NL2026414A - System for processing digital asset authentication - Google Patents
System for processing digital asset authentication Download PDFInfo
- Publication number
- NL2026414A NL2026414A NL2026414A NL2026414A NL2026414A NL 2026414 A NL2026414 A NL 2026414A NL 2026414 A NL2026414 A NL 2026414A NL 2026414 A NL2026414 A NL 2026414A NL 2026414 A NL2026414 A NL 2026414A
- Authority
- NL
- Netherlands
- Prior art keywords
- digital asset
- authentication
- platform
- digest
- authenticated
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/56—Financial cryptography, e.g. electronic payment or e-cash
Abstract
This application discloses a system for processing digital asset authentication. A blockchain network has a decentralization characteristic and a non-repudiation function. A digital asset authentication platform or a digital asset agent platform in this application is within the blockchain network, to serve as a node of the blockchain network. Therefore, credibility of data of the digital asset authentication platform or the digital asset agent platform can be ensured. In addition, in this application, storing digital asset package digest in the blockchain network can preventing the digital asset package digest from being tampered. In another aspect, because the digital asset package digest has a relatively small capacity as compared with a digital asset or a digital asset entity, the system for processing digital asset authentication disclosed in this application has relatively high system performance.
Description
P128256NL00 Title: SYSTEM FOR PROCESSING DIGITAL ASSET
FIELD OF THE INVENTION This application relates to the technical field of digital assets, and in particular, to a system for processing digital asset authentication.
BACKGROUND OF THE INVENTION Any intelligent Any intelligent fruit of labor presented in a form of electronic data can be referred to as a digital asset, such as a patent, a trademark, or copyright presented in the form of electronic data. An existing digital asset authentication system is shown in FIG. 1, including several terminals 1 and a digital asset authentication platform 2, and the terminals 1 are connected to the digital asset authentication platform 2 through Internet. Usually, by mounting a client 11 on the terminal 1, a data connection to the digital asset authentication platform 2 can be established by using the client 11. Specifically, a digital asset is uploaded to the digital asset authentication platform 2 by using the client 11, and the digital asset authentication platform 2 authenticates the digital asset, to obtain a digital asset carrying an authentication code. The digital asset carrying the authentication code is stored in the digital asset authentication platform 2. In FIG. 1, the digital asset authentication platform 2 is a centralized platform. Therefore, credibility of the digital asset carrying the authentication code cannot be ensured, and the digital asset 1s easy to be tampered. In addition, a digital asset 3 usually includes two parts: bibliographic data 31 and a digital asset entity 32, as shown in FIG. 2. The bibliographic data 31 usually includes name, address, priority document information, and the like of an owner of rights. The digital asset entity 32 is usually a collection of various legal and technical documents that record core content of the digital asset. Capacities of digital assets significantly differ. For example, a document after a movie and television work is presented in the form of electronic data has a very large capacity which can be hundreds of M or even are greater than 1G. Therefore, the digital asset 3 occupies a relatively large capacity, and thus having relatively high requirements on a device storing the digital asset 3. Storing the digital asset carrying the authentication code in the digital asset authentication platform 2 may significantly affect performance of the digital asset authentication platform 2.
SUMMARY OF THE INVENTION This application provides a system for processing digital asset authentication, to resolve problems that data on a digital asset authentication platform is easy to be tampered, and a digital asset of a large capacity affects system performance. According to a first aspect, this application provides a system for processing digital asset authentication, including a client, and a digital asset authentication platform and a public blockchain that are connected through Internet, the digital asset authentication platform being a node of the public blockchain. The digital asset authentication platform is a public-chain node of the public blockchain. A blockchain network has a decentralization characteristic and a non-repudiation function. Therefore, disposing the digital asset authentication platform in the blockchain network can ensure credibility of data in the digital asset authentication platform. The client is configured to perform the following step: sending an authentication request to the digital asset authentication platform, the authentication request including a to-be- authenticated digital asset or a to-be-authenticated digital asset entity and an authentication code.
The digital asset authentication platform is configured to perform the following steps: receiving the authentication request; searching a digital asset package digest in the public blockchain based on the authentication code, to obtain a signed string A of a digital asset or a digital asset entity in the digital asset package digest; and authenticating the to-be-authenticated digital asset or the to-be authenticated digital asset entity based on the signed string A, and sending an authentication result to the client.
The blockchain network has a decentralization characteristic and a non-repudiation function.
The digital asset authentication platform or the digital asset agent platform in this application is within the blockchain network, to serve as a node of the blockchain network.
Therefore, credibility of data of the digital asset authentication platform or the digital asset agent platform can be ensured.
In addition, in this application, storing the digital asset package digest in the blockchain network can preventing the digital asset package digest from being tampered.
In another aspect, because the digital asset package digest has a relatively small capacity as compared with the digital asset or the digital asset entity, the system for processing digital asset authentication disclosed in this application has relatively high system performance.
Further, the digital asset authentication platform is further configured to perform the authenticating the to-be-authenticated digital asset or the to-be-authenticated digital asset entity according to the following steps: performing a digital signature operation on the to-be- authenticated digital asset or the digital asset entity, to obtain a signed string B; and comparing whether the signed string A is same to the signed string B, to obtain the authentication result based on a comparison result.
According to a second aspect, this application provides a system for processing digital asset authentication, including a client, and a digital asset authentication platform and a public blockchain that are connected through Internet, the digital asset authentication platform being a node of the public blockchain, where the client is configured to perform the following steps: sending an authentication request to the digital asset authentication platform, the authentication request including an authentication code; receiving a signed string A sent by the digital asset authentication platform; and comparing whether the signed string A is same to a signed string B, and obtaining an authentication result based on a comparison result, where the signed string B is a result after a digital signature operation is performed on a to-be-authenticated digital asset or a digital asset entity; and the digital asset authentication platform is configured to perform the following steps: receiving the authentication request; searching a digital asset package digest in the public blockchain based on the authentication code, to obtain the signed string A of a digital asset or a digital asset entity in the digital asset package digest; and sending the signed string A to the client.
The authentication request in this embodiment of this application includes an authentication code, and a process of uploading the to-be- authenticated digital asset or a to-be-authenticated digital asset entity 1s saved, thus reducing operation load of the system.
According to a third aspect, this application provides a system for processing digital asset authentication, including a client, and a digital asset authentication platform, a public blockchain, and a dedicated subchain that are connected through Internet, the digital asset authentication platform being a node of the dedicated subchain.
