CN113919011A - Anti-counterfeiting method of equipment inspection report based on block chain - Google Patents

Anti-counterfeiting method of equipment inspection report based on block chain Download PDF

Info

Publication number
CN113919011A
CN113919011A CN202111487536.7A CN202111487536A CN113919011A CN 113919011 A CN113919011 A CN 113919011A CN 202111487536 A CN202111487536 A CN 202111487536A CN 113919011 A CN113919011 A CN 113919011A
Authority
CN
China
Prior art keywords
data
inspection
verification
private key
whole network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202111487536.7A
Other languages
Chinese (zh)
Other versions
CN113919011B (en
Inventor
刘智国
张子鹏
冯宝强
宋宇斐
张惠涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hebei Shuoquan Technology Co ltd
Original Assignee
Shijiazhuang University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shijiazhuang University filed Critical Shijiazhuang University
Priority to CN202111487536.7A priority Critical patent/CN113919011B/en
Publication of CN113919011A publication Critical patent/CN113919011A/en
Application granted granted Critical
Publication of CN113919011B publication Critical patent/CN113919011B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2151Time stamp

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides an anti-counterfeiting method of an equipment inspection report based on a block chain. Acquiring an anti-pseudo-random number, generating comprehensive data through the anti-pseudo-random number and equipment inspection data, encrypting the comprehensive data to obtain target block data, broadcasting the target block data in the whole network, extracting the inspection data in the target block data, encrypting the inspection data through a private key of a sending node, and displaying the inspection data on line; acquiring all inspection data requirements, and matching inspection data display tables one by one; decomposing and splitting the whole network broadcast data, decrypting by using a private key of the receiving node to generate a random number plaintext, and judging whether the data is abnormal or not; verifying correctness using the timestamp and the data structure; and (4) carrying out verification on a private key verification command sent by the data node. According to the scheme, the encryption of the equipment inspection report based on the whole network broadcast is realized by carrying out online block encryption on the data of the equipment inspection report.

