CN108734480A - Red wine scarcity method of proof based on block chain - Google Patents

Red wine scarcity method of proof based on block chain Download PDF

Info

Publication number
CN108734480A
CN108734480A CN201810492753.7A CN201810492753A CN108734480A CN 108734480 A CN108734480 A CN 108734480A CN 201810492753 A CN201810492753 A CN 201810492753A CN 108734480 A CN108734480 A CN 108734480A
Authority
CN
China
Prior art keywords
wine
block chain
red wine
bottle
public key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810492753.7A
Other languages
Chinese (zh)
Inventor
梁学栋
梁玉文
蒋德伟
曾胜
叶梦
巩群喜
杨旭
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sichuan Haina Ren Dong Science And Technology Co Ltd
Original Assignee
Sichuan Haina Ren Dong Science And Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sichuan Haina Ren Dong Science And Technology Co Ltd filed Critical Sichuan Haina Ren Dong Science And Technology Co Ltd
Priority to CN201810492753.7A priority Critical patent/CN108734480A/en
Publication of CN108734480A publication Critical patent/CN108734480A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • G06Q30/0185Product, service or business identity fraud
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Development Economics (AREA)
  • Finance (AREA)
  • Computing Systems (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Accounting & Taxation (AREA)
  • Computer Hardware Design (AREA)
  • Economics (AREA)
  • General Engineering & Computer Science (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The red wine scarcity method of proof based on block chain that the present invention is more particularly directed to a kind of, includes the following steps:(A) it is that every bottle of red wine prepares different disclosed public keys and hidden private key;(B) minute book criticizes the total bottle number and washout number of red wine on block chain, and block chain network is written in this batch of red wine;(C) intelligent contract is disposed on block chain, and inquiring and authenticating and state change function are provided;It (D) can be according to public key to the wine product information of the block chain query red wine, the total bottle number of this batch of red wine and washout number before client's purchase;(E) the red wine state and washout number on block chain can be changed after client's corkage according to private key.It ensure that client also can reduce the possibility of forgery at any time by the authenticity of Pubic-Key search wine, scarcity by the state of red wine on private key more new block chain;Block chain network ensure that data are true and reliable, and intelligent contract can be performed automatically scarcity verification and state update, can not artificially intervene, increase the confidence level of data.