The digital asset authentication platform is a subchain node of the 5 dedicated subchain. A blockchain network has a decentralization characteristic and a non-repudiation function. Therefore, disposing the digital asset authentication platform in the dedicated subchain can ensure credibility of data in the digital asset authentication platform.
The client is configured to perform the following step: sending an authentication request to the digital asset authentication platform, the authentication request including a to-be- authenticated digital asset or a to-be-authenticated digital asset entity and an authentication code.
The digital asset authentication platform is configured to perform the following steps: receiving the authentication request; determining, based on the authentication code, whether a digital asset package digest exists in the dedicated subchain; obtaining a signed string of a digital asset or a digital asset entity in the digital asset package digest if the digital asset package digest exists; if the digital asset package digest does not exist, searching the digital asset package digest in the public blockchain based on the authentication code and a proxy node of the dedicated subchain, to obtain the signed string of the digital asset or the digital asset entity in the digital asset package digest; and authenticating the to-be-authenticated digital asset or the to-be- authenticated digital asset entity based on the signed string, and sending an authentication result to the client.
According to a fourth aspect, this application provides a system for processing digital asset authentication, including a client, and a digital asset authentication platform, a public blockchain, and a dedicated subchain that are connected through Internet, the digital asset authentication platform being a node of the dedicated subchain, where the client is configured to perform the following steps:
sending an authentication request to the digital asset authentication platform, the authentication request including an authentication code; receiving a signed string A sent by the digital asset authentication platform; and comparing whether the signed string A is same to a signed string B, and obtaining an authentication result based on a comparison result, where the signed string B is a result after a digital signature operation is performed on a to-be-authenticated digital asset or a digital asset entity; and the digital asset authentication platform is configured to perform the following steps: receiving the authentication request; determining, based on the authentication code, whether a digital asset package digest exists in the dedicated subchain; if the digital asset package digest exists, obtaining a signed string A of a digital asset or a digital asset entity in the digital asset package digest, and sending the signed string A to the client; and if the digital asset package digest does not exist, searching the digital asset package digest in the public blockchain based on the authentication code and a proxy node of the dedicated subchain, to obtain the signed string A of the digital asset or the digital asset entity in the digital asset package digest, and sending the signed string A to the client.
According to a fifth aspect, this application provides a system for processing digital asset authentication, including a client, and a digital asset authentication platform, a public blockchain, and a dedicated subchain that are connected through Internet, the digital asset authentication platform being a node of the dedicated subchain, where the client is configured to perform the following step: sending an authentication request to the digital asset authentication platform, the authentication request including a to-be- authenticated digital asset or a to-be-authenticated digital asset entity and an authentication code; and the digital asset authentication platform is configured to perform the following steps: receiving the authentication request; searching a digital asset package digest in the public blockchain based on the authentication code and a proxy node of the dedicated subchain, to obtain a signed string of a digital asset or a digital asset entity in the digital asset package digest; and authenticating the to-be-authenticated digital asset or the to-be- authenticated digital asset entity based on the signed string, and sending an authentication result to the client.
According to a sixth aspect, this application provides a system for processing digital asset authentication, including a client, and a digital asset authentication platform, a public blockchain, and a dedicated subchain that are connected through Internet, the digital asset authentication platform being a node of the dedicated subchain, where the client is configured to perform the following steps: sending an authentication request to the digital asset authentication platform, the authentication request including an authentication code; receiving a signed string A sent by the digital asset authentication platform; and comparing whether the signed string A is same to a signed string B, and obtaining an authentication result based on a comparison result, where the signed string B is a result after a digital signature operation is performed on a to-be-authenticated digital asset or a digital asset entity; and the digital asset authentication platform is configured to perform the following steps: receiving the authentication request; searching a digital asset package digest in the public blockchain based on the authentication code and a proxy node of the dedicated subchain, to obtain the signed string A of a digital asset or a digital asset entity in the digital asset package digest; and sending the signed string A to the client.
According to a seventh aspect, this application provides a system for processing digital asset authentication, including a client, and a digital asset authentication platform, a public blockchain, and a digital asset agent platform that are connected through Internet, the digital asset agent platform being a node of the public blockchain, where the client is configured to perform the following step: sending an authentication request to the digital asset authentication platform, the authentication request including a to-be- authenticated digital asset or a to-be-authenticated digital asset entity and an authentication code; the digital asset authentication platform is configured to perform the following steps: receiving the authentication request; sending an authentication instruction to the digital asset agent platform, the authentication instruction including the to-be-authenticated digital asset or the to-be- authenticated digital asset entity and the authentication code; and receiving an authentication result sent by the digital asset agent platform, and sending the authentication result to the client; and the digital asset agent platform is configured to perform the following steps based on the authentication instruction: searching a digital asset package digest in the public blockchain based on the authentication code, to obtain a signed string of a digital asset or a digital asset entity in the digital asset package digest; and authenticating the to-be-authenticated digital asset or the to-be- authenticated digital asset entity based on the signed string, and sending an authentication result to the digital asset authentication platform.
According to an eighth aspect, this application provides a system for processing digital asset authentication, including a client, and a digital asset authentication platform, a public blockchain, and a digital asset agent platform that are connected through Internet, the digital asset agent platform being a node of the public blockchain, where the client is configured to perform the following steps: sending an authentication request to the digital asset authentication platform, the authentication request including an authentication code; receiving a signed string A sent by the digital asset authentication platform; and comparing whether the signed string A is same to a signed string B, and obtaining an authentication result based on a comparison result, where the signed string B is a result after a digital signature operation is performed on a to-be-authenticated digital asset or a digital asset entity; the digital asset authentication platform is configured to perform the following steps: receiving the authentication request; sending an authentication instruction to the digital asset agent platform based on the authentication request, the authentication instruction including the authentication code; and receiving the signed string A sent by the digital asset agent platform, and sending the signed string A to the client; and the digital asset agent platform is configured to perform the following steps based on the authentication instruction: searching a digital asset package digest in the public blockchain based on the authentication code, to obtain the signed string A of a digital asset or a digital asset entity in the digital asset package digest; and sending the signed string A to the digital asset authentication platform.