Description

Anti-counterfeiting method of equipment inspection report based on block chain
Technical Field
The invention relates to the technical field of equipment inspection, in particular to an anti-counterfeiting method of an equipment inspection report based on a block chain.
Background
The device check report is a file that proves the performance of the device and the function of the device. At present, the existing equipment inspection report is a necessary document in a plurality of fields such as industry, medical treatment and the like as a certification document, and an accurate and comprehensive equipment inspection report is a key for ensuring the safe and stable operation of the industries.
Prior to the present technology, the archival form of the device inspection report was typically a paper document and was verified by means of a stamp as a direct proof material. However, paper documents have a plurality of disadvantages that the storage is inconvenient, and some researches and researches are considered to adopt an electronic signature mode to store the paper documents in a file format such as PDF (portable document format), but the risk of counterfeiting after the electronic signature information is leaked still exists.
Disclosure of Invention
In view of the above problems, the present invention provides an anti-counterfeiting method for a device inspection report based on a block chain, which implements encryption based on whole network broadcast for the device inspection report by performing online block encryption on data of the device inspection report. The joint reliability verification is realized by the joint verification of the timestamp and the double check codes which are divided into the upper limit and the lower limit of the preset area and the verification of the communication state of the administrator, and if the verification fails, a new private key is sent out again, so that the reliability of the inspection report data in the whole block chain system is ensured constantly.
According to a first aspect of the embodiments of the present invention, an anti-counterfeiting method for device inspection report based on block chain is provided.
In one or more embodiments, preferably, the anti-counterfeiting method for device inspection report based on block chain includes:
acquiring an anti-pseudo-random number, generating comprehensive data through the anti-pseudo-random number and equipment inspection data, encrypting the comprehensive data to obtain target block data, and broadcasting the target block data in the whole network;
acquiring all the whole network broadcasts, extracting the inspection data in the whole network broadcasts, carrying out private key encryption by a sending node, and carrying out online display on the inspection data;
acquiring all inspection data requirements, dividing the whole network broadcast data according to the inspection data requirements, and matching inspection data display tables one by one, wherein the inspection data display tables are classified to comprise detection objects, detection results, detection processes and detection data tables;
acquiring the whole network broadcast data through a receiving node, decomposing and splitting the whole network broadcast data, decrypting by using a private key of the receiving node to generate a random number plaintext, generating fourth encrypted data, comparing whether the fourth encrypted data is consistent with third encrypted data obtained by decomposing and splitting, and judging whether the data is abnormal;
extracting all data of the new block from the whole network broadcast data, and verifying the correctness by utilizing a time stamp and a data structure;
and verifying according to private key verification commands sent by data nodes of all the broadcast networks, and logging in and issuing a new private key by an administrator when the verification cannot pass.
In one or more embodiments, preferably, the acquiring the anti-pseudo random number, generating a comprehensive data by the anti-pseudo random number and the device check data, obtaining the target block data by encryption, and broadcasting over the whole network specifically includes:
randomly acquiring an anti-pseudo-random number and the equipment inspection data, and fusing the anti-pseudo-random number and the equipment inspection data into first block chain data;
performing Hash encryption on the first block chain data to obtain encrypted first block chain data;
carrying out Hash encryption on the anti-pseudo random number to obtain random encrypted data;
the private key encryption is carried out on the equipment inspection data through a sending node to generate data encryption first encryption inspection data;
carrying out secondary encryption on the encrypted first block chain data by using a public key of a receiving node to generate second encryption inspection data;
merging and packaging the random encryption data, the first block chain data and the second encryption check data in sequence to generate target block data;
carrying out whole-network broadcasting of the target block data in the whole network;
and acquiring the whole network broadcast data at a receiving node.
In one or more embodiments, preferably, the acquiring all the network-wide broadcasts, extracting the check data therein, and performing online display on the check data after performing private key encryption by the sending node includes:
acquiring all the target block data of the whole network broadcast;
extracting plaintext data in the target block data;
extracting data from the plaintext data to obtain the inspection data of each block recorded in the past;
and displaying the inspection data on a display screen.
In one or more embodiments, preferably, the acquiring all inspection data requirements, dividing the whole network broadcast data according to the inspection data requirements, and matching an inspection data presentation table one by one, where the inspection data presentation table includes detection objects, detection results, detection processes, and detection data tables in a classification manner, and specifically includes:
acquiring all inspection data requirements, and dividing data according to the inspection data requirements to generate at least one inspection data display table;
acquiring the inspection data display table, and classifying the inspection data display table into a detection object, a detection result, a detection flow and a detection data table according to the inspection data display table;
and carrying out structural division on the whole network broadcast data, and matching the inspection data display tables one by one to finish data display.
In one or more embodiments, preferably, the acquiring, by the receiving node, the network-wide broadcast data, decomposing and splitting the network-wide broadcast data, decrypting the network-wide broadcast data by using a private key of the receiving node, generating a random number plaintext, generating fourth encrypted data, comparing whether the fourth encrypted data is consistent with third encrypted data obtained by decomposing and splitting, and determining whether data is abnormal specifically includes:
acquiring the whole network broadcast data through the receiving node;
decomposing and splitting the whole network broadcast data to obtain first encrypted data, second encrypted data and third encrypted data;
decrypting the first encrypted data by using a private key of the receiving node to generate the plaintext of the random number;
decrypting the second encrypted data by using a private key of the receiving node to obtain intermediate encrypted data;
decrypting the intermediate encrypted data by using the public key of the sending node to obtain the equipment inspection data;
carrying out Hash algorithm encryption by using the equipment inspection data and the random number plain text together to generate fourth encrypted data;
comparing whether the third encrypted data and the fourth encrypted data are consistent, if the data are inconsistent, considering that the equipment inspection data are abnormal, and sending out a warning;
when the third encrypted data and the fourth encrypted data are consistent, the data has no exception.
