CN111324611A - Asset type evidence retrieval method and device - Google Patents

Asset type evidence retrieval method and device Download PDF

Info

Publication number
CN111324611A
CN111324611A CN202010130812.3A CN202010130812A CN111324611A CN 111324611 A CN111324611 A CN 111324611A CN 202010130812 A CN202010130812 A CN 202010130812A CN 111324611 A CN111324611 A CN 111324611A
Authority
CN
China
Prior art keywords
certificate
verified
information
index
index information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010130812.3A
Other languages
Chinese (zh)
Other versions
CN111324611B (en
Inventor
张�诚
张勇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Rui Zhuo Xi Tou Technology Development Co ltd
Original Assignee
Beijing Rui Zhuo Xi Tou Technology Development Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Rui Zhuo Xi Tou Technology Development Co ltd filed Critical Beijing Rui Zhuo Xi Tou Technology Development Co ltd
Priority to CN202010130812.3A priority Critical patent/CN111324611B/en
Publication of CN111324611A publication Critical patent/CN111324611A/en
Application granted granted Critical
Publication of CN111324611B publication Critical patent/CN111324611B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/22Indexing; Data structures therefor; Storage structures
    • G06F16/2228Indexing structures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/245Query processing
    • G06F16/2453Query optimisation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3821Electronic credentials
    • G06Q20/38215Use of certificates or encrypted proofs of transaction rights
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Accounting & Taxation (AREA)
  • General Engineering & Computer Science (AREA)
  • Finance (AREA)
  • Data Mining & Analysis (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Computational Linguistics (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • Software Systems (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Technology Law (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The application discloses a method and a device for retrieving a certificate of asset type evidence, wherein the method comprises the following steps: after the asset type evidence is written into a block chain main chain, establishing index information for the asset type evidence, wherein the index information comprises: the keyword and the network address where the certificate is located; writing the index information into a block chain; receiving query information from a user; extracting keywords to be verified from the query information; determining whether the key words of the index information are matched with the key words to be verified; and when the keyword of the index information is determined to be matched with the keyword to be verified, acquiring a corresponding certificate according to the index information, and returning the certificate to the user. The technical scheme provided by the application can help the user to quickly and safely find the corresponding certificate, so that the certificate inquiry efficiency is improved.