Description

Red wine scarcity method of proof based on block chain
Technical field
The present invention relates to block chain technical field, more particularly to a kind of red wine scarcity method of proof based on block chain.
Background technology
Block chain (BlockChain) technology has decentralization, distributed data as a kind of distributed account book technology It is shared, anonymous, can retrospective nature, in conjunction with the automatic executing function of intelligent contract, it is considered to be one of most promising technology.
As living standard improves, red wine increasingly receives people's favor.It is red that many chateaus both provide high-end limited edition The characteristics of wine product, these products all have value high, limited amount, but how to ensure and prove the rare of the red wine product Property, authenticity, no forgery happens?Existing centralized system verification system stores product information using centralized database, Judge the uniqueness of red wine product by inquiring database information.This method has apparent defect:Because of system operator Database data can be changed, it is possible to occur, by control centre's system, changing primary products data, it is red to reach forgery The purpose of wine product.
Invention content
The red wine scarcity method of proof based on block chain that the purpose of the present invention is to provide a kind of ensureing every bottle of wine data Authenticity.
In order to achieve the above object, the technical solution adopted by the present invention is:A kind of red wine scarcity based on block chain proves Method includes the following steps:(A) it is that every bottle of red wine prepares different public key and private key, public key can be disclosed and be checked, private key only exists It can just be checked after corkage;(B) on block chain minute book batch red wine total bottle number and washout number, and the public key of this batch of red wine Block chain network is written by encrypted mode with private key;(C) intelligent contract is disposed on block chain, and inquiring and authenticating and shape are provided State changes function;(D) client purchase before can be according to wine product information from public key to the block chain query red wine, the total bottle number of this batch of red wine With washout number;(E) the red wine state and washout number on block chain can be changed after client's corkage according to private key.
Compared with prior art, there are following technique effects by the present invention:By the double representation of public key and private key, ensure that Client can pass through the authenticity of Pubic-Key search wine, scarcity at any time, it is also ensured that after client's consumption, pass through private key more new district The state of red wine on block chain, reduces the possibility of forgery;Block chain network is recorded in every batch of red wine data, ensure that every batch of Red wine ciphertext data are true and reliable, and producer, agent and other adulterators change the batch red wine data without permission, increase Add data reliability;Intelligent contract can be performed automatically scarcity verification and state update, can not artificially intervene, increase data Confidence level.
Specific implementation mode
With reference to embodiment, the present invention is described in further detail.
The red wine scarcity method of proof based on block chain that the invention discloses a kind of, includes the following steps:(A) it is every bottle Red wine prepares different public key and private key, and public key can be disclosed and be checked, private key can just be checked only after corkage;(B) in block chain The total bottle number and washout number of upper minute book batch red wine, and public key this batch of red wine and private key pass through encrypted mode write area Block chain network;(C) intelligent contract is disposed on block chain, and inquiring and authenticating and state change function are provided;It (D) can before client's purchase According to public key to the wine product information of the block chain query red wine, the total bottle number and washout number of this batch of red wine;(E) after client's corkage The red wine state and washout number on block chain can be changed according to private key.By the double representation of public key and private key, visitor ensure that Family can pass through the authenticity of Pubic-Key search wine, scarcity at any time, it is also ensured that after client's consumption, pass through private key more new block The state of red wine on chain, reduces the possibility of forgery;Block chain network is recorded in every batch of red wine data, ensure that every batch of is red Wine ciphertext data are true and reliable, and producer, agent and other adulterators change the batch red wine data without permission, increase Data reliability;Intelligent contract can be performed automatically scarcity verification and state update, can not artificially intervene, and increase data can Reliability.
Public key and private key can have many methods to generate, and in the present embodiment preferably, the step A includes following Step:(A1) every bottle of red wine distributes an ID number, this bottle of red wine of unique mark, and ID number can be made of numeral and letter, digit It is 64;(A2) every bottle of red wine is named as wine product information by one section of its essential information of text entry and state, wine product information Format has very much, for example following this format may be used:{ ID number, type, batch, state and date of manufacture }, also may be used certainly With with other forms, as long as being able to record the essential information and state of red wine;(A3) it is that every bottle of red wine is given birth to by RSA Algorithm At corresponding public key and private key;(A4) public key in the form of Quick Response Code is sprayed into body and is constituted public key, private key is with Quick Response Code Form sprays to bottle stopper bottom and constitutes private key.RSA cryptographic algorithms are a kind of rivest, shamir, adelmans, in public key encryption and electricity RSA is widely used in sub- business, and up to the present, there are no the modes of any reliable attack RSA Algorithm in the world, as long as The length long enough of its key, being actually with the information of rsa encryption cannot be broken by solution.Therefore, it is generated using RSA Algorithm Public key and private key safety are very high.Public key is can be disclosed, therefore public key is directly sprayed to body here, it is of course possible to spray It is coated on packing box;Private key can just be checked after only opening, therefore private key is sprayed on bottle stopper bottom here, ensure only to open bottle Plug, can just see private key.
For convenience write data into block chain, while there is certain safety, it is in the present embodiment specifically, described Step B includes the following steps:(B1) the wine product information of this bottle of red wine is encrypted by public key, encrypted content passes through Base64 is encoded, and the content after coding is named as wine product ciphertext;(B2) it is carried out by the wine product ciphertext after private key pair encryption Signature, signature contents are named as wine product signature;(B3) two hash table H1 and H2 are established in block chain, table H1 is with public key Key, wine product ciphertext are Value, and table H2 with public key is Key, wine product signature is Value;(B4) by the corresponding public affairs of every bottle of red wine Key, wine product ciphertext, wine product signature are deposited into table H1 and table H2.
By above step, after red wine data are stored in block chain, can very easily carry out inquiring and authenticating and Modification.Specific proving program and modification program are as follows:The step D includes the following steps:(D1) client passes through on body Public key Quick Response Code, obtain the public key of this bottle of wine;(D2) the intelligent contract program on public key to block chain network is uploaded;(D3) intelligence Energy contract is inquired the corresponding wine product ciphertext of the public key and wine product signature, if do not found, is shown by inquiry table H1 and table H2 This bottle of wine is not present, if found, into next step;(D4) the wine product ciphertext and wine product signature are verified by public key, If the verification passes, then show that this bottle of wine exists, client can obtain the total bottle number of this batch of red wine and current residual bottle number, otherwise table Bright this bottle of wine is not present.The step E includes the following steps:(E1) the wine product ciphertext of this bottle of wine is obtained by step D1-D4; (E2) base64 decodings are carried out to wine product ciphertext;(E3) client obtains the private of this bottle of wine by the private key Quick Response Code of bottle stopper bottom Key;(E4) decoded wine product ciphertext is decrypted by private key, obtains wine product information in plain text;(E5) the wine product information is changed In mode field and this batch of red wine washout number, show that this bottle of wine is canceled;(E6) private key encryption wine product information text is used again This, encrypted content encodes to obtain new wine product ciphertext by base64;(E7) by public key pair in new wine product ciphertext update table H1 The wine product ciphertext answered, after in new wine product ciphertext update to table H1, if next someone inquires the information of this bottle, energy again See that it is consumed, it is very convenient.
Preferably, further include after the step E7:(E8) after state is nullified successfully, block chain network gives customer economy Excitation.The economic incentives of block chain network can encourage client actively to change block chain data by private key, and guarantee actually disappears The consistency for taking data on data and block chain, reduces the possibility of forgery.
Preferably, in this implementation, be only illustrated by taking red wine as an example, in fact, the red wine can be changed to white wine, Other needs such as painting and calligraphy, collectibles are discerned the false from the genuine, prove the article of scarcity, it is only necessary to change red wine into corresponding article, together When change wine product information into corresponding Item Information.For example, the signature that red wine can be changed into certain star here shines, certain picture The picture etc. of family, just no longer elaborates one by one here.