In one or more embodiments, preferably, the extracting all the data of the new block from the full-network broadcast data, and verifying the correctness by using the timestamp and the data structure specifically includes:
inputting all data of a new block from the full-network broadcast data;
carrying out data structure verification on the new block data, and confirming whether the generated data structure is a preset structure or not;
performing parent node verification on the new block, and determining whether the generated parent node of the new block is a preset node;
judging the timestamp of the current new block, and judging whether the timestamp is in a preset running range or not, wherein the preset range is 1 hour;
and when the timestamp of the current new block is in a preset range and the data structure is a preset structure, the block overall verification is correct.
In one or more embodiments, preferably, the verifying is performed according to private key verification commands issued by data nodes of all broadcast networks, and when the verification fails, an administrator logs in and issues a new private key, specifically including:
acquiring all in-transit data nodes in a broadcast network, and sending a private key verification instruction to each node;
verifying whether private keys of all nodes are within upper and lower limits of a preset area by using a first calculation formula;
when the private key meets the preset requirement, sending a command for normal verification, otherwise, sending a private key verification error;
when the private key verification is wrong, broadcasting new block data only in an area meeting the private key verification, and re-issuing a verification command to a node which does not pass the private key verification;
logging in the failed private key verification node by an administrator to carry out communication verification of the verification command, and sending out an alarm and notifying the whole network broadcast when the verification is failed;
logging in the failed private key verification node by an administrator to carry out communication verification of the verification command, and when the verification is passed, generating a random private key corresponding to the failed private key verification node by the administrator by using a second calculation formula;
the first calculation formula is:S l k 1 t+k 2 A+k 3 BS h
wherein the content of the first and second substances,S l the lower limit of the preset area is set,S h in order to set the upper limit of the area,k 1k 2k 3sequentially comprises a first user check coefficient, a second user check coefficient and a third user check coefficient,tfor the current time stamp,AThe first check code is a first check code for the user,Ba second check code for the user;
the second calculation formula is:
Figure 100002_DEST_PATH_IMAGE001
wherein the content of the first and second substances,S l the lower limit of the preset area is set,S h in order to set the upper limit of the area,k 1k 2k 3sequentially comprises a first user check coefficient, a second user check coefficient and a third user check coefficient,tfor the purpose of the current time stamp,Athe first check code is a first check code for the user,Band a second check code for the user.
According to a second aspect of the embodiments of the present invention, an anti-counterfeiting system for device inspection report based on block chain is provided.
In one or more embodiments, preferably, the anti-counterfeiting system for device inspection report based on block chain comprises:
the inspection data encryption storage module is used for acquiring an anti-pseudo-random number, generating comprehensive data through the anti-pseudo-random number and the equipment inspection data, acquiring target block data after encryption, and broadcasting the target block data in the whole network;
the inspection data viewing module is used for acquiring all the whole network broadcasts, extracting the inspection data in the whole network broadcasts, carrying out private key encryption by the sending node and then carrying out online display on the inspection data;
the inspection data query module is used for acquiring all inspection data requirements, dividing the whole network broadcast data according to the inspection data requirements and matching an inspection data display table one by one, wherein the inspection data display table comprises a detection object, a detection result, a detection flow and a detection data table in a classification manner;
the verification data decoding and verifying module is used for acquiring the whole network broadcast data through a receiving node, decomposing and splitting the whole network broadcast data, decrypting the whole network broadcast data by using a private key of the receiving node to generate a random number plaintext, generating fourth encrypted data, comparing whether the fourth encrypted data is consistent with third encrypted data obtained by decomposing and splitting, and judging whether the data is abnormal;
the inspection data statistics module is used for extracting all data of the new block from the whole network broadcast data and verifying the correctness by utilizing a time stamp and a data structure;
and the user setting module is used for verifying according to private key verification commands sent by all the broadcast networks at the data nodes, and when the verification fails, an administrator logs in and issues a new private key.
According to a third aspect of embodiments of the present invention, there is provided a computer-readable storage medium having stored thereon computer program instructions which, when executed by a processor, implement the method according to any one of the first aspect of embodiments of the present invention.
According to a fourth aspect of embodiments of the present invention, there is provided an electronic device, comprising a memory and a processor, the memory being configured to store one or more computer program instructions, wherein the one or more computer program instructions are executed by the processor to implement the method of any one of the first aspect of embodiments of the present invention.
The technical scheme provided by the embodiment of the invention can have the following beneficial effects:
1) in the embodiment of the invention, the anti-counterfeiting encrypted data of the equipment inspection report is generated by encrypting through a hash algorithm and a random number, and the data is used as target block data;
2) in the embodiment of the invention, the on-line verification of the inspection data is used for completing the information verification of all the broadcasted data, thereby ensuring the reliability after the block is formed;
3) in the embodiment of the invention, only the verification data exists in the whole method and system by ensuring the reliability verification of the user.
Additional features and advantages of the invention will be set forth in the description which follows, and in part will be obvious from the description, or may be learned by practice of the invention. The objectives and other advantages of the invention will be realized and attained by the structure particularly pointed out in the written description and claims hereof as well as the appended drawings.
The technical solution of the present invention is further described in detail by the accompanying drawings and embodiments.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings needed to be used in the description of the embodiments will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1 is a flowchart of an anti-counterfeiting method for device inspection report based on block chain according to an embodiment of the present invention.
Fig. 2 is a flowchart of acquiring an anti-pseudo random number, generating a composite data by the anti-pseudo random number and device verification data, encrypting the composite data to obtain target block data, and broadcasting the target block data over the whole network according to an embodiment of the present invention.
Fig. 3 is a flowchart of acquiring all network-wide broadcasts, extracting the check data therein, and displaying the check data on line after encrypting the check data by a private key through a sending node in the anti-counterfeiting method for the device check report based on the blockchain according to an embodiment of the present invention.