Description

Asset type evidence retrieval method and device
Technical Field
The application relates to the technical field of block chains, and discloses a voucher retrieval method and device for asset class evidence.
Background
Various forms of digital certificates (tokens), referred to simply as tokens, have been generated based on blockchain technology, and these tokens can be circulated as virtual currency to purchase specific items. With the increasing development of blockchain technology, more and more asset class security certificates are beginning to be used gradually. In the process of asset type evidence-passing transaction, each node authenticates evidence-passing according to the asset type evidence-passing certificate and stores the evidence corresponding to the asset type evidence-passing certificate in a block chain.
At present, a user generally queries the asset certification of the certification in a block chain by traversing the blocks, so as to query the asset certification.
However, the number of the assets is huge, the number of the corresponding certificates is huge, the certificates not only relate to the basic assets, but also relate to the transaction contracts, the transaction certificates and the like, and the project is complicated. Therefore, the certificate corresponding to the asset type certificate is inquired in a traversing block mode, and the inquiry efficiency is low.
Disclosure of Invention
The application provides a method and a device for retrieving asset type evidence, which can improve the query efficiency.
In a first aspect, an embodiment of the present application provides a credential retrieval method for asset class pass-certificate, including:
after the asset type evidence is written into a block chain main chain, establishing index information for the asset type evidence, wherein the index information comprises: the keyword and the network address where the certificate is located;
writing the index information into a block chain;
receiving query information from a user;
extracting keywords to be verified from the query information;
determining whether the key words of the index information are matched with the key words to be verified;
and when the keyword of the index information is determined to be matched with the keyword to be verified, acquiring a corresponding certificate according to the network address, and returning the certificate to the user.
In one example, a block in which the asset class pass is located is determined;
identifying a certificate and transaction information corresponding to the asset type evidence from the block according to the preset type of the asset type evidence and obtaining a network address of the block where the certificate is stored;
distributing index identification according to the voucher and the transaction information;
and generating index information by using the index identification and the network address.
In one example, keywords are extracted from the credentials and the transaction information, the keywords comprising: one or more of user identity information, transaction type, transaction time, and credential type;
and carrying out encryption operation on the key words by using a preset encryption algorithm, and taking an operation result as the index identification.
In one example, the key is encrypted using a hash function.
In one example, the encryption algorithm is used for carrying out encryption operation on the extracted key words to be verified to obtain ciphertexts to be verified;
determining index information to be verified according to the key words to be verified;
judging whether the index identification in the index information to be verified is matched with the ciphertext to be verified;
and if the index identification in the index information to be verified is matched with the ciphertext to be verified, acquiring the certificate according to the network address corresponding to the index identification and returning the certificate.
In one example, the credentials are speech recognized and semantically recognized, the credentials being speech-like credentials;
in one example, the voucher is subjected to image recognition, and the voucher is an image voucher;
in one example, the credentials are text recognized, the credentials being text-like credentials.
In a second aspect, an embodiment of the present application provides a credential retrieval device for asset class pass certificate, including: the device comprises a creating module, a recording module, a receiving module and a data processing module;
the creating module is used for creating index information for the asset class evidence after the asset class evidence is written into the main chain of the block chain, wherein the index information comprises: the keyword and the network address where the certificate is located;
the recording module is used for writing the index information into a block chain;
the receiving module is used for receiving query information from a user;
the data processing module is used for extracting keywords to be verified from the query information; determining whether the key words of the index information are matched with the key words to be verified; and when the keyword of the index information is determined to be matched with the keyword to be verified, acquiring a corresponding certificate according to the network address, and returning the certificate to the user.
In one example, the creation module is configured to determine a block in which the asset class pass is located; identifying a certificate and transaction information corresponding to the asset type evidence obtaining according to the preset type of the asset type evidence obtaining, and acquiring a network address certificate of a block where the certificate is stored; distributing index identification according to the voucher and the transaction information voucher; and generating index information by using the index identification and the network address.
In one example, the creation module is to extract keywords from the credentials and the transaction information, the keywords comprising: one or more of user identity information, transaction type, transaction time, and credential type; and carrying out encryption operation on the key words by using a preset encryption algorithm, and taking an operation result as the index identification.
In one example, the data processing module is further configured to perform an encryption operation on each extracted keyword to be verified by using the encryption algorithm to obtain a ciphertext to be verified; determining index information to be verified according to the key words to be verified; judging whether the index identification in the index information to be verified is matched with the ciphertext to be verified; and if the index identification in the index information to be verified is matched with the ciphertext to be verified, acquiring the certificate according to the network address corresponding to the index identification and returning the certificate.