Claims (8)

1. a kind of red wine scarcity method of proof based on block chain, it is characterised in that:Include the following steps:
(A) it is that every bottle of red wine prepares different public key and private key, public key can be disclosed and be checked, private key can just be looked into only after corkage It sees;
(B) on block chain minute book batch red wine total bottle number and washout number, and public key this batch of red wine and private key pass through Block chain network is written in encrypted mode;
(C) intelligent contract is disposed on block chain, and inquiring and authenticating and state change function are provided;
It (D) can be according to public key to the wine product information of the block chain query red wine, the total bottle number of this batch of red wine and residue before client's purchase Bottle number;
(E) the red wine state and washout number on block chain can be changed after client's corkage according to private key.
2. the red wine scarcity method of proof based on block chain as described in claim 1, it is characterised in that:The step A Include the following steps:
(A1) every bottle of red wine distributes an ID number, this bottle of red wine of unique mark;
(A2) every bottle of red wine is named as wine product information by one section of its essential information of text entry and state;
(A3) it is that every bottle of red wine generates corresponding public key and private key by RSA Algorithm;
(A4) public key in the form of Quick Response Code is sprayed to body and is constituted public key, private key sprays to bottle stopper bottom in the form of Quick Response Code Portion constitutes private key.
3. the red wine scarcity method of proof based on block chain as claimed in claim 2, it is characterised in that:The step B Include the following steps:
(B1) the wine product information of this bottle of red wine being encrypted by public key, encrypted content is encoded by base64, Content after coding is named as wine product ciphertext;
(B2) it is signed by the wine product ciphertext after private key pair encryption, signature contents are named as wine product signature;
(B3) establish two hash table H1 and H2 in block chain, table H1 with public key is Key, wine product ciphertext is Value, table H2 with Public key is Key, wine product signature is Value;
(B4) the corresponding public key of every bottle of red wine, wine product ciphertext, wine product signature are deposited into table H1 and table H2.
4. the red wine scarcity method of proof based on block chain as claimed in claim 3, it is characterised in that:The step D Include the following steps:
(D1) client obtains the public key of this bottle of wine by the public key Quick Response Code on body;
(D2) the intelligent contract program on public key to block chain network is uploaded;
(D3) intelligent contract inquires the corresponding wine product ciphertext of the public key and wine product signature, if do not had by inquiry table H1 and table H2 It finds, shows that this bottle of wine is not present, if found, into next step;
(D4) the wine product ciphertext and wine product signature are verified by public key, if the verification passes, then show that this bottle of wine exists, Client can obtain the total bottle number of this batch of red wine and current residual bottle number;Otherwise show that this bottle of wine is not present.
5. the red wine scarcity method of proof based on block chain as claimed in claim 4, it is characterised in that:The step E Include the following steps:
(E1) the wine product ciphertext of this bottle of wine is obtained by step D1-D4;
(E2) base64 decodings are carried out to wine product ciphertext;
(E3) client obtains the private key of this bottle of wine by the private key Quick Response Code of bottle stopper bottom;
(E4) decoded wine product ciphertext is decrypted by private key, obtains wine product information in plain text;
(E5) mode field and this batch of red wine washout number in the wine product information are changed, shows that this bottle of wine is canceled;
(E6) private key encryption wine product information text, encrypted content is used to encode to obtain new wine product ciphertext by base64 again;
(E7) by the corresponding wine product ciphertext of public key in new wine product ciphertext update table H1.
6. the red wine scarcity method of proof based on block chain as claimed in claim 5, it is characterised in that:The step E7 After further include:
(E8) after state is nullified successfully, block chain network gives customer economy excitation.
7. such as red wine scarcity method of proof of the claim 2-6 any one of them based on block chain, it is characterised in that:It is described ID number be made of numeral and letter, digit be 64;Wine product information includes ID number, type, batch, state and date of manufacture.
8. the red wine scarcity method of proof as claimed in any one of claims 1 to 6 based on block chain, it is characterised in that:It is described Red wine can be changed to white wine, painting and calligraphy, collectibles.
CN201810492753.7A 2018-05-22 2018-05-22 Red wine scarcity method of proof based on block chain Pending CN108734480A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810492753.7A CN108734480A (en) 2018-05-22 2018-05-22 Red wine scarcity method of proof based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810492753.7A CN108734480A (en) 2018-05-22 2018-05-22 Red wine scarcity method of proof based on block chain