Fig. 4 is a flowchart of acquiring all inspection data requirements, dividing the whole network broadcast data according to the inspection data requirements, and matching an inspection data display table one by one in the anti-counterfeiting method for the device inspection report based on the block chain according to an embodiment of the present invention, where the inspection data display table includes a detection object, a detection result, a detection flow, and a detection data table.
Fig. 5 is a flowchart illustrating an embodiment of the present invention, in an anti-counterfeiting method for a device inspection report based on a block chain, that is, acquiring the network-wide broadcast data by a receiving node, decomposing and splitting the network-wide broadcast data, decrypting the network-wide broadcast data by using a private key of the receiving node, generating a random number plaintext, generating fourth encrypted data, comparing whether the fourth encrypted data is consistent with third encrypted data obtained by decomposition and splitting, and determining whether the data is abnormal.
Fig. 6 is a flowchart of extracting all data of a new block from the network-wide broadcast data and verifying correctness by using a timestamp and a data structure in an anti-counterfeiting method for a device check report based on a block chain according to an embodiment of the present invention.
Fig. 7 is a flowchart of a private key verification command issued at a data node according to all broadcast networks in an anti-counterfeiting method for device verification reporting based on a blockchain according to an embodiment of the present invention, wherein an administrator logs in and issues a new private key when the verification fails.
Fig. 8 is a block diagram of an anti-counterfeiting system for device verification reporting based on a blockchain according to an embodiment of the present invention.
Fig. 9 is a block diagram of an electronic device in one embodiment of the invention.
Detailed Description
In some of the flows described in the present specification and claims and in the above figures, a number of operations are included that occur in a particular order, but it should be clearly understood that these operations may be performed out of order or in parallel as they occur herein, with the order of the operations being indicated as 101, 102, etc. merely to distinguish between the various operations, and the order of the operations by themselves does not represent any order of performance. Additionally, the flows may include more or fewer operations, and the operations may be performed sequentially or in parallel. It should be noted that, the descriptions of "first", "second", etc. in this document are used for distinguishing different messages, devices, modules, etc., and do not represent a sequential order, nor limit the types of "first" and "second" to be different.
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The device check report is a file that proves the performance of the device and the function of the device. At present, the existing equipment inspection report is a necessary document in a plurality of fields such as industry, medical treatment and the like as a certification document, and an accurate and comprehensive equipment inspection report is a key for ensuring the safe and stable operation of the industries.
Prior to the present technology, the archival form of the device inspection report was typically a paper document and was verified by means of a stamp as a direct proof material. However, paper documents have a plurality of disadvantages that the storage is inconvenient, and some researches and researches are considered to adopt an electronic signature mode to store the paper documents in a file format such as PDF (portable document format), but the risk of counterfeiting after the electronic signature information is leaked still exists.
The embodiment of the invention provides an anti-counterfeiting method for a device inspection report based on a block chain. According to the scheme, the encryption of the equipment inspection report based on the whole network broadcast is realized by carrying out online block encryption on the data of the equipment inspection report.
According to a first aspect of the embodiments of the present invention, an anti-counterfeiting method for device inspection report based on block chain is provided.
Fig. 1 is a flowchart of an anti-counterfeiting method for device inspection report based on block chain according to an embodiment of the present invention.
In one or more embodiments, as shown in fig. 1, preferably, the anti-counterfeiting method for device inspection report based on block chain includes:
s101, acquiring an anti-pseudo-random number, generating comprehensive data through the anti-pseudo-random number and equipment inspection data, encrypting the comprehensive data to obtain target block data, and broadcasting the target block data in the whole network;
s102, obtaining all the whole network broadcasts, extracting the inspection data in the whole network broadcasts, carrying out private key encryption by a sending node, and carrying out online display on the inspection data;
s103, acquiring all inspection data requirements, dividing the whole network broadcast data according to the inspection data requirements, and matching inspection data display tables one by one, wherein the inspection data display tables are classified to comprise detection objects, detection results, detection processes and detection data tables;
s104, acquiring the whole network broadcast data through a receiving node, decomposing and splitting the whole network broadcast data, decrypting the whole network broadcast data by using a private key of the receiving node to generate a random number plaintext, generating fourth encrypted data, comparing whether the fourth encrypted data is consistent with third encrypted data obtained by decomposing and splitting, and judging whether the data is abnormal;
s105, extracting all data of the new block from the whole network broadcast data, and verifying the correctness by using a timestamp and a data structure;
and S106, verifying according to private key verification commands sent by all the broadcast networks at the data nodes, and logging in and issuing a new private key by an administrator when the verification cannot pass.
In the embodiment of the invention, the encryption work of the equipment inspection report is carried out through the block chain data, the random data is obtained through decryption according to the encrypted data to carry out the data consistency verification, and then the broadcast is carried out in the whole network, thus completing the on-line verification of the whole block chain data. When extra data are abnormal, the safety of the equipment inspection report of the whole system can be effectively guaranteed through the method.
Fig. 2 is a flowchart of acquiring an anti-pseudo random number, generating a composite data by the anti-pseudo random number and device verification data, encrypting the composite data to obtain target block data, and broadcasting the target block data over the whole network according to an embodiment of the present invention.
As shown in fig. 2, in one or more embodiments, preferably, the acquiring the anti-pseudo random number, generating a comprehensive data by the anti-pseudo random number and the device verification data, obtaining the target block data by encryption, and broadcasting over the whole network specifically includes:
s201, randomly acquiring an anti-pseudo-random number and the equipment inspection data, and fusing the anti-pseudo-random number and the equipment inspection data into first block chain data;
s202, carrying out Hash encryption on the first block chain data to obtain encrypted first block chain data;
s203, carrying out Hash encryption on the anti-pseudo random number to obtain random encrypted data;
s204, encrypting the private key of the equipment inspection data through a sending node to generate data encryption first encryption inspection data;
