CN108734480A - Red wine scarcity method of proof based on block chain - Google Patents
Red wine scarcity method of proof based on block chain Download PDFInfo
- Publication number
- CN108734480A CN108734480A CN201810492753.7A CN201810492753A CN108734480A CN 108734480 A CN108734480 A CN 108734480A CN 201810492753 A CN201810492753 A CN 201810492753A CN 108734480 A CN108734480 A CN 108734480A
- Authority
- CN
- China
- Prior art keywords
- wine
- block chain
- red wine
- bottle
- public key
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/018—Certifying business or products
- G06Q30/0185—Product, service or business identity fraud
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/14—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Development Economics (AREA)
- Finance (AREA)
- Computing Systems (AREA)
- Entrepreneurship & Innovation (AREA)
- Accounting & Taxation (AREA)
- Computer Hardware Design (AREA)
- Economics (AREA)
- General Engineering & Computer Science (AREA)
- Marketing (AREA)
- Strategic Management (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Storage Device Security (AREA)
Abstract
The red wine scarcity method of proof based on block chain that the present invention is more particularly directed to a kind of, includes the following steps:(A) it is that every bottle of red wine prepares different disclosed public keys and hidden private key;(B) minute book criticizes the total bottle number and washout number of red wine on block chain, and block chain network is written in this batch of red wine;(C) intelligent contract is disposed on block chain, and inquiring and authenticating and state change function are provided;It (D) can be according to public key to the wine product information of the block chain query red wine, the total bottle number of this batch of red wine and washout number before client's purchase;(E) the red wine state and washout number on block chain can be changed after client's corkage according to private key.It ensure that client also can reduce the possibility of forgery at any time by the authenticity of Pubic-Key search wine, scarcity by the state of red wine on private key more new block chain;Block chain network ensure that data are true and reliable, and intelligent contract can be performed automatically scarcity verification and state update, can not artificially intervene, increase the confidence level of data.
Description
Technical field
The present invention relates to block chain technical field, more particularly to a kind of red wine scarcity method of proof based on block chain.
Background technology
Block chain (BlockChain) technology has decentralization, distributed data as a kind of distributed account book technology
It is shared, anonymous, can retrospective nature, in conjunction with the automatic executing function of intelligent contract, it is considered to be one of most promising technology.
As living standard improves, red wine increasingly receives people's favor.It is red that many chateaus both provide high-end limited edition
The characteristics of wine product, these products all have value high, limited amount, but how to ensure and prove the rare of the red wine product
Property, authenticity, no forgery happens?Existing centralized system verification system stores product information using centralized database,
Judge the uniqueness of red wine product by inquiring database information.This method has apparent defect:Because of system operator
Database data can be changed, it is possible to occur, by control centre's system, changing primary products data, it is red to reach forgery
The purpose of wine product.
Invention content
The red wine scarcity method of proof based on block chain that the purpose of the present invention is to provide a kind of ensureing every bottle of wine data
Authenticity.
In order to achieve the above object, the technical solution adopted by the present invention is:A kind of red wine scarcity based on block chain proves
Method includes the following steps:(A) it is that every bottle of red wine prepares different public key and private key, public key can be disclosed and be checked, private key only exists
It can just be checked after corkage;(B) on block chain minute book batch red wine total bottle number and washout number, and the public key of this batch of red wine
Block chain network is written by encrypted mode with private key;(C) intelligent contract is disposed on block chain, and inquiring and authenticating and shape are provided
State changes function;(D) client purchase before can be according to wine product information from public key to the block chain query red wine, the total bottle number of this batch of red wine
With washout number;(E) the red wine state and washout number on block chain can be changed after client's corkage according to private key.
Compared with prior art, there are following technique effects by the present invention:By the double representation of public key and private key, ensure that
Client can pass through the authenticity of Pubic-Key search wine, scarcity at any time, it is also ensured that after client's consumption, pass through private key more new district
The state of red wine on block chain, reduces the possibility of forgery;Block chain network is recorded in every batch of red wine data, ensure that every batch of
Red wine ciphertext data are true and reliable, and producer, agent and other adulterators change the batch red wine data without permission, increase
Add data reliability;Intelligent contract can be performed automatically scarcity verification and state update, can not artificially intervene, increase data
Confidence level.
Specific implementation mode
With reference to embodiment, the present invention is described in further detail.