In one example, the data processing module is configured to perform voice recognition and semantic recognition on the credential, where the credential is a voice-type credential;
in one example, the data processing module is configured to perform image recognition on the credential, where the credential is an image-class credential;
in one example, the data processing module is configured to perform text recognition on the credential, where the credential is a text credential.
The embodiment of the application provides an asset type evidence obtaining method and device, and the method and device are convenient for a user to inquire corresponding evidence according to the requirement of the user by presetting evidence obtaining types and respectively configuring respective index identifications for various types of evidence obtaining. Index information is generated by the index identification and the address of the stored certificate, so that a user can inquire the corresponding certificate only through the index information without traversing each block in the block chain. Storing the index information in the block can prevent the index information from being tampered. The ciphertext is used for verifying the query information, so that the information security can be improved, and the information in the certificate is prevented from being leaked. Therefore, the technical scheme provided by the embodiment of the application can help the user to quickly and safely find the corresponding certificate, so that the certificate query efficiency is improved.
Drawings
Fig. 1 is a flowchart of a credential retrieval method for asset class pass-certificate according to an embodiment of the present application;
fig. 2 is a schematic structural diagram of a credential retrieval device for asset class certification according to an embodiment of the present application.
Detailed description of the preferred embodiments
In order to better understand the technical solution, the technical solution will be described in detail with reference to the drawings and the specific embodiments.
The embodiment of the application provides a voucher retrieval method for asset class evidence, as shown in fig. 1, comprising the following steps:
step 101, after the asset type certificate is written into the main chain of the block chain, determining the block where the asset type certificate is located.
In the embodiment of the application, the general certificate mainly refers to a security type general certificate, and the general certificate has the characteristics of low cost, strong liquidity, high transparency and wide financing range. It should be noted that, in the blockchain technique, only the information on the main chain is considered to be correct, so the asset certificate written in the main chain necessarily corresponds to a valid transaction, and the corresponding certificate is necessarily true. Only if the certificate is guaranteed to be authentic, the index information of the certificate can be inquired by people. Therefore, the certificate is true and reliable, and is a precondition for implementing the embodiment of the application.
And 102, identifying a certificate corresponding to the asset class permit from the block according to the preset type of the asset class permit, and acquiring the network address of the block for storing the certificate.
In the embodiment of the application, the asset class voucher is used for proving the validity of the asset class voucher, namely the asset class voucher.
The property type general evidence can be divided into different types according to different transaction types, such as house property type general evidence transaction and vehicle type general evidence transaction. Different types of corresponding certificates are different, for example, for house property type certificates, the certificates may include house property certificates, etc.; for vehicle general certificate, the certificate can include license plate, driving license and other certificates. It follows that the credentials for different types of asset class passes are different. Therefore, in the embodiment of the application, according to the type of the asset class voucher, the corresponding voucher can be identified.
In the embodiment of the application, after the corresponding certificate and the transaction information are identified from the block according to the type of the asset type certificate, the network address certificate of the block where the certificate is located can be acquired, and the index information is generated according to the certificate and the network address. Voucher(s)
And 103, distributing index identification according to the certificate and the transaction information.
In the embodiment of the application, keywords are extracted from the voucher and the transaction information, and the keywords are encrypted to obtain the index identifier. Wherein, the keywords may include: one or more of user identity information, transaction time, and credential type. The voucher type includes one or more of images, text and speech, e.g. face images, handwritten signatures and recordings of responsibility commitments, etc. Based on this, the embodiment of the application needs to perform one or more of voice recognition, image recognition, character recognition and semantic recognition on the certificate to obtain the keyword. Therefore, the technical scheme provided by the application can establish index information for various certificates so as to meet the requirements of users.
And 104, generating index information by using the index identification and the network address.
And 105, writing the index information into the block chain.
In the embodiment of the application, in order to prevent someone from tampering the index information, the index information is written into the block, and the network address of the block is recorded at the same time, so that the index information can be quickly searched according to the network address of the block when a user inquires the index information.
Step 106, receiving the query information from the user.
Step 107, extracting the key words to be verified from the query information.
Step 108, determining whether the index information is matched with the keyword to be verified.
And step 109, when the index information is determined to be matched with the key words to be verified, acquiring corresponding certificates according to the index information, and returning the certificates to the user.
The evidence of the general evidence is very important, and once the evidence is known by others, the user suffers from huge loss. In order to identify whether the inquirer is one party in the transaction, in the embodiment of the application, the key word is encrypted by using a hash function, and a hash value obtained by the operation is used as the index identifier.
After the index information is established, the user can retrieve the evidence of the asset type general evidence by using the index information, and the method is simple, quick and high in efficiency.