According to a ninth aspect, this application provides a system for processing digital asset authentication, including a client, and a digital asset authentication platform, a public blockchain, a dedicated subchain, and a digital asset agent platform that are connected through Internet, the digital asset agent platform being a node of the dedicated subchain, where the client is configured to perform the following step: sending an authentication request to the digital asset authentication platform, the authentication request including a to-be- authenticated digital asset or a to-be-authenticated digital asset entity and an authentication code; the digital asset authentication platform is configured to perform the following steps: receiving the authentication request; sending an authentication instruction to the digital asset agent platform, the authentication instruction including the to-be-authenticated digital asset or the to-be- authenticated digital asset entity and the authentication code; and receiving an authentication result sent by the digital asset agent platform, and sending the authentication result to the client; and the digital asset agent platform is configured to perform the following steps based on the authentication instruction: determining, based on the authentication code, whether a digital asset package digest exists in the dedicated subchain; obtaining a signed string of a digital asset or a digital asset entity in the digital asset package digest if the digital asset package digest exists; authenticating the to-be-authenticated digital asset or the to-be- authenticated digital asset entity based on the signed string, and sending an authentication result to the digital asset authentication platform; if the digital asset package digest does not exist, searching the digital asset package digest in the public blockchain based on the authentication code and a proxy node of the dedicated subchain, to obtain the signed string of the digital asset or the digital asset entity in the digital asset package digest; and authenticating the to-be-authenticated digital asset or the to-be- authenticated digital asset entity based on the signed string, and sending an authentication result to the digital asset authentication platform.
According to a tenth aspect, this application provides a system for processing digital asset authentication, including a client, and a digital asset authentication platform, a public blockchain, a dedicated subchain, and a digital asset agent platform that are connected through Internet, the digital asset agent platform being a node of the dedicated subchain, where the client is configured to perform the following steps: sending an authentication request to the digital asset authentication platform, the authentication request including an authentication code; receiving a signed string A sent by the digital asset authentication platform; and comparing whether the signed string A is same to a signed string B, and obtaining an authentication result based on a comparison result, where the signed string B is a result after a digital signature operation is performed on a to-be-authenticated digital asset or a digital asset entity; the digital asset authentication platform is configured to perform the following steps: receiving the authentication request; sending an authentication instruction to the digital asset agent platform, the authentication instruction including the authentication code; and receiving the signed string A sent by the digital asset agent platform, and sending the signed string A to the client; and the digital asset agent platform is configured to perform the following steps based on the authentication instruction: determining, based on the authentication code, whether a digital asset package digest exists in the dedicated subchain; if the digital asset package digest exists, obtaining a signed string
A of a digital asset or a digital asset entity in the digital asset package digest, and sending the signed string A to the digital asset authentication platform; and if the digital asset package digest does not exist, searching the digital asset package digest in the public blockchain based on the authentication code and a proxy node of the dedicated subchain, to obtain the signed string A of the digital asset or the digital asset entity in the digital asset package digest, and sending the signed string A to the digital asset authentication platform.
According to an eleventh aspect, this application provides a system for processing digital asset authentication, including a client, and a digital asset authentication platform, a public blockchain, a dedicated subchain, and a digital asset agent platform that are connected through Internet, the digital asset agent platform being a node of the dedicated subchain, where the client is configured to perform the following step: sending an authentication request to the digital asset authentication platform, the authentication request including a to-be- authenticated digital asset or a to-be-authenticated digital asset entity and an authentication code; the digital asset authentication platform is configured to perform the following steps: receiving the authentication request; sending an authentication instruction to the digital asset agent platform, the authentication instruction including the to-be-authenticated digital asset or the to-be-authenticated digital asset entity and the authentication code; and receiving an authentication result sent by the digital asset agent platform, and sending the authentication result to the client; and the digital asset agent platform is configured to perform the following steps based on the authentication instruction: searching a digital asset package digest in the public blockchain based on the authentication code and a proxy node of the dedicated subchain, to obtain a signed string of a digital asset or a digital asset entity in the digital asset package digest; and authenticating the to-be-authenticated digital asset or the to-be- authenticated digital asset entity based on the signed string, and sending an authentication result to the digital asset authentication platform.
According to a twelfth aspect, this application provides a system for processing digital asset authentication, including a client, and a digital asset authentication platform, a public blockchain, a dedicated subchain, and a digital asset agent platform that are connected through Internet, the digital asset agent platform being a node of the dedicated subchain, where the client is configured to perform the following steps: sending an authentication request to the digital asset authentication platform, the authentication request including an authentication code; receiving a signed string A sent by the digital asset authentication platform; and comparing whether the signed string A is same to a signed string B, and obtaining an authentication result based on a comparison result, where the signed string B is a result after a digital signature operation is performed on a to-be-authenticated digital asset or a digital asset entity; the digital asset authentication platform is configured to perform the following steps: receiving the authentication request; sending an authentication instruction to the digital asset agent platform, the authentication instruction including the authentication code; and receiving the signed string A sent by the digital asset agent platform, and sending the signed string A to the client; and the digital asset agent platform is configured to perform the following steps based on the authentication instruction: searching a digital asset package digest in the public blockchain based on the authentication code and a proxy node of the dedicated subchain, to obtain the signed string A of a digital asset or a digital asset entity in the digital asset package digest; and sending the signed string A to the digital asset authentication platform.
BRIEF DESCRIPTION OF THE DRAWINGS To more clearly describe the technical solutions of this application, the accompanying drawings to be used in the embodiments are briefly illustrated below. Obviously, persons of ordinary skills in the art can also derive other accompanying drawings according to these accompanying drawings without an effective effort.
FIG. 11s a schematic structural diagram of an existing digital asset processing system; FIG. 2 is a schematic diagram of composition of a digital asset; FIG. 3 is a schematic structural diagram of a system for processing digital asset authentication according to an embodiment of this application; FIG. 4 is a schematic structural diagram of another system for processing digital asset authentication according to an embodiment of this application; FIG. 5 is a schematic structural diagram of another system for processing digital asset authentication according to an embodiment of this application: FIG. 6 is a schematic structural diagram of another system for processing digital asset authentication according to an embodiment of this application; FIG. 7 is a schematic structural diagram of another system for processing digital asset authentication according to an embodiment of this application; FIG. 8 is a schematic structural diagram of another system for processing digital asset authentication according to an embodiment of this application; FIG. 9 is a schematic structural diagram of another system for processing digital asset authentication according to an embodiment of this application; FIG. 10 is a schematic structural diagram of another system for processing digital asset authentication according to an embodiment of this application; FIG. 11 is a schematic structural diagram of another system for processing digital asset authentication according to an embodiment of this application; and FIG. 12 is a schematic structural diagram of another system for processing digital asset authentication according to an embodiment of this application.