s205, carrying out secondary encryption on the encrypted first block chain data by using a public key of the receiving node to generate second encryption inspection data;
s206, merging and packaging the random encrypted data, the first block chain data and the second encrypted check data in sequence to generate target block data;
s207, performing whole-network broadcasting of the target block data in the whole network;
and S208, acquiring the whole network broadcast data at a receiving node.
In the embodiment of the invention, the encrypted first block chain data is generated through an anti-pseudo random number and equipment check data, and the encrypted first block chain data is encrypted through three aspects respectively to generate the whole network broadcast data, wherein the whole network broadcast data is the target block data.
Fig. 3 is a flowchart of acquiring all network-wide broadcasts, extracting the check data therein, and displaying the check data on line after encrypting the check data by a private key through a sending node in the anti-counterfeiting method for the device check report based on the blockchain according to an embodiment of the present invention.
As shown in fig. 3, in one or more embodiments, preferably, the acquiring all the network-wide broadcasts, extracting the check data therein, performing on-line display on the check data after performing private key encryption by the sending node, specifically includes:
s301, acquiring all target block data of the whole network broadcast;
s302, extracting plaintext data in the target block data;
s303, extracting data of the plaintext data to obtain the inspection data of each block recorded in the past;
s304, displaying the inspection data on a display screen.
In the embodiment of the invention, when the existing data is broadcasted and confirmed all over the network, the data can be directly called in the inquiry process, and the on-line display of the data cannot be finished for the data which is not broadcasted.
Fig. 4 is a flowchart of acquiring all inspection data requirements, dividing the whole network broadcast data according to the inspection data requirements, and matching an inspection data display table one by one in the anti-counterfeiting method for the device inspection report based on the block chain according to an embodiment of the present invention, where the inspection data display table includes a detection object, a detection result, a detection flow, and a detection data table.
As shown in fig. 4, in one or more embodiments, preferably, the acquiring all inspection data requirements, dividing the whole network broadcast data according to the inspection data requirements, and matching an inspection data presentation table one by one, where the inspection data presentation table includes detection objects, detection results, detection flows, and detection data tables in a classification manner, and specifically includes:
s401, acquiring all inspection data requirements, dividing data according to the inspection data requirements, and generating at least one inspection data display table;
s402, acquiring the inspection data display table, and classifying the inspection data display table into a detection object, a detection result, a detection flow and a detection data table according to the inspection data display table;
and S403, carrying out structural division on the whole network broadcast data, and matching the inspection data display tables one by one to finish data display.
In the embodiment of the invention, the equipment detection data cannot be acquired only through the data table, and the specific data is acquired by inquiring according to the form of the inspection data, but not the chronological data, which cannot be displayed.
Fig. 5 is a flowchart illustrating an embodiment of the present invention, in an anti-counterfeiting method for a device inspection report based on a block chain, that is, acquiring the network-wide broadcast data by a receiving node, decomposing and splitting the network-wide broadcast data, decrypting the network-wide broadcast data by using a private key of the receiving node, generating a random number plaintext, generating fourth encrypted data, comparing whether the fourth encrypted data is consistent with third encrypted data obtained by decomposition and splitting, and determining whether the data is abnormal.
As shown in fig. 5, in one or more embodiments, preferably, the acquiring, by the receiving node, the network-wide broadcast data, decomposing and splitting the network-wide broadcast data, decrypting the network-wide broadcast data by using a private key of the receiving node, generating a random number plaintext, generating fourth encrypted data, comparing whether the fourth encrypted data is consistent with third encrypted data obtained by decomposing and splitting, and determining whether data is abnormal specifically includes:
s501, acquiring the whole network broadcast data through the receiving node;
s502, decomposing and splitting the whole network broadcast data to obtain first encrypted data, second encrypted data and third encrypted data;
s503, decrypting the first encrypted data by using a private key of the receiving node to generate a plaintext of the random number;
s504, decrypting the second encrypted data by using the private key of the receiving node to obtain intermediate encrypted data;
s505, decrypting the intermediate encrypted data by using the public key of the sending node to obtain the equipment inspection data;
s506, encrypting by using the Hash algorithm together with the equipment inspection data and the plain text of the random number to generate fourth encrypted data;
s507, comparing whether the third encrypted data and the fourth encrypted data are consistent, if the data are inconsistent, considering that the equipment inspection data are abnormal, and sending out a warning;
and S508, when the third encrypted data and the fourth encrypted data are consistent, the data have no exception.
In the implementation of the invention, through the decomposition and splitting of the whole network broadcast data, the first encrypted data, the second encrypted data and the third encrypted data are generated in the splitting process. Wherein, the first encrypted data is an initial piece of data, and the length of the piece of data is fixed. The second encrypted data is check data for actual use, which makes it possible to judge whether or not the data is data corresponding to the broadcast side and the reception side by comparing the finally obtained data with the third encrypted data.
Fig. 6 is a flowchart of extracting all data of a new block from the network-wide broadcast data and verifying correctness by using a timestamp and a data structure in an anti-counterfeiting method for a device check report based on a block chain according to an embodiment of the present invention.
As shown in fig. 6, in one or more embodiments, preferably, the extracting all data of the new chunk from the full-network broadcast data, and verifying correctness by using a timestamp and a data structure specifically includes:
s601, inputting all data of a new block from the whole network broadcast data;
s602, carrying out data structure verification on the new block data, and confirming whether the generated data structure is a preset structure;
s603, performing parent node verification on the new block, and determining whether the generated parent node of the new block is a preset node;
s604, judging the timestamp of the current new block, and judging whether the timestamp is in a running preset range or not, wherein the preset range is 1 hour;
and S605, when the time stamp of the current new block is in the preset range and the data structure is a preset structure, the block is verified to be correct as a whole.
In the embodiment of the invention, the data broadcasted in the whole network is checked online, the checking content is mainly the checking of the timestamp, and if the generated timestamp is too long, the risk that the data statistics is lost or cannot be calculated is considered. Second, a check is made as to the format of the data and whether aspects were generated for the previous parent node. After the verification is successful, all the data are considered to be valid data generated in time when the data are broadcasted in the whole network.