In the inquiry process, when only one keyword to be verified exists in inquiry information input by a user, directly comparing whether the two hash values are the same, if the two hash values are the same, indicating that the user is closely related to the certificate and not performing malicious inquiry, acquiring the information of the certificate and returning the information of the certificate according to the network address corresponding to the index identifier. If a plurality of keywords to be verified exist in the query information, a hash function is respectively utilized to obtain a hash value of each keyword to be verified, whether the hash values are all the same as the hash value of the identifier and whether the hash values are simultaneously present in the same index information are detected, if all the conditions are met, the target index identifier is matched with the ciphertext to be verified, the user is also proved to have close relation with the certificate and not to be subjected to malicious query, and at the moment, the information of the certificate is obtained and the information of the certificate is returned according to the network address corresponding to the index identifier.
Therefore, the user identity information, the certificate identification, the transaction time and the certificate type included in the keyword are uniquely determined, and the hash value is also unique, so that the uniqueness of the index identification is ensured. This means that the inquirer can only inquire the information of the certificate through the inquiry information containing the keyword, and if the inquirer does not know the user identity information, the certificate identification, the transaction time and the certificate type related to the transaction, the inquirer cannot necessarily obtain the corresponding hash value according to the keyword input by the inquirer, and thus cannot obtain the information of the corresponding certificate. For example, if a user finishes a transaction a with a user b on a blockchain and wants to query the personal identification information of the user b, the user is prompted to input the transaction type and the transaction time. And then, encrypting the transaction type and the transaction time input by the first user respectively to obtain two hash values. And respectively verifying whether the two hash values are the same as the hash value of the index identifier and whether the two hash values simultaneously exist in the index information corresponding to the transaction A, wherein if the two hash values meet the two conditions, the transaction A is shown to participate in the transaction A, so that the user has the right to inquire the personal identity information of the transaction B. And finally, acquiring the personal identity information of the second party according to the network address in the index information and returning the personal identity information of the second party to the first party.
As shown in fig. 2, an embodiment of the present application provides a credential retrieval device for asset class certification, including: a creation module 201, a recording module 202, a receiving module 203 and a data processing module 204;
after the asset class voucher is written into the main chain of the block chain, the creating module 201 creates index information for the asset class voucher in the block, where the index information includes: the keyword and the network address where the certificate is located;
the recording module 202 is configured to write the index information into the block chain;
the receiving module 203 is used for receiving query information from a user;
the data processing module 204 is configured to extract a keyword to be verified from the query information; determining whether the key words of the index information are matched with the key words to be verified; and when the keyword of the index information is determined to be matched with the keyword to be verified, acquiring a corresponding certificate according to the network address, and returning the certificate to the user.
In this embodiment of the present application, the creating module 201 is configured to determine a block where the asset class pass is located; identifying a certificate and transaction information corresponding to the asset type evidence obtaining according to the preset type of the asset type evidence obtaining, and acquiring a network address certificate of a block where the certificate is stored; distributing index identification according to the voucher and the transaction information voucher; and generating index information by using the index identification and the network address.
In an embodiment of the present application, the creating module 201 is configured to extract keywords from the credentials and the transaction information, where the keywords include: one or more of user identity information, transaction type, transaction time, and credential type; and carrying out encryption operation on the key words by using a preset encryption algorithm, and taking an operation result as an index identifier.
In this embodiment of the application, the data processing module 204 is further configured to perform an encryption operation on each extracted keyword to be verified by using the encryption algorithm to obtain a ciphertext to be verified; determining index information to be verified according to the key words to be verified; judging whether the index identification in the index information to be verified is matched with the ciphertext to be verified; and if the index identification in the index information to be verified is matched with the ciphertext to be verified, acquiring the certificate according to the network address corresponding to the index identification and returning the certificate.
In the embodiment of the present application, the data processing module 204 is configured to perform voice recognition and semantic recognition on a credential, where the credential is a voice-type credential;
in the embodiment of the application, the data processing module 204 is configured to perform image recognition on a credential, where the credential is an image-type credential;
in the embodiment of the present application, the data processing module 204 is configured to perform text recognition on a credential, where the credential is a text credential.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
While the preferred embodiments of the present application have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including preferred embodiments and all alterations and modifications as fall within the scope of the application. It will be apparent to those skilled in the art that various changes and modifications may be made in the present application without departing from the spirit and scope of the application. Thus, if such modifications and variations of the present application fall within the scope of the claims of the present application and their equivalents, the present application is intended to include such modifications and variations as well.