DETAILED DESCRIPTION OF THE EMBODIMENTS To make objectives, technical solutions, and advantages of this application more clear, the technical solutions of this application are clearly and completely described below with reference to specific embodiments and corresponding accompanying drawings in this application. Obviously, the described embodiments are merely some embodiments of this application and are not all embodiments. According to the embodiments in this application, all other embodiments derived by persons of ordinary skills in the art without an effective effort fall within the protection scope of this application. The technical solutions provided in the embodiments of this application are described in detail below with reference to the accompanying drawings.
Embodiment 1 This application provides a system for processing digital asset authentication, as shown in FIG. 3 and FIG. 4, including a client 11, and a digital asset authentication platform 2 and a public blockchain 5 that are connected through Internet, the digital asset authentication platform 2 being a node of the public blockchain 5.
Specifically, the public blockchain 5 includes a plurality of public- chain nodes 51, and the digital asset authentication platform 2 is a node of the public blockchain 5. A blockchain network has a decentralization characteristic and a non-repudiation function. Therefore, taking the digital asset authentication platform 2 as a node of the public blockchain 5 can ensure credibility of data in the digital asset authentication platform.
The client 11 is configured to perform the following step: sending an authentication request to the digital asset authentication platform 2, the authentication request including a to-be- authenticated digital asset or a to-be-authenticated digital asset entity and an authentication code.
In a scenario, a purchaser wants to purchase a digital asset of a seller, but the purchaser needs to authenticate the digital asset or a digital asset entity provided by the seller, to determine authenticity of the digital asset or the digital asset entity. Generally, the seller sends a to-be- authenticated digital asset or a to-be-authenticated digital asset entity and an authentication code to the purchaser. The purchaser sends an authentication request carrying the to-be-authenticated digital asset or the to-be-authenticated digital asset entity and the authentication code to the digital asset authentication platform 2 by using the client 11. Subsequently, the authentication request is processed by the digital asset authentication platform 2, to finally obtain an authentication result. Therefore, it may be understood that in this embodiment of this application, the term "authenticate" includes the meaning of "confirm".
The digital asset authentication platform 2 is configured to perform the following steps: receiving the authentication request, specifically, the digital asset authentication platform 2 receives the authentication request sent by the client 11.
searching a digital asset package digest 6 in the public blockchain 5 based on the authentication code, to obtain a signed string A of a digital asset or a digital asset entity in the digital asset package digest; and It should be noted that the authentication code has a function of tracing the digital asset package digest. The digital asset package digest can be searched by using the authentication code. The searching process is not a key point of the technical solutions of this application and is common knowledge, and therefore is not described in detail. In this embodiment of this application, the digital asset package digest can be stored in the public blockchain or a dedicated subchain of a blockchain.
The specific process of searching the digital asset package digest in the public blockchain based on the authentication code includes: referring to FIG. 3 again, if the digital asset package digest 6 is stored in the public blockchain, the digital asset package digest 6 can be searched by using the authentication code; and referring to FIG. 4 again, if the digital asset package digest 6 1s stored in a dedicated subchain 7, a searching operation is first performed on the public blockchain 5. If the digital asset package digest 6 is not searched, the dedicated subchain 7 storing the digital asset package digest 6 is obtained by keeping searching by using the public blockchain 5. In this way, the digital asset package digest 6 1s searched and obtained in the dedicated subchain 7 storing the digital asset package digest 6 by using a common node 4 of the public blockchain and the dedicated subchain.
In this application, storing the digital asset package digest in the blockchain network can preventing the digital asset package digest from being tampered. In another aspect, because the digital asset package digest has a relatively small capacity as compared with the digital asset or the digital asset entity, the system described in this embodiment has relatively high system performance.
In this embodiment, the digital asset authentication platform 2 stores a private key for encryption of the digital asset package digest 6.
Therefore, the digital asset package digest 6 can be easily decrypted by using the private key, to obtain the signed string A.
During the process of authenticating the digital asset or the digital asset entity, the signed string A is calculated by the platform by using a digital signature algorithm. The signed string A obtained by using the digital signature algorithm, for example, may be SHA512, is unique.
authenticating the to-be-authenticated digital asset or the to-be- authenticated digital asset entity based on the signed string A, and sending an authentication result to the client.
In a possible implementation, the digital asset authentication platform is further configured to perform the authenticating the to-be- authenticated digital asset or the to-be-authenticated digital asset entity according to the following steps: performing a digital signature operation on the to-be- authenticated digital asset or the digital asset entity, to obtain a signed string B; and comparing whether the signed string A is same to the signed string B, to obtain the authentication result based on a comparison result. Specifically, the digital signature operation is performed on the to- be-authenticated digital asset or the digital asset entity in the authentication request. This digital signature operation and a digital signature operation for obtaining the signed string A use a same algorithm and same algorithm parameters.
Whether the signed string A is same to the signed string B is compared. If the signed string A is same to the signed string B, the authentication of the to-be-authenticated digital asset or the to-be- authenticated digital asset entity succeeds, and it indicates that the digital asset or the digital asset entity provided by the seller is authentic. If the signed string A is not same to the signed string B, the authentication of the to-be-authenticated digital asset or the to-be-authenticated digital asset entity fails, and it indicates that the digital asset or the digital asset entity provided by the seller is false. The digital asset authentication platform 2 sends the authentication result to the client 11.
Embodiment 2 This application provides a system for processing digital asset authentication, including a client 11, and a digital asset authentication platform 2 and a public blockchain 5 that are connected through Internet, the digital asset authentication platform 2 being a node of the public blockchain 5.
The client 11 is configured to perform the following step: sending an authentication request to the digital asset authentication platform 2, the authentication request including an authentication code. In this embodiment, the client 11 has already obtained the authentication code. Therefore, a digital asset or a digital asset entity can be obtained by using a disclosed method or channel by using the authentication code. However, authenticity of the digital asset or the digital asset entity cannot be verified. Therefore, the authenticity of the digital asset or the digital asset entity that is already obtained needs to be verified by using the authentication code.