Fig. 7 is a flowchart of a private key verification command issued at a data node according to all broadcast networks in an anti-counterfeiting method for device verification reporting based on a blockchain according to an embodiment of the present invention, wherein an administrator logs in and issues a new private key when the verification fails.
As shown in fig. 7, in one or more embodiments, preferably, the verifying according to the private key verification command issued by the data node of all broadcast networks, and when the verification fails, the administrator logs in and issues a new private key, specifically including:
s701, acquiring all in-operation data nodes in the broadcast network, and sending a private key verification instruction to each node;
s702, verifying whether private keys of all nodes are within upper and lower limits of a preset area by using a first calculation formula;
s703, when the private key meets the preset requirement, sending a normal verification instruction, otherwise, sending a private key verification error;
s704, when the private key verification is wrong, broadcasting new block data only in an area meeting the private key verification, and re-issuing a verification command to a node which does not pass the private key verification;
s705, a manager logs in the failed private key verification node to perform communication verification of the verification command, and when the verification fails, a warning is given and the whole network broadcast is notified;
s706, logging in the failed private key verification node by an administrator to perform communication verification of the verification command, and when the verification is passed, generating a random private key corresponding to the failed private key verification node by the administrator by using a second calculation formula;
the first calculation formula is:S l k 1 t+k 2 A+k 3 BS h
wherein the content of the first and second substances,S l the lower limit of the preset area is set,S h in order to set the upper limit of the area,k 1k 2k 3sequentially comprises a first user check coefficient, a second user check coefficient and a third user check coefficient,tfor the purpose of the current time stamp,Athe first check code is a first check code for the user,Ba second check code for the user;
the second calculation formula is:
Figure DEST_PATH_IMAGE002
wherein the content of the first and second substances,S l the lower limit of the preset area is set,S h in order to set the upper limit of the area,k 1k 2k 3sequentially comprises a first user check coefficient, a second user check coefficient and a third user check coefficient,tfor the purpose of the current time stamp,Athe first check code is a first check code for the user,Band a second check code for the user.
In the process of determining whether the broadcast nodes in each block are correct, whether specific respective private keys are in a preset format or not is judged through a first calculation formula, and after the broadcast nodes pass the verification, the data which cannot pass the verification directly are set again, so that the broadcast nodes can be prevented from being stored to be always verified in the long-term operation process.
According to a second aspect of the embodiments of the present invention, an anti-counterfeiting system for device inspection report based on block chain is provided.
Fig. 8 is a block diagram of an anti-counterfeiting system for device verification reporting based on a blockchain according to an embodiment of the present invention.
In one or more embodiments, as shown in fig. 8, the anti-counterfeiting system for block chain-based device inspection report preferably includes:
the inspection data encryption storage module 801 is used for acquiring an anti-pseudo-random number, generating comprehensive data through the anti-pseudo-random number and equipment inspection data, acquiring target block data after encryption, and broadcasting the target block data in the whole network;
the inspection data viewing module 802 is configured to obtain all the network-wide broadcasts, extract inspection data therein, encrypt the inspection data by using a private key through a sending node, and display the inspection data online;
the inspection data query module 803 is configured to acquire all inspection data requirements, divide the whole network broadcast data according to the inspection data requirements, and match an inspection data display table one by one, where the inspection data display table includes a detection object, a detection result, a detection flow, and a detection data table;
a check data decoding and verifying module 804, configured to obtain the whole network broadcast data through a receiving node, decompose and split the whole network broadcast data, decrypt the whole network broadcast data by using a private key of the receiving node, generate a random number plaintext, generate fourth encrypted data, compare whether the fourth encrypted data is consistent with third encrypted data obtained by decomposition and splitting, and determine whether the data is abnormal;
a check data statistics module 805, configured to extract all data of the new block from the full-network broadcast data, and verify correctness by using a timestamp and a data structure;
and the user setting module 806 is configured to perform verification according to private key verification commands sent by data nodes of all broadcast networks, and when the verification fails, an administrator logs in and issues a new private key.
According to a third aspect of embodiments of the present invention, there is provided a computer-readable storage medium having stored thereon computer program instructions which, when executed by a processor, implement the method according to any one of the first aspect of embodiments of the present invention.
According to a fourth aspect of the embodiments of the present invention, there is provided an electronic apparatus. Fig. 9 is a block diagram of an electronic device in one embodiment of the invention. The electronic device shown in fig. 9 is a general-purpose device inspection report anti-counterfeiting device, which includes a general-purpose computer hardware structure, including at least a processor 901 and a memory 902. The processor 901 and the memory 902 are connected by a bus 903. The memory 902 is adapted to store instructions or programs executable by the processor 901. Processor 901 may be a stand-alone microprocessor or a collection of one or more microprocessors. Thus, the processor 901 implements the processing of data and the control of other devices by executing instructions stored by the memory 902 to perform the method flows of embodiments of the present invention as described above. The bus 903 connects the above components together, as well as to the display controller 904 and display devices and input/output (I/O) devices 905. Input/output (I/O) devices 905 may be a mouse, keyboard, modem, network interface, touch input device, motion-sensing input device, printer, and other devices known in the art. Typically, the input/output devices 905 are connected to the system through an input/output (I/O) controller 906.
The technical scheme provided by the embodiment of the invention can have the following beneficial effects:
1) in the embodiment of the invention, the anti-counterfeiting encrypted data of the equipment inspection report is generated by encrypting through a hash algorithm and a random number, and the data is used as target block data;
2) in the embodiment of the invention, the on-line verification of the inspection data is used for completing the information verification of all the broadcasted data, thereby ensuring the reliability after the block is formed;
3) in the embodiment of the invention, only the verification data exists in the whole method and system by ensuring the reliability verification of the user.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present invention without departing from the spirit and scope of the invention. Thus, if such modifications and variations of the present invention fall within the scope of the claims of the present invention and their equivalents, the present invention is also intended to include such modifications and variations.

