiming at each user, a computing resource is respectively allocated to individually process information, namely, a unit is used as a processing unit, a certificate synchronization unit is added in the computing resource (which can be a single computer) of each processing unit and is responsible for synchronizing the certificate of each processing unit, so that each processing unit can take the management certificate of any unit after synchronization, the mode of the processing units and the synchronization unit can be diffused, the processing units and the synchronization unit are differentiated into a plurality of centers according to performance requirements, then certificate data synchronization is carried out among the centers, the notarization attribute is still concentrated in the authentication center to continuously perform irreplaceable legal or government functions which the authentication center should originally undertake, but the functions of certificate distribution and processing synchronization are stripped from the centers.
The centralized notarization center is used for verifying the authenticity of the management certificate, the certificate synchronization is used for performing synchronous diffusion and diffusion of each user unit on the management certificate, so that any user can obtain the management certificate of each user unit, the performance needs to be differentiated into a plurality of centers from a single center, the encryption function adopts a sha256 hash value encryption function or an elliptic curve public key cryptographic algorithm for digital encryption, the leaves of the Merck tree are hash values of data blocks, the non-leaf nodes are hash values of serial character strings of corresponding child nodes, the asymmetric digital signature is used for sending requests for certificate storage, notarization and anti-counterfeiting identification to the centralized notarization center when the management certificate data changes, capturing the change characteristic values, performing hash function encryption on metadata of the characteristic values, storing the metadata into a storage module of a block chain, and ensuring the data non-tamper by the hash function encryption or the encryption function with the same level encryption strength, the encryption information of the characteristic value of the data change event is collected, a data block chain is formed according to certain logic and circulation, the data block chain can be a multi-chain structure or a single-chain structure, then a chain structure encoding process is completed, in the process, required chain data are compressed firstly, then the required chain data are written into an underlying layer block chain framework through transactions (transactions), a digital certificate is issued, and each distributed node takes the certificate and inquires or issues the certificate requester.
The working principle of the invention is as follows: the certificate distribution and processing synchronization functions of a centralized notarization center system are separated by distributing a processing unit to each user, the risk of paralysis caused by the fact that the notarization center is attacked is reduced, and the processing units have the certificate synchronization function, so that each processing unit can take the management certificate of any unit after synchronization, the whole network is synchronized and informed indiscriminately at the moment of generation or modification of certificate contents, the certificate is effectively prevented from being tampered, and any unit can obtain the management certificates of other units, so that the existence and the intervention of a trusted third party can be avoided; the management certificate is encrypted by using an encryption function, certificate data are stored by adopting a Mercury tree, any changed certificate is ensured to be automatically changed into invalid, the management certificate is encrypted by using an asymmetric digital signature after the encryption function is encrypted, the encrypted certificate captures a change characteristic value when applying for anti-counterfeiting identification to a centralized notarization center every time, and the change process of any certificate are recorded on a case, so that the effect of tracing can be achieved.
It will be evident to those skilled in the art that the invention is not limited to the details of the foregoing illustrative embodiments, and that the present invention may be embodied in other specific forms without departing from the spirit or essential attributes thereof. The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the invention being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein.
Furthermore, it should be understood that although the present description refers to embodiments, not every embodiment may contain only a single embodiment, and such description is for clarity only, and those skilled in the art should integrate the description, and the embodiments may be combined as appropriate to form other embodiments understood by those skilled in the art.

Claims (6)