It should be noted that the authentication request in this embodiment of this application merely includes the authentication code, and a process of uploading a to-be-authenticated digital asset or a to-be- authenticated digital asset entity is saved, thus reducing operation load of the system.
The digital asset authentication platform is configured to perform the following steps: receiving the authentication request; searching a digital asset package digest in the public blockchain based on the authentication code, to obtain a signed string A of a digital asset or a digital asset entity in the digital asset package digest; and sending the signed string A to the client 11. The client 11 receives the signed string A sent by the digital asset authentication platform 2. The client 11 compares whether the signed string A is same to a signed string B, and obtains an authentication result based on a comparison result, wherein the signed string B is a result after a digital signature operation is performed on the to-be-authenticated digital asset or the digital asset entity that is obtained in advance.
In this embodiment of this application, the specific process in which the digital asset authentication platform 2 searches the digital asset package digest from the public blockchain, and the specific process of obtaining the signed string A of the digital asset or the digital asset entity from the digital asset package digest are same to those in embodiment 1, and details are not described herein again.
Embodiment 3 This application provides a system for processing digital asset authentication, as shown in FIG. 5 to FIG. 7, including a client 11, and a digital asset authentication platform 2, a public blockchain 5, and a dedicated subchain 7 that are connected through Internet, the digital asset authentication platform 2 being a node of the dedicated subchain 7. Specifically, the dedicated subchain 7 includes a plurality of subchain nodes 71, and the digital asset authentication platform 2 is a node of the dedicated subchain 7. The client 11 is configured to perform the following step: sending an authentication request to the digital asset authentication platform 2, the authentication request including a to-be-authenticated digital asset or a to-
be-authenticated digital asset entity and an authentication code.
The digital asset authentication platform 2 is configured to perform the following steps: receiving the authentication request; determining, based on the authentication code, whether a digital asset package digest 6 exists in the dedicated subchain 7; obtaining a signed string A of a digital asset or a digital asset entity in the digital asset package digest if the digital asset package digest exists, as shown in FIG. 5. if the digital asset package digest does not exist, searching the digital asset package digest in the public blockchain 5 based on the authentication code and by using a proxy node 4 of the dedicated subchain, that is, a common node 4 of the public blockchain and the dedicated subchain, wherein the signed string A of the digital asset or the signed string A of the digital asset entity in the digital asset package digest is obtained if the digital asset package digest is searched; and The digital asset package digest 6 is searched in the public blockchain 5, that is connected to the dedicated subchain, based on the authentication code and by using the proxy node 4 of the dedicated subchain.
As shown in FIG. 6, if the digital asset package digest 6 is stored at a node of the public blockchain, the digital asset package digest 6 can be searched in the public blockchain 5. As shown in FIG. 7, if the digital asset package digest 6 is stored at a subchain node of another dedicated subchain, it 1s impossible to find the digital asset package digest 6 in the public blockchain 5. In this case, the digital asset package digest 6 is obtained by further querying, in the public blockchain 5, a target dedicated subchain that stores the digital asset package digest 6, and then searching in a corresponding dedicated subchain by using a common node of the public blockchain and the target dedicated subchain.
The process of obtaining the signed string A of the digital asset or the digital asset entity in the digital asset package digest 1s same to that in embodiment 1, and details are not described herein again. authenticating the to-be-authenticated digital asset or the to-be- authenticated digital asset entity based on the signed string A, and sending an authentication result to the client.
In a possible implementation, the digital asset authentication platform 2 is further configured to perform the authenticating the to-be-authenticated digital asset or the to-be-authenticated digital asset entity according to the following steps: performing a digital signature operation on the to-be- authenticated digital asset or the digital asset entity, to obtain a signed string B; and comparing whether the signed string A is same to the signed string B, to obtain the authentication result based on a comparison result. The process of authenticating the to-be-authenticated digital asset or the to-be-authenticated digital asset entity in this embodiment is same to that in embodiment 1, and details are not described herein again. Embodiment 4 This application provides a system for processing digital asset authentication, including a client 11, and a digital asset authentication platform 2, a public blockchain 5, and a dedicated subchain 7 that are connected through Internet, the digital asset authentication platform 2 being a node of the dedicated subchain 7. The client is configured to perform the following steps: sending an authentication request to the digital asset authentication platform, the authentication request including an authentication code; and comparing whether a signed string A is same to a signed string B, and obtaining an authentication result based on a comparison result, where the signed string B is a result after a digital signature operation is performed on a to-be- authenticated digital asset or a digital asset entity. The digital asset authentication platform is configured to perform the following steps: receiving the authentication request; determining, based on the authentication code, whether a digital asset package digest exists in the dedicated subchain; if the digital asset package digest exists, obtaining a signed string A of a digital asset or a signed string A of a digital asset entity in the digital asset package digest, and sending the signed string A to the client; and if the digital asset package digest does not exist, searching the digital asset package digest 6 in the public blockchain 5 based on the authentication code and by using a proxy node 4 of the dedicated subchain, to obtain the signed string A of the digital asset or the signed string A of the digital asset entity in the digital asset package digest, and sending the signed string A to the client.
The client 11 receives the signed string A sent by the digital asset authentication platform.
Embodiment 5 This application provides a system for processing digital asset authentication, including a client 11, and a digital asset authentication platform 2, a public blockchain 5, and a dedicated subchain 7 that are connected through Internet, the digital asset authentication platform 2 being a node of the dedicated subchain 7. The client is configured to perform the following step: sending an authentication request to the digital asset authentication platform, the authentication request including a to-be- authenticated digital asset or a to-be-authenticated digital asset entity and an authentication code.
The digital asset authentication platform is configured to perform the following steps: receiving the authentication request; searching a digital asset package digest in the public blockchain based on the authentication code and a proxy node 4 of the dedicated subchain, to obtain a signed string A of a digital asset or a signed string A of a digital asset entity in the digital asset package digest; and authenticating the to-be-authenticated digital asset or the to-be- authenticated digital asset entity based on the signed string A, and sending an authentication result to the client.
This embodiment differs from embodiment 4 in that although the digital asset authentication platform 2 is a node of the dedicated subchain 7, the dedicated subchain is not directly searched while searching the digital asset package digest, but is directly searched in the public blockchain by using the proxy node 4 of the dedicated subchain or a common node 4 of the public blockchain 5 and the dedicated subchain 7. The method of authenticating the to-be-authenticated digital asset or the to-be-authenticated digital asset entity is described above in detail, and details are not described herein again.