Claims (10)

1. An anti-counterfeiting method for a device inspection report based on a blockchain, the method comprising:
acquiring an anti-pseudo-random number, generating comprehensive data through the anti-pseudo-random number and equipment inspection data, encrypting the comprehensive data to obtain target block data, and broadcasting the target block data in the whole network;
acquiring all the whole network broadcasts, extracting the inspection data in the whole network broadcasts, carrying out private key encryption by a sending node, and carrying out online display on the inspection data;
acquiring all inspection data requirements, dividing the whole network broadcast data according to the inspection data requirements, and matching inspection data display tables one by one, wherein the inspection data display tables are classified to comprise detection objects, detection results, detection processes and detection data tables;
acquiring the whole network broadcast data through a receiving node, decomposing and splitting the whole network broadcast data, decrypting by using a private key of the receiving node to generate a random number plaintext, generating fourth encrypted data, comparing whether the fourth encrypted data is consistent with third encrypted data obtained by decomposing and splitting, and judging whether the data is abnormal;
extracting all data of the new block from the whole network broadcast data, and verifying the correctness by utilizing a time stamp and a data structure;
and verifying according to private key verification commands sent by data nodes of all the broadcast networks, and logging in and issuing a new private key by an administrator when the verification cannot pass.
2. The method according to claim 1, wherein the obtaining of the anti-pseudo random number, the generating of a composite data by the anti-pseudo random number and the device verification data, the obtaining of the target block data by encryption, and the broadcasting over the whole network, specifically comprises:
randomly acquiring an anti-pseudo-random number and the equipment inspection data, and fusing the anti-pseudo-random number and the equipment inspection data into first block chain data;
performing Hash encryption on the first block chain data to obtain encrypted first block chain data;
carrying out Hash encryption on the anti-pseudo random number to obtain random encrypted data;
the private key encryption is carried out on the equipment inspection data through a sending node to generate data encryption first encryption inspection data;
carrying out secondary encryption on the encrypted first block chain data by using a public key of a receiving node to generate second encryption inspection data;
merging and packaging the random encryption data, the first block chain data and the second encryption check data in sequence to generate target block data;
carrying out whole-network broadcasting of the target block data in the whole network;
and acquiring the whole network broadcast data at a receiving node.
3. The anti-counterfeiting method for the equipment inspection report based on the blockchain according to claim 1, wherein the steps of acquiring all the whole network broadcasts, extracting inspection data therein, performing private key encryption by using a sending node, and performing online display on the inspection data comprise:
acquiring all the target block data of the whole network broadcast;
extracting plaintext data in the target block data;
extracting data from the plaintext data to obtain the inspection data of each block recorded in the past;
and displaying the inspection data on a display screen.
4. The anti-counterfeiting method for the equipment inspection report based on the blockchain according to claim 1, wherein the method comprises the steps of acquiring all inspection data requirements, dividing the whole network broadcast data according to the inspection data requirements, and matching an inspection data display table one by one, wherein the inspection data display table comprises detection objects, detection results, detection processes and a detection data table in a classification mode, and specifically comprises the following steps:
acquiring all inspection data requirements, and dividing data according to the inspection data requirements to generate at least one inspection data display table;
acquiring the inspection data display table, and classifying the inspection data display table into a detection object, a detection result, a detection flow and a detection data table according to the inspection data display table;
and carrying out structural division on the whole network broadcast data, and matching the inspection data display tables one by one to finish data display.
5. The method according to claim 2, wherein the acquiring, decomposing and splitting the network-wide broadcast data by the receiving node, decrypting the network-wide broadcast data by using a private key of the receiving node to generate a random number plaintext, generating fourth encrypted data, comparing whether the fourth encrypted data is consistent with third encrypted data obtained by decomposing and splitting, and determining whether data is abnormal specifically comprises:
acquiring the whole network broadcast data through the receiving node;
decomposing and splitting the whole network broadcast data to obtain first encrypted data, second encrypted data and third encrypted data;
decrypting the first encrypted data by using a private key of the receiving node to generate the plaintext of the random number;
decrypting the second encrypted data by using a private key of the receiving node to obtain intermediate encrypted data;
decrypting the intermediate encrypted data by using the public key of the sending node to obtain the equipment inspection data;
carrying out Hash algorithm encryption by using the equipment inspection data and the random number plain text together to generate fourth encrypted data;
comparing whether the third encrypted data and the fourth encrypted data are consistent, if the data are inconsistent, considering that the equipment inspection data are abnormal, and sending out a warning;
when the third encrypted data and the fourth encrypted data are consistent, the data has no exception.
6. The method according to claim 1, wherein the extracting all data of the new block from the network-wide broadcast data and verifying correctness by using a timestamp and a data structure comprises:
inputting all data of a new block from the full-network broadcast data;
carrying out data structure verification on the new block data, and confirming whether the generated data structure is a preset structure or not;
performing parent node verification on the new block, and determining whether the generated parent node of the new block is a preset node;
judging the timestamp of the current new block, and judging whether the timestamp is in a preset running range or not, wherein the preset range is 1 hour;
and when the timestamp of the current new block is in a preset range and the data structure is a preset structure, the block overall verification is correct.
7. The anti-counterfeiting method for the device inspection report based on the blockchain according to claim 1, wherein the verification is performed according to a private key verification command issued at a data node of all broadcast networks, and when the verification fails, an administrator logs in and issues a new private key, specifically comprising:
acquiring all in-transit data nodes in a broadcast network, and sending a private key verification instruction to each node;
verifying whether private keys of all nodes are within upper and lower limits of a preset area by using a first calculation formula;
when the private key meets the preset requirement, sending a command for normal verification, otherwise, sending a private key verification error;
when the private key verification is wrong, broadcasting new block data only in an area meeting the private key verification, and re-issuing a verification command to a node which does not pass the private key verification;
logging in the failed private key verification node by an administrator to carry out communication verification of the verification command, and sending out an alarm and notifying the whole network broadcast when the verification is failed;
logging in the failed private key verification node by an administrator to carry out communication verification of the verification command, and when the verification is passed, generating a random private key corresponding to the failed private key verification node by the administrator by using a second calculation formula;
the first calculation formula is:S l k 1 t+k 2 A+k 3 BS h
wherein the content of the first and second substances,S l the lower limit of the preset area is set,S h in order to set the upper limit of the area,k 1k 2k 3sequentially comprises a first user check coefficient, a second user check coefficient and a third user check coefficient,tfor the purpose of the current time stamp,Athe first check code is a first check code for the user,Ba second check code for the user;
the second calculation formula is:
Figure DEST_PATH_IMAGE001
wherein the content of the first and second substances,S l the lower limit of the preset area is set,S h in order to set the upper limit of the area,k 1k 2k 3sequentially comprises a first user check coefficient, a second user check coefficient and a third user check coefficient,tfor the purpose of the current time stamp,Athe first check code is a first check code for the user,Band a second check code for the user.
8. An anti-counterfeiting system for blockchain-based device inspection reports, the system comprising:
the inspection data encryption storage module is used for acquiring an anti-pseudo-random number, generating comprehensive data through the anti-pseudo-random number and the equipment inspection data, acquiring target block data after encryption, and broadcasting the target block data in the whole network;
the inspection data viewing module is used for acquiring all the whole network broadcasts, extracting the inspection data in the whole network broadcasts, carrying out private key encryption by the sending node and then carrying out online display on the inspection data;
the inspection data query module is used for acquiring all inspection data requirements, dividing the whole network broadcast data according to the inspection data requirements and matching an inspection data display table one by one, wherein the inspection data display table comprises a detection object, a detection result, a detection flow and a detection data table in a classification manner;
the verification data decoding and verifying module is used for acquiring the whole network broadcast data through a receiving node, decomposing and splitting the whole network broadcast data, decrypting the whole network broadcast data by using a private key of the receiving node to generate a random number plaintext, generating fourth encrypted data, comparing whether the fourth encrypted data is consistent with third encrypted data obtained by decomposing and splitting, and judging whether the data is abnormal;
the inspection data statistics module is used for extracting all data of the new block from the whole network broadcast data and verifying the correctness by utilizing a time stamp and a data structure;
and the user setting module is used for verifying according to private key verification commands sent by all the broadcast networks at the data nodes, and when the verification fails, an administrator logs in and issues a new private key.
9. A computer-readable storage medium on which computer program instructions are stored, which, when executed by a processor, implement the method of any one of claims 1-7.
10. An electronic device comprising a memory and a processor, wherein the memory is configured to store one or more computer program instructions, wherein the one or more computer program instructions are executed by the processor to implement the method of any of claims 1-7.
CN202111487536.7A 2021-12-08 2021-12-08 Anti-counterfeiting method of equipment inspection report based on block chain Active CN113919011B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111487536.7A CN113919011B (en) 2021-12-08 2021-12-08 Anti-counterfeiting method of equipment inspection report based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111487536.7A CN113919011B (en) 2021-12-08 2021-12-08 Anti-counterfeiting method of equipment inspection report based on block chain