1. An anti-counterfeiting method based on a block chain is characterized by comprising the following steps:
each user is distributed with a processing unit which is used for generating a management certificate during the transaction between any users and synchronously operating the certificate so that the processing unit can replace the function of a centralized notarization center, thereby separating the certificate distribution and processing synchronous function from the centralized notarization center;
the management certificate uses an encryption function to digitally encrypt the certificate, and uses a Mercker tree to store certificate data, so as to ensure that any changed certificate is automatically changed into invalid;
and carrying out asymmetric digital signature on the certificate, wherein the digital signature carries out key management of a public key and a private key according to the applicant, the owner, the issuer and the verifier of the certificate.
2. The blockchain-based anti-counterfeiting method according to claim 1, wherein the centralized notarization center is used for verifying authenticity of the management certificate.
3. The block chain-based anti-counterfeiting method according to claim 1, wherein the certificate synchronization is used for performing synchronous diffusion of each subscriber unit on the management certificate, so that any user can obtain the management certificate of each subscriber unit, and the performance requirements are differentiated from a single center into a plurality of centers.
4. The blockchain-based anti-counterfeiting method according to claim 1, wherein the encryption function performs digital encryption by using a sha256 hash value encryption function or an elliptic curve public key cryptography algorithm.
5. The anti-counterfeiting method based on the block chain as claimed in claim 1, wherein the leaf of the merkel tree is a hash value of the data block, and the non-leaf node is a hash value of a series string of its corresponding child nodes.
6. The anti-counterfeiting method based on the blockchain according to claim 1, wherein the asymmetric digital signature is used for sending a certificate storage request, a certificate authority request and an anti-counterfeiting identification request to a centralized notarization center when the management certificate data changes, capturing a change characteristic value, performing hash function encryption on metadata of the characteristic value, and storing the hash function encryption into a storage module of the blockchain.
CN202010140731.1A 2020-03-03 2020-03-03 Anti-counterfeiting method based on block chain Withdrawn CN111382462A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010140731.1A CN111382462A (en) 2020-03-03 2020-03-03 Anti-counterfeiting method based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010140731.1A CN111382462A (en) 2020-03-03 2020-03-03 Anti-counterfeiting method based on block chain

Publications (1)

Publication Number Publication Date
CN111382462A true CN111382462A (en) 2020-07-07

Family

ID=71215298

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010140731.1A Withdrawn CN111382462A (en) 2020-03-03 2020-03-03 Anti-counterfeiting method based on block chain

Country Status (1)

Country Link
CN (1) CN111382462A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113204773A (en) * 2021-04-29 2021-08-03 武汉船舶通信研究所(中国船舶重工集团公司第七二二研究所) Electronic notarization data credible exchange method based on public network and application thereof

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113204773A (en) * 2021-04-29 2021-08-03 武汉船舶通信研究所(中国船舶重工集团公司第七二二研究所) Electronic notarization data credible exchange method based on public network and application thereof

Similar Documents

Publication Publication Date Title
CN106972931B (en) Method for transparentizing certificate in PKI
CN111046352B (en) Identity information security authorization system and method based on block chain
CN111130795B (en) Multistage signature method based on block chain technology
KR101908712B1 (en) Security method for smart grid system using block chain
CN109768988A (en) Decentralization Internet of Things security certification system, facility registration and identity identifying method
CN107171812A (en) It is a kind of based on block chain without key signature infrastructure construction method
CN1922816B (en) One way authentication
CN111556120A (en) Data processing method and device based on block chain, storage medium and equipment
CN115345618B (en) Block chain transaction verification method and system based on mixed quantum digital signature
CN111211905A (en) Identity management method for Fabric alliance chain members based on certificate-free authentication
CN110750541A (en) Data storage indexing system and method based on block chain
CN112732695A (en) Cloud storage data security deduplication method based on block chain
CN114301624A (en) Block chain-based tamper-proof system applied to financial business
CN113259135A (en) Lightweight blockchain communication authentication device and method for detecting data tamper
Zhao et al. Fuzzy identity-based dynamic auditing of big data on cloud storage
CN111382462A (en) Anti-counterfeiting method based on block chain
CN112926983A (en) Block chain-based deposit certificate transaction encryption system and method
CN109951286A (en) Encryption authentication system and method for medical block chain communication system
CN114169888B (en) Universal type cryptocurrency custody method supporting multiple signatures
CN116069856A (en) Data integrity verification method and system based on blockchain
CN100566239C (en) The key transmission method of multi-stage intelligent key apparatus and system
CN114358771A (en) Information sharing system based on block chain
CN111506667A (en) Calculation capacity transaction information data storage method based on partition authentication technology
CN113362065A (en) Online signature transaction implementation method based on distributed private key
Ren et al. Security analysis of delegable and proxy provable data possession in public cloud storage

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication
WW01 Invention patent application withdrawn after publication

Application publication date: 20200707