Embodiment 6 This application provides a system for processing digital asset authentication, including a client 11, and a digital asset authentication platform 2, a public blockchain 5, and a dedicated subchain 7 that are connected through Internet, the digital asset authentication platform 2 being a node of the dedicated subchain 7. The client is configured to perform the following steps: sending an authentication request to the digital asset authentication platform, the authentication request including an authentication code; receiving a signed string A sent by the digital asset authentication platform; and comparing whether the signed string A is same to a signed string B, and obtaining an authentication result based on a comparison result, where the signed string B is a result after a digital signature operation is performed on a to-be-authenticated digital asset or a digital asset entity.
The digital asset authentication platform is configured to perform the following steps: receiving the authentication request; searching a digital asset package digest in the public blockchain based on the authentication code and a proxy node 4 of the dedicated subchain, to obtain the signed string A of a digital asset or a digital asset entity in the digital asset package digest; and sending the signed string A to the client.
Embodiment 7 This application provides a system for processing digital asset authentication, as shown in FIG. 8 and FIG. 9, including a client 11, and a digital asset authentication platform 2, a public blockchain 5, and a digital asset agent platform 9 that are connected through Internet, the digital asset agent platform 9 being a node of the public blockchain 5. The digital asset agent platform 9 can take place of the digital asset authentication platform 2 in embodiments 1 to 6 to complete the corresponding functions, to relieve data processing pressure of the digital asset authentication platform.
The digital asset agent platform 9 is a node of the public blockchain 5. A blockchain network has a decentralization characteristic and a non-repudiation function.
Therefore, taking the digital asset agent platform 9 as a node of the blockchain network can ensure credibility of data in the digital asset agent platform 9. In this embodiment of this application, the digital asset authentication platform 2 is in the blockchain network.
The client 11 is configured to perform the following step: sending an authentication request to the digital asset authentication platform, the authentication request including a to-be- authenticated digital asset or a to-be-authenticated digital asset entity and an authentication code.
The digital asset authentication platform is configured to perform the following steps: receiving the authentication request; sending an authentication instruction to the digital asset agent platform, the authentication instruction including the to-be-authenticated digital asset or the to-be- authenticated digital asset entity and the authentication code; and receiving an authentication result sent by the digital asset agent platform, and sending the authentication result to the client.
The digital asset agent platform is configured to perform the following steps based on the authentication instruction: searching a digital asset package digest in the public blockchain based on the authentication code, to obtain a signed string of a digital asset or a digital asset entity in the digital asset package digest; and The specific process of searching the digital asset package digest in the public blockchain based on the authentication code is that: referring to FIG. 8 again, if a digital asset package digest 6 is stored in the public blockchain, the digital asset package digest 6 can be searched by using the authentication code; and referring to FIG. 9 again, if the digital asset package digest 6 is stored in a dedicated subchain 7, a searching operation is first performed on the public blockchain. If the digital asset package digest 6 is not searched, the dedicated subchain 7 storing the digital asset package digest 6 is obtained by keeping searching by using the public blockchain 5. In this way, the digital asset package digest 6 is searched in the dedicated subchain storing the digital asset package digest 6 by using a common node 4 of the public blockchain and the dedicated subchain.
authenticating the to-be-authenticated digital asset or the to-be- authenticated digital asset entity based on the signed string, and sending an authentication result to the digital asset authentication platform.
In a possible implementation, the digital asset agent platform is further configured to perform the authenticating the to-be-authenticated digital asset or the to-be-authenticated digital asset entity according to the following steps: performing a digital signature operation on the to-be-
authenticated digital asset or the digital asset entity, to obtain a signed string B; and comparing whether the signed string A is same to the signed string B, to obtain the authentication result based on a comparison result.
In the system, a data transmission process is that: the client 11 sends the authentication request to the digital asset authentication platform 2; the digital asset authentication platform 2 receives the authentication request, and sends the authentication instruction to the digital asset agent platform 9; the digital asset agent platform 9 obtains the authentication result based on the authentication instruction, and returns the authentication result to the digital asset authentication platform 2; and the digital asset authentication platform 2 sends the authentication result to the client 11. In this embodiment of this application, the digital asset authentication platform 2 can store the authentication result, and/or seal a time stamp for the authentication result.
Meanwhile, the digital asset authentication platform 2 can store the authentication request, and/or seal a time stamp for the authentication request.
Embodiment 8 This application provides a system for processing digital asset authentication, including a client 11, and a digital asset authentication platform 2, a public blockchain 5, and a digital asset agent platform 9 that are connected through Internet, the digital asset agent platform 9 being a node of the public blockchain 5. The client 11 is configured to perform the following step: sending an authentication request to the digital asset authentication platform 2, the authentication request including an authentication code.
The digital asset authentication platform is configured to perform the following steps:
receiving the authentication request; and sending an authentication instruction to the digital asset agent platform based on the authentication request, the authentication instruction including the authentication code.
The digital asset agent platform is configured to perform the following steps based on the authentication instruction: searching a digital asset package digest in the public blockchain based on the authentication code, to obtain a signed string A of a digital asset or a digital asset entity in the digital asset package digest; and sending the signed string A to the digital asset authentication platform.
The signed string A sent by the digital asset agent platform is received, and 1s sent to the client.
The client receives the signed string A sent by the digital asset authentication platform.
The client compares whether the signed string A is same to a signed string B, and obtains an authentication result based on a comparison result, where the signed string B is a result after a digital signature operation is performed on a to-be-authenticated digital asset or a digital asset entity.
Embodiment 9 This application provides a system for processing digital asset authentication, as shown in FIG. 10 to FIG. 12, including a client 11, and a digital asset authentication platform 2, a public blockchain 5, a dedicated subchain 7, and a digital asset agent platform 9 that are connected through Internet, the digital asset agent platform 9 being a node of the dedicated subchain.
Specifically, the dedicated subchain 7 includes a plurality of subchain nodes 71, and the digital asset agent platform 9 is a node of the dedicated subchain 7.
In this embodiment of this application, the digital asset authentication platform 2 is in the blockchain network.
The client 11 is configured to perform the following step: sending an authentication request to the digital asset authentication platform, the authentication request including a to-be- authenticated digital asset or a to-be-authenticated digital asset entity and an authentication code.