Publications (2)

Publication Number Publication Date
CN113919011A true CN113919011A (en) 2022-01-11
CN113919011B CN113919011B (en) 2022-03-18

Family

ID=79248871

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111487536.7A Active CN113919011B (en) 2021-12-08 2021-12-08 Anti-counterfeiting method of equipment inspection report based on block chain

Country Status (1)

Country Link
CN (1) CN113919011B (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109598518A (en) * 2018-09-30 2019-04-09 阿里巴巴集团控股有限公司 Method for anti-counterfeit and device, electronic equipment based on block chain
CN109741803A (en) * 2019-01-14 2019-05-10 南京大学 Medical data security cooperation system based on block chain
US20190370358A1 (en) * 2018-05-29 2019-12-05 Oracle International Corporation Securing access to confidential data using a blockchain ledger
CN112035426A (en) * 2020-08-06 2020-12-04 珠海格力电器股份有限公司 Supply chain data anti-counterfeiting method, device, equipment and computer readable medium
CN112200496A (en) * 2020-11-12 2021-01-08 北京三维天地科技股份有限公司 Laboratory detection report management system based on block chain
CN112581126A (en) * 2020-12-08 2021-03-30 腾讯科技(深圳)有限公司 Block chain-based platform data management method and device and storage medium
CN112948894A (en) * 2019-12-10 2021-06-11 中远海运科技股份有限公司 Block chain-based anti-counterfeiting method, device, equipment and medium for tally inspection report
CN113079015A (en) * 2021-03-11 2021-07-06 国电南瑞科技股份有限公司 Electric power data anti-counterfeiting encryption verification method and system
US20210326942A1 (en) * 2020-04-16 2021-10-21 Zachariah Marcus Peterson Method of Securing Online Merchant Reviews Using Block Chains

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20190370358A1 (en) * 2018-05-29 2019-12-05 Oracle International Corporation Securing access to confidential data using a blockchain ledger
CN109598518A (en) * 2018-09-30 2019-04-09 阿里巴巴集团控股有限公司 Method for anti-counterfeit and device, electronic equipment based on block chain
CN109741803A (en) * 2019-01-14 2019-05-10 南京大学 Medical data security cooperation system based on block chain
CN112948894A (en) * 2019-12-10 2021-06-11 中远海运科技股份有限公司 Block chain-based anti-counterfeiting method, device, equipment and medium for tally inspection report
US20210326942A1 (en) * 2020-04-16 2021-10-21 Zachariah Marcus Peterson Method of Securing Online Merchant Reviews Using Block Chains
CN112035426A (en) * 2020-08-06 2020-12-04 珠海格力电器股份有限公司 Supply chain data anti-counterfeiting method, device, equipment and computer readable medium
CN112200496A (en) * 2020-11-12 2021-01-08 北京三维天地科技股份有限公司 Laboratory detection report management system based on block chain
CN112581126A (en) * 2020-12-08 2021-03-30 腾讯科技(深圳)有限公司 Block chain-based platform data management method and device and storage medium
CN113079015A (en) * 2021-03-11 2021-07-06 国电南瑞科技股份有限公司 Electric power data anti-counterfeiting encryption verification method and system

Also Published As

Publication number Publication date
CN113919011B (en) 2022-03-18

Similar Documents

Publication Publication Date Title
CN110839015B (en) Log storage and reading method, device, equipment and medium based on block chain
CN109257342B (en) Block chain cross-chain authentication method, system, server and readable storage medium
CN109067801B (en) Identity authentication method, identity authentication device and computer readable medium
EP3356988B1 (en) Method and system for verifiable searchable symmetric encryption
CN111914027B (en) Block chain transaction keyword searchable encryption method and system
KR101752083B1 (en) Device authenticity determination system and device authenticity determination method
CN114444105B (en) Intelligent audit data reporting safety method
TW201437839A (en) Method, apparatus and computer-readable storage medium for certificate generation and revocation with privacy preservation
CN110929291A (en) Method and device for accessing text file and computer readable storage medium
CN110598456A (en) Data storage method and device, electronic equipment and storage medium
CN108540447B (en) Block chain-based certificate verification method and system
US20200213131A1 (en) Multiple authorization modules for secure production and verification
CN112907375A (en) Data processing method, data processing device, computer equipment and storage medium
JP2009301370A (en) Electronic signature management device and electronic signature management program
CN114885325A (en) Credible auditing method and system for regulating and controlling service network security suitable for 5G network
CN113919011B (en) Anti-counterfeiting method of equipment inspection report based on block chain
CN114363094B (en) Data sharing method, device, equipment and storage medium
CN111628863A (en) Data signature method and device, electronic equipment and storage medium
JP2013062650A (en) Data verification device, data verification method for data verification device, data verification program, and data verification system
Nguyen Certification of eidas trust services and new global transparency trends: Forming the basis for trust: certification and transparency
Andi et al. Securing Medical Records of COVID-19 Patients Using Elliptic Curve Digital Signature Algorithm (ECDSA) in Blockchain
WO2007088384A1 (en) Software product authentication
CN110995440B (en) Work history confirming method, device, equipment and storage medium
CN109155089A (en) Method for being voted using chain type signature
CN108880785B (en) Method, device, terminal and readable medium for detecting C + + virtual table quilt hook

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20220708

Address after: 050000 room 10-2-403-2, Jianzhu Jiayuan, No. 15, Zhaiying North Street, Chang'an District, Shijiazhuang City, Hebei Province

Patentee after: Hebei Shuoquan Technology Co.,Ltd.

Address before: 050035 No.288, Zhufeng street, hi tech Development Zone, Shijiazhuang City, Hebei Province

Patentee before: SHIJIAZHUANG University