The red wine scarcity method of proof based on block chain that the invention discloses a kind of, includes the following steps:(A) it is every bottle
Red wine prepares different public key and private key, and public key can be disclosed and be checked, private key can just be checked only after corkage;(B) in block chain
The total bottle number and washout number of upper minute book batch red wine, and public key this batch of red wine and private key pass through encrypted mode write area
Block chain network;(C) intelligent contract is disposed on block chain, and inquiring and authenticating and state change function are provided;It (D) can before client's purchase
According to public key to the wine product information of the block chain query red wine, the total bottle number and washout number of this batch of red wine;(E) after client's corkage
The red wine state and washout number on block chain can be changed according to private key.By the double representation of public key and private key, visitor ensure that
Family can pass through the authenticity of Pubic-Key search wine, scarcity at any time, it is also ensured that after client's consumption, pass through private key more new block
The state of red wine on chain, reduces the possibility of forgery;Block chain network is recorded in every batch of red wine data, ensure that every batch of is red
Wine ciphertext data are true and reliable, and producer, agent and other adulterators change the batch red wine data without permission, increase
Data reliability;Intelligent contract can be performed automatically scarcity verification and state update, can not artificially intervene, and increase data can
Reliability.
Public key and private key can have many methods to generate, and in the present embodiment preferably, the step A includes following
Step:(A1) every bottle of red wine distributes an ID number, this bottle of red wine of unique mark, and ID number can be made of numeral and letter, digit
It is 64;(A2) every bottle of red wine is named as wine product information by one section of its essential information of text entry and state, wine product information
Format has very much, for example following this format may be used:{ ID number, type, batch, state and date of manufacture }, also may be used certainly
With with other forms, as long as being able to record the essential information and state of red wine;(A3) it is that every bottle of red wine is given birth to by RSA Algorithm
At corresponding public key and private key;(A4) public key in the form of Quick Response Code is sprayed into body and is constituted public key, private key is with Quick Response Code
Form sprays to bottle stopper bottom and constitutes private key.RSA cryptographic algorithms are a kind of rivest, shamir, adelmans, in public key encryption and electricity
RSA is widely used in sub- business, and up to the present, there are no the modes of any reliable attack RSA Algorithm in the world, as long as
The length long enough of its key, being actually with the information of rsa encryption cannot be broken by solution.Therefore, it is generated using RSA Algorithm
Public key and private key safety are very high.Public key is can be disclosed, therefore public key is directly sprayed to body here, it is of course possible to spray
It is coated on packing box;Private key can just be checked after only opening, therefore private key is sprayed on bottle stopper bottom here, ensure only to open bottle
Plug, can just see private key.
For convenience write data into block chain, while there is certain safety, it is in the present embodiment specifically, described
Step B includes the following steps:(B1) the wine product information of this bottle of red wine is encrypted by public key, encrypted content passes through
Base64 is encoded, and the content after coding is named as wine product ciphertext;(B2) it is carried out by the wine product ciphertext after private key pair encryption
Signature, signature contents are named as wine product signature;(B3) two hash table H1 and H2 are established in block chain, table H1 is with public key
Key, wine product ciphertext are Value, and table H2 with public key is Key, wine product signature is Value;(B4) by the corresponding public affairs of every bottle of red wine
Key, wine product ciphertext, wine product signature are deposited into table H1 and table H2.
By above step, after red wine data are stored in block chain, can very easily carry out inquiring and authenticating and
Modification.Specific proving program and modification program are as follows:The step D includes the following steps:(D1) client passes through on body
Public key Quick Response Code, obtain the public key of this bottle of wine;(D2) the intelligent contract program on public key to block chain network is uploaded;(D3) intelligence
Energy contract is inquired the corresponding wine product ciphertext of the public key and wine product signature, if do not found, is shown by inquiry table H1 and table H2
This bottle of wine is not present, if found, into next step;(D4) the wine product ciphertext and wine product signature are verified by public key,
If the verification passes, then show that this bottle of wine exists, client can obtain the total bottle number of this batch of red wine and current residual bottle number, otherwise table
Bright this bottle of wine is not present.The step E includes the following steps:(E1) the wine product ciphertext of this bottle of wine is obtained by step D1-D4;
(E2) base64 decodings are carried out to wine product ciphertext;(E3) client obtains the private of this bottle of wine by the private key Quick Response Code of bottle stopper bottom
Key;(E4) decoded wine product ciphertext is decrypted by private key, obtains wine product information in plain text;(E5) the wine product information is changed
In mode field and this batch of red wine washout number, show that this bottle of wine is canceled;(E6) private key encryption wine product information text is used again
This, encrypted content encodes to obtain new wine product ciphertext by base64;(E7) by public key pair in new wine product ciphertext update table H1
The wine product ciphertext answered, after in new wine product ciphertext update to table H1, if next someone inquires the information of this bottle, energy again
See that it is consumed, it is very convenient.