The digital asset authentication platform is configured to perform the following steps: receiving the authentication request; sending an authentication instruction to the digital asset agent platform, the authentication instruction including the to-be-authenticated digital asset or the to-be- authenticated digital asset entity and the authentication code; and receiving an authentication result sent by the digital asset agent platform, and sending the authentication result to the client; and the digital asset agent platform is configured to perform the following steps based on the authentication instruction: determining, based on the authentication code, whether a digital asset package digest exists in the dedicated subchain; obtaining a signed string A of a digital asset or a digital asset entity in the digital asset package digest if the digital asset package digest exists, as shown in FIG. 10; authenticating the to-be-authenticated digital asset or the to-be- authenticated digital asset entity based on the signed string A, and sending an authentication result to the digital asset authentication platform; if the digital asset package digest does not exist, searching a digital asset package digest 6 in the public blockchain 5 based on the authentication code and a proxy node 4 of the dedicated subchain, where the signed string A of the digital asset or the digital asset entity in the digital asset package digest is obtained if the digital asset package digest is searched; and The digital asset package digest is searched in the public blockchain, that 1s connected to the dedicated subchain, based on the authentication code and by using the proxy node 4 of the dedicated subchain. The specific process is that: as shown in FIG. 11, if the digital asset package digest 6 is stored in the public blockchain, the digital asset package digest can be searched by using the authentication code. As shown in FIG. 12, if the digital asset package digest 6 is stored at a subchain node of another dedicated subchain, it is impossible to find the digital asset package digest 6 in the public blockchain 5. In this case, the digital asset package digest 6 is obtained by further querying, in the public blockchain, a target dedicated subchain that stores the digital asset package digest 6, and then searching in a corresponding dedicated subchain by using a common node of the public blockchain and the target dedicated subchain.
authenticating the to-be-authenticated digital asset or the to-be- authenticated digital asset entity based on the signed string A, and sending an authentication result to the digital asset authentication platform.
The process of obtaining the signed string A of the digital asset or the digital asset entity in the digital asset package digest is same to that in embodiment 3, but has a different execution body. In embodiment 1, the digital asset authentication platform is used, while in this embodiment, the digital asset agent platform 9 is used.
In a possible implementation, the digital asset agent platform 9 is further configured to perform the authenticating the to-be-authenticated digital asset or the to-be-authenticated digital asset entity according to the following steps: performing a digital signature operation on the to-be- authenticated digital asset or the digital asset entity, to obtain a signed string B; and comparing whether the signed string A is same to the signed string B, to obtain the authentication result based on a comparison result.
Embodiment 10 This application provides a system for processing digital asset authentication, including a client 11, and a digital asset authentication platform 2, a public blockchain 5, a dedicated subchain 7, and a digital asset agent platform 9 that are connected through Internet, the digital asset agent platform 9 being a node of the dedicated subchain 7.
In this embodiment of this application, the digital asset authentication platform 2 is in the blockchain network.
The client is configured to perform the following step: sending an authentication request to the digital asset authentication platform, the authentication request including an authentication code.
the digital asset authentication platform is configured to perform the following steps: receiving the authentication request; and sending an authentication instruction to the digital asset agent platform, the authentication instruction including the authentication code. The digital asset agent platform is configured to perform the following steps based on the authentication instruction: determining, based on the authentication code, whether a digital asset package digest exists in the dedicated subchain; if the digital asset package digest exists, obtaining a signed string of a digital asset or a digital asset entity in the digital asset package digest, and sending the signed string A to the digital asset authentication platform; and if the digital asset package digest does not exist, searching the digital asset package digest in the public blockchain based on the authentication code and a proxy node 4 of the dedicated subchain, to obtain the signed string A of the digital asset or the digital asset entity in the digital asset package digest, and sending the signed string A to the digital asset authentication platform.
The digital asset authentication platform receives the signed string A sent by the digital asset agent platform, and sends the signed string A to the client.
The client receives the signed string A sent by the digital asset authentication platform.
The client compares whether the signed string A is same to a signed string B, and obtains an authentication result based on a comparison result, where the signed string B is a result after a digital signature operation is performed on a to-be-authenticated digital asset or a digital asset entity.
Embodiment 11 This application provides a system for processing digital asset authentication, including a client 11, and a digital asset authentication platform 2, a public blockchain 5, a dedicated subchain 7, and a digital asset agent platform 9 that are connected through Internet, the digital asset agent platform 9 being a node of the dedicated subchain 7.
In this embodiment of this application, the digital asset authentication platform 2 is in the blockchain network. The client is configured to perform the following step: sending an authentication request to the digital asset authentication platform, the authentication request including a to-be- authenticated digital asset or a to-be-authenticated digital asset entity and an authentication code.
The digital asset authentication platform is configured to perform the following steps: receiving the authentication request; and sending an authentication instruction to the digital asset agent platform, the authentication instruction including the to-be-authenticated digital asset or the to-be-authenticated digital asset entity and the authentication code.
The digital asset agent platform is configured to perform the following steps based on the authentication instruction:
searchmg a digital asset package digest in the public blockchain based on the authentication code and a proxy node 4 of the dedicated subchain, to obtain a signed string of a digital asset or a digital asset entity in the digital asset package digest; and authenticating the to-be-authenticated digital asset or the to-be- authenticated digital asset entity based on the signed string, and sending an authentication result to the digital asset authentication platform.
The digital asset authentication platform receives the authentication result sent by the digital asset agent platform, and sends the authentication result to the client.
This embodiment differs from embodiment 10 in that although the digital asset agent platform 9 is a node of the dedicated subchain 7, the dedicated subchain is not directly searched while searching the digital asset package digest, but is directly searched in the public blockchain by using the proxy node 4 of the dedicated subchain or a common node 4 of the public blockchain 5 and the dedicated subchain 7.
The method of authenticating the to-be-authenticated digital asset or the to-be-authenticated digital asset entity is described above in detail, and details are not described herein again.
Embodiment 12 This application provides a system for processing digital asset authentication, including a client 11, and a digital asset authentication platform 2, a public blockchain 5, a dedicated subchain 7, and a digital asset agent platform 9 that are connected through Internet, the digital asset agent platform 9 being a node of the dedicated subchain 7.
In this embodiment of this application, the digital asset authentication platform 2 is in the blockchain network.