Publications (1)

Publication Number Publication Date
CN108734480A true CN108734480A (en) 2018-11-02

Family

ID=63937888

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810492753.7A Pending CN108734480A (en) 2018-05-22 2018-05-22 Red wine scarcity method of proof based on block chain

Country Status (1)

Country Link
CN (1) CN108734480A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110086633A (en) * 2019-05-13 2019-08-02 广东辰宜信息科技有限公司 Ciphertext tamper resistant method in a kind of block chain technology

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106570710A (en) * 2016-10-27 2017-04-19 纸飞机(北京)科技有限公司 Commodity anti-counterfeiting method and device
CN106709734A (en) * 2016-12-21 2017-05-24 毛巨林 Multiple-two-dimensional code tracing method based on digital identity and system thereof
CN107341676A (en) * 2017-07-17 2017-11-10 深圳天净喔溯源科技有限公司 False proof mark and the method for tracing to the source
CN107666388A (en) * 2016-07-28 2018-02-06 郑珂威 Block chain information encryption method based on complete homomorphic cryptography method
CN107730279A (en) * 2017-10-18 2018-02-23 上海唯链信息科技有限公司 A kind of original factory of vehicle based on block chain technology dispatches from the factory false proof and traceability system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107666388A (en) * 2016-07-28 2018-02-06 郑珂威 Block chain information encryption method based on complete homomorphic cryptography method
CN106570710A (en) * 2016-10-27 2017-04-19 纸飞机(北京)科技有限公司 Commodity anti-counterfeiting method and device
CN106709734A (en) * 2016-12-21 2017-05-24 毛巨林 Multiple-two-dimensional code tracing method based on digital identity and system thereof
CN107341676A (en) * 2017-07-17 2017-11-10 深圳天净喔溯源科技有限公司 False proof mark and the method for tracing to the source
CN107730279A (en) * 2017-10-18 2018-02-23 上海唯链信息科技有限公司 A kind of original factory of vehicle based on block chain technology dispatches from the factory false proof and traceability system

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110086633A (en) * 2019-05-13 2019-08-02 广东辰宜信息科技有限公司 Ciphertext tamper resistant method in a kind of block chain technology

Similar Documents

Publication Publication Date Title
CN107222312B (en) Asset digitalization method based on block chain technology
CN103093365B (en) The method and system of checking authenticity of products
CN102663592B (en) Article identity dicode identification method based on Quick Response Code
CN104915847A (en) Double-code anti-counterfeiting bottle cap and manufacturing method thereof
CN103093361A (en) Commodity double-layer anti-fake method based on technologies of internet of things
CN103077467B (en) A kind of method and system verifying authenticity of products
CN106548353B (en) Commodity anti-counterfeiting code generation and verification method
CN105610578A (en) Block chain information archiving and privacy protection method
CN105930892A (en) Variable logo two-dimensional code anti-counterfeiting method and system
CN113469716A (en) Product tracing method and system based on block chain and identification analysis
CN110941858B (en) Personal network consumption information protection method based on zero-knowledge proof
CN1947113B (en) Pedigree code
EP3099033A1 (en) System architecture and method for ensuring network information security
CN109034832A (en) The information processing method and device of block chain, information processing node and storage medium
CN104239944A (en) Commodity information identification method
CN107154850A (en) A kind of processing method and processing device of block chain data
CN104125239B (en) A kind of method for network authorization transmitted based on data link encryption and system
CN102496113A (en) Method and system for realizing commodity authentication service
CN106059760A (en) Cipher system for calling system private key from user side cipher module
CN204791159U (en) Two yards anti -fake bottle cap
CN108734480A (en) Red wine scarcity method of proof based on block chain
CN102123029A (en) Counterfeiting token and method of dynamic passwords
CN114418570A (en) Block chain-based non-homogeneous evidence-based processing method and device
Prada-Delgado et al. A blockchain-based crypto-anchor platform for interoperable product authentication
CN107563777A (en) The endowed two-dimension code anti-counterfeit system and method for facing to manufacture line high speed

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20181102