Preferably, further include after the step E7:(E8) after state is nullified successfully, block chain network gives customer economy
Excitation.The economic incentives of block chain network can encourage client actively to change block chain data by private key, and guarantee actually disappears
The consistency for taking data on data and block chain, reduces the possibility of forgery.
Preferably, in this implementation, be only illustrated by taking red wine as an example, in fact, the red wine can be changed to white wine,
Other needs such as painting and calligraphy, collectibles are discerned the false from the genuine, prove the article of scarcity, it is only necessary to change red wine into corresponding article, together
When change wine product information into corresponding Item Information.For example, the signature that red wine can be changed into certain star here shines, certain picture
The picture etc. of family, just no longer elaborates one by one here.
Claims (8)
1. a kind of red wine scarcity method of proof based on block chain, it is characterised in that:Include the following steps:
(A) it is that every bottle of red wine prepares different public key and private key, public key can be disclosed and be checked, private key can just be looked into only after corkage
It sees;
(B) on block chain minute book batch red wine total bottle number and washout number, and public key this batch of red wine and private key pass through
Block chain network is written in encrypted mode;
(C) intelligent contract is disposed on block chain, and inquiring and authenticating and state change function are provided;
It (D) can be according to public key to the wine product information of the block chain query red wine, the total bottle number of this batch of red wine and residue before client's purchase
Bottle number;
(E) the red wine state and washout number on block chain can be changed after client's corkage according to private key.
2. the red wine scarcity method of proof based on block chain as described in claim 1, it is characterised in that:The step A
Include the following steps:
(A1) every bottle of red wine distributes an ID number, this bottle of red wine of unique mark;
(A2) every bottle of red wine is named as wine product information by one section of its essential information of text entry and state;
(A3) it is that every bottle of red wine generates corresponding public key and private key by RSA Algorithm;
(A4) public key in the form of Quick Response Code is sprayed to body and is constituted public key, private key sprays to bottle stopper bottom in the form of Quick Response Code
Portion constitutes private key.
3. the red wine scarcity method of proof based on block chain as claimed in claim 2, it is characterised in that:The step B
Include the following steps:
(B1) the wine product information of this bottle of red wine being encrypted by public key, encrypted content is encoded by base64,
Content after coding is named as wine product ciphertext;
(B2) it is signed by the wine product ciphertext after private key pair encryption, signature contents are named as wine product signature;
(B3) establish two hash table H1 and H2 in block chain, table H1 with public key is Key, wine product ciphertext is Value, table H2 with
Public key is Key, wine product signature is Value;
(B4) the corresponding public key of every bottle of red wine, wine product ciphertext, wine product signature are deposited into table H1 and table H2.
4. the red wine scarcity method of proof based on block chain as claimed in claim 3, it is characterised in that:The step D
Include the following steps:
(D1) client obtains the public key of this bottle of wine by the public key Quick Response Code on body;
(D2) the intelligent contract program on public key to block chain network is uploaded;
(D3) intelligent contract inquires the corresponding wine product ciphertext of the public key and wine product signature, if do not had by inquiry table H1 and table H2
It finds, shows that this bottle of wine is not present, if found, into next step;
(D4) the wine product ciphertext and wine product signature are verified by public key, if the verification passes, then show that this bottle of wine exists,
Client can obtain the total bottle number of this batch of red wine and current residual bottle number;Otherwise show that this bottle of wine is not present.
5. the red wine scarcity method of proof based on block chain as claimed in claim 4, it is characterised in that:The step E
Include the following steps:
(E1) the wine product ciphertext of this bottle of wine is obtained by step D1-D4;
(E2) base64 decodings are carried out to wine product ciphertext;
(E3) client obtains the private key of this bottle of wine by the private key Quick Response Code of bottle stopper bottom;
(E4) decoded wine product ciphertext is decrypted by private key, obtains wine product information in plain text;
(E5) mode field and this batch of red wine washout number in the wine product information are changed, shows that this bottle of wine is canceled;
(E6) private key encryption wine product information text, encrypted content is used to encode to obtain new wine product ciphertext by base64 again;
(E7) by the corresponding wine product ciphertext of public key in new wine product ciphertext update table H1.
6. the red wine scarcity method of proof based on block chain as claimed in claim 5, it is characterised in that:The step E7
After further include:
(E8) after state is nullified successfully, block chain network gives customer economy excitation.
7. such as red wine scarcity method of proof of the claim 2-6 any one of them based on block chain, it is characterised in that:It is described
ID number be made of numeral and letter, digit be 64;Wine product information includes ID number, type, batch, state and date of manufacture.