The client is configured to perform the following steps: sending an authentication request to the digital asset authentication platform, the authentication request including an authentication code; receiving a signed string A sent by the digital asset authentication platform; and comparing whether the signed string A is same to a signed string B, and obtaining an authentication result based on a comparison result, where the signed string B is a result after a digital signature operation is performed on a to-be-authenticated digital asset or a digital asset entity.
The digital asset authentication platform is configured to perform the following steps: receiving the authentication request; sending an authentication instruction to the digital asset agent platform, the authentication instruction including the authentication code; and receiving the signed string A sent by the digital asset agent platform, and sending the signed string A to the client.
The digital asset agent platform is configured to perform the following steps based on the authentication instruction: searching a digital asset package digest in the public blockchain based on the authentication code and a proxy node 4 of the dedicated subchain, to obtain the signed string A of a digital asset or a digital asset entity in the digital asset package digest; and sending the signed string A to the digital asset authentication platform.
In this application, the blockchain network has a decentralization characteristic and a non-repudiation function. The digital asset authentication platform or the digital asset agent platform in this application is within the blockchain network, to serve as a node of the blockchain network. Therefore, credibility of data of the digital asset authentication platform or the digital asset agent platform can be ensured. In addition, in this application, storing the digital asset package digest in the blockchain network can preventing the digital asset package digest from being tampered. In another aspect, because the digital asset package digest has a relatively small capacity as compared with the digital asset or the digital asset entity, the system for processing digital asset authentication disclosed in this application has relatively high system performance.
In specific implementations, the present invention further provides a computer storage medium that may store a program. The program, while being implemented, can include some or all steps in the embodiments of an order reconstruction method provided in the present invention. The storage medium may be a magnetic disk, a compact disc, a read-only memory (read-only memory in English, ROM for short), a random access memory (random access memory in English, RAM for short), or the like.
A person skilled in the art can clearly learn that the technology in the embodiments of the present invention can be implemented through software in combination with a necessary general hardware platform. On the basis of such understanding, the technical solutions in the embodiments of the present invention essentially or parts of the technical solutions in the embodiments of the present invention that attribute to the prior art can be represented in software products. A computer software product can be stored in the storage medium, such as a ROM/RAM, a magnetic disk, a compact disc, or the like, and includes a plurality of instructions to enable a computer device (may be a personal computer, a server, a network device, or the like) to perform the method in all embodiments or in some embodiments of the present invention.
For same or similar parts between the embodiments in this specification, reference may be made to each other.
The foregoing implementations of the present invention do not constitute any limitation on the protection scope of the present invention.
Claims (10)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
NL2026414A NL2026414B1 (en) | 2020-09-04 | 2020-09-04 | System for processing digital asset authentication |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
NL2026414A NL2026414B1 (en) | 2020-09-04 | 2020-09-04 | System for processing digital asset authentication |
Publications (2)
Publication Number | Publication Date |
---|---|
NL2026414A true NL2026414A (en) | 2020-11-27 |
NL2026414B1 NL2026414B1 (en) | 2021-10-14 |
Family
ID=73598262
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
NL2026414A NL2026414B1 (en) | 2020-09-04 | 2020-09-04 | System for processing digital asset authentication |
Country Status (1)
Country | Link |
---|---|
NL (1) | NL2026414B1 (en) |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20190251576A1 (en) * | 2018-02-13 | 2019-08-15 | Texas Precious Metals LLC | Tracking and verifying authenticity of an asset via a distributed ledger |
US20190286102A1 (en) * | 2018-03-16 | 2019-09-19 | General Electric Company | System and method to protect items associated with additive manufacturing |
US20200084045A1 (en) * | 2018-09-10 | 2020-03-12 | Masterpeace Solutions Ltd. | Establishing provenance of digital assets using blockchain system |
-
2020
- 2020-09-04 NL NL2026414A patent/NL2026414B1/en active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20190251576A1 (en) * | 2018-02-13 | 2019-08-15 | Texas Precious Metals LLC | Tracking and verifying authenticity of an asset via a distributed ledger |
US20190286102A1 (en) * | 2018-03-16 | 2019-09-19 | General Electric Company | System and method to protect items associated with additive manufacturing |
US20200084045A1 (en) * | 2018-09-10 | 2020-03-12 | Masterpeace Solutions Ltd. | Establishing provenance of digital assets using blockchain system |
Also Published As
Publication number | Publication date |
---|---|
NL2026414B1 (en) | 2021-10-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11005779B2 (en) | Method of and server for detecting associated web resources | |
US11645404B2 (en) | System, method, and computer program product for preventing access to data with respect to a data access attempt associated with a remote data sharing session | |
CN106878264B (en) | Data management method and server | |
US20030095660A1 (en) | System and method for protecting digital works on a communication network | |
US20080288509A1 (en) | Duplicate content search | |
CN106899566A (en) | A kind of authentication method, equipment and Authentication Client | |
CN111770072B (en) | Method and device for accessing function page through single sign-on | |
CN106330846A (en) | Cross-platform object recommendation method and device | |
US9652458B1 (en) | Deriving associations between assets | |
CN115248919A (en) | Method and device for calling function interface, electronic equipment and storage medium | |
CN110597820A (en) | Block chain based information processing method and device, storage medium and equipment | |
NL2026414B1 (en) | System for processing digital asset authentication | |
CN113010904A (en) | Data processing method and device and electronic equipment | |
CN112804222A (en) | Data transmission method, device, equipment and storage medium based on cloud deployment | |
US9843559B2 (en) | Method for determining validity of command and system thereof | |
CN111090616A (en) | File management method, corresponding device, equipment and storage medium | |
CN108460116B (en) | Search method, search device, computer equipment, storage medium and search system | |
CN106598567A (en) | Method and device for displaying page elements on terminal equipment | |
Geethanjali et al. | IPFS-Based Image Sharing Using Perceptual Hash Code with Digital Right Management | |
TWI750252B (en) | Method and device for recording website access log | |
CN111931159B (en) | Method and system for verifying validity of webpage data interface | |
Shekar et al. | Security Threats and Privacy Issues in Cloud Data | |
NL2025496B1 (en) | System for processing digital asset that is to be authenticated | |
CN112242983B (en) | Digital asset authentication processing system | |
KR100619179B1 (en) | Method and apparatus for detecting invalid clicks on the internet search engine |