8. the red wine scarcity method of proof as claimed in any one of claims 1 to 6 based on block chain, it is characterised in that:It is described
Red wine can be changed to white wine, painting and calligraphy, collectibles.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810492753.7A CN108734480A (en) | 2018-05-22 | 2018-05-22 | Red wine scarcity method of proof based on block chain |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810492753.7A CN108734480A (en) | 2018-05-22 | 2018-05-22 | Red wine scarcity method of proof based on block chain |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108734480A true CN108734480A (en) | 2018-11-02 |
Family
ID=63937888
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810492753.7A Pending CN108734480A (en) | 2018-05-22 | 2018-05-22 | Red wine scarcity method of proof based on block chain |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108734480A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110086633A (en) * | 2019-05-13 | 2019-08-02 | 广东辰宜信息科技有限公司 | Ciphertext tamper resistant method in a kind of block chain technology |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106570710A (en) * | 2016-10-27 | 2017-04-19 | 纸飞机(北京)科技有限公司 | Commodity anti-counterfeiting method and device |
CN106709734A (en) * | 2016-12-21 | 2017-05-24 | 毛巨林 | Multiple-two-dimensional code tracing method based on digital identity and system thereof |
CN107341676A (en) * | 2017-07-17 | 2017-11-10 | 深圳天净喔溯源科技有限公司 | False proof mark and the method for tracing to the source |
CN107666388A (en) * | 2016-07-28 | 2018-02-06 | 郑珂威 | Block chain information encryption method based on complete homomorphic cryptography method |
CN107730279A (en) * | 2017-10-18 | 2018-02-23 | 上海唯链信息科技有限公司 | A kind of original factory of vehicle based on block chain technology dispatches from the factory false proof and traceability system |
-
2018
- 2018-05-22 CN CN201810492753.7A patent/CN108734480A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107666388A (en) * | 2016-07-28 | 2018-02-06 | 郑珂威 | Block chain information encryption method based on complete homomorphic cryptography method |
CN106570710A (en) * | 2016-10-27 | 2017-04-19 | 纸飞机(北京)科技有限公司 | Commodity anti-counterfeiting method and device |
CN106709734A (en) * | 2016-12-21 | 2017-05-24 | 毛巨林 | Multiple-two-dimensional code tracing method based on digital identity and system thereof |
CN107341676A (en) * | 2017-07-17 | 2017-11-10 | 深圳天净喔溯源科技有限公司 | False proof mark and the method for tracing to the source |
CN107730279A (en) * | 2017-10-18 | 2018-02-23 | 上海唯链信息科技有限公司 | A kind of original factory of vehicle based on block chain technology dispatches from the factory false proof and traceability system |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110086633A (en) * | 2019-05-13 | 2019-08-02 | 广东辰宜信息科技有限公司 | Ciphertext tamper resistant method in a kind of block chain technology |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107222312B (en) | Asset digitalization method based on block chain technology | |
CN103093365B (en) | The method and system of checking authenticity of products | |
CN102663592B (en) | Article identity dicode identification method based on Quick Response Code | |
CN104915847A (en) | Double-code anti-counterfeiting bottle cap and manufacturing method thereof | |
CN103093361A (en) | Commodity double-layer anti-fake method based on technologies of internet of things | |
CN103077467B (en) | A kind of method and system verifying authenticity of products | |
CN106548353B (en) | Commodity anti-counterfeiting code generation and verification method | |
CN105610578A (en) | Block chain information archiving and privacy protection method | |
CN105930892A (en) | Variable logo two-dimensional code anti-counterfeiting method and system | |
CN113469716A (en) | Product tracing method and system based on block chain and identification analysis | |
CN110941858B (en) | Personal network consumption information protection method based on zero-knowledge proof | |
CN1947113B (en) | Pedigree code | |
EP3099033A1 (en) | System architecture and method for ensuring network information security | |
CN109034832A (en) | The information processing method and device of block chain, information processing node and storage medium | |
CN104239944A (en) | Commodity information identification method | |
CN107154850A (en) | A kind of processing method and processing device of block chain data | |
CN104125239B (en) | A kind of method for network authorization transmitted based on data link encryption and system | |
CN102496113A (en) | Method and system for realizing commodity authentication service | |
CN106059760A (en) | Cipher system for calling system private key from user side cipher module | |
CN204791159U (en) | Two yards anti -fake bottle cap | |
CN108734480A (en) | Red wine scarcity method of proof based on block chain | |
CN102123029A (en) | Counterfeiting token and method of dynamic passwords | |
CN114418570A (en) | Block chain-based non-homogeneous evidence-based processing method and device | |
Prada-Delgado et al. | A blockchain-based crypto-anchor platform for interoperable product authentication | |
CN107563777A (en) | The endowed two-dimension code anti-counterfeit system and method for facing to manufacture line high speed |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20181102 |