Claims (10)

1. A voucher retrieval method of asset class evidence collection is characterized by comprising the following steps:
after the asset type evidence is written into a block chain main chain, establishing index information for the asset type evidence, wherein the index information comprises: the keyword and the network address where the certificate is located;
writing the index information into a block chain;
receiving query information from a user;
extracting keywords to be verified from the query information;
determining whether the key words of the index information are matched with the key words to be verified;
and when the keyword of the index information is determined to be matched with the keyword to be verified, acquiring a corresponding certificate according to the network address, and returning the certificate to the user.
2. The method of claim 1, wherein the establishing index information for the asset class certification voucher after the asset class certification is written into a block chain main chain comprises:
determining a block where the asset type pass certificate is located;
identifying a certificate and transaction information corresponding to the asset type evidence obtaining according to the preset type of the asset type evidence obtaining, and acquiring a network address certificate of a block where the certificate is stored;
distributing index identification according to the voucher and the transaction information voucher;
and generating index information by using the index identification and the network address.
3. The method of claim 2, wherein said assigning an index identification credential based on said credential and said transaction information comprises:
extracting the keywords from the credentials and the transaction information, the keywords comprising: one or more of user identity information, transaction type, transaction time, and credential type;
and carrying out encryption operation on the key words by using a preset encryption algorithm, and taking an operation result as the index identification.
4. The method of claim 3, wherein the encrypting the key word using a predetermined encryption algorithm comprises:
and carrying out encryption operation on the key words by utilizing a hash function.
5. The method of claim 3, wherein the determining whether the key of the index information matches the key to be verified comprises:
carrying out encryption operation on the extracted key words to be verified by using the encryption algorithm to obtain ciphertext to be verified;
determining index information to be verified according to the key words to be verified;
judging whether the index identification in the index information to be verified is matched with the ciphertext to be verified;
and if the index identification in the index information to be verified is matched with the ciphertext to be verified, acquiring the certificate according to the network address corresponding to the index identification and returning the certificate.
6. The method of claim 2, wherein said extracting keywords from said credentials comprises:
performing voice recognition and semantic recognition on the certificate, wherein the certificate is a voice certificate;
or
Carrying out image identification on the certificate, wherein the certificate is an image certificate;
or
And performing character recognition on the certificate, wherein the certificate is a character certificate.
A credential.
7. An apparatus for retrieving a certificate of an asset type certificate, comprising: the device comprises a creating module, a recording module, a receiving module and a data processing module;
the creating module is used for creating index information for the asset class evidence after the asset class evidence is written into the main chain of the block chain, wherein the index information comprises: the keyword and the network address where the certificate is located;
the recording module is used for writing the index information into a block chain;
the receiving module is used for receiving query information from a user;
the data processing module is used for extracting keywords to be verified from the query information; determining whether the key words of the index information are matched with the key words to be verified; and when the keyword of the index information is determined to be matched with the keyword to be verified, acquiring a corresponding certificate according to the network address, and returning the certificate to the user.
8. The apparatus of claim 7,
the creating module is used for determining the block where the asset type permit is located; identifying a certificate and transaction information corresponding to the asset type evidence obtaining according to the preset type of the asset type evidence obtaining, and acquiring a network address certificate of a block where the certificate is stored; distributing index identification according to the voucher and the transaction information voucher; and generating index information by using the index identification and the network address.
9. The apparatus of claim 8,
the creation module is configured to extract keywords from the credentials and the transaction information, the keywords including: one or more of user identity information, transaction type, transaction time, and credential type; and carrying out encryption operation on the key words by using a preset encryption algorithm, and taking an operation result as the index identification.
10. The apparatus of claim 9,
the data processing module is further used for carrying out encryption operation on each extracted keyword to be verified by using the encryption algorithm to obtain a ciphertext to be verified; determining index information to be verified according to the key words to be verified; judging whether the index identification in the index information to be verified is matched with the ciphertext to be verified; and if the index identification in the index information to be verified is matched with the ciphertext to be verified, acquiring the certificate according to the network address corresponding to the index identification and returning the certificate.
CN202010130812.3A 2020-02-28 2020-02-28 Certificate retrieval method and device for asset type certificate Active CN111324611B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010130812.3A CN111324611B (en) 2020-02-28 2020-02-28 Certificate retrieval method and device for asset type certificate

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010130812.3A CN111324611B (en) 2020-02-28 2020-02-28 Certificate retrieval method and device for asset type certificate

Publications (2)

Publication Number Publication Date
CN111324611A true CN111324611A (en) 2020-06-23
CN111324611B CN111324611B (en) 2023-12-29

Family

ID=71171273

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010130812.3A Active CN111324611B (en) 2020-02-28 2020-02-28 Certificate retrieval method and device for asset type certificate

Country Status (1)

Country Link
CN (1) CN111324611B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113064902A (en) * 2021-04-06 2021-07-02 北京瑞卓喜投科技发展有限公司 Method and device for retrieving transaction data on chain and electronic equipment
CN113628052A (en) * 2021-08-18 2021-11-09 杭州云象网络技术有限公司 Block chain asset and contract processing method, system and device based on prediction machine
CN115860932A (en) * 2022-11-14 2023-03-28 临沂大学 Cross-fragment transaction method, device and medium

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2000003526A1 (en) * 1998-07-08 2000-01-20 Overx, Inc. System and method for establishing and retrieving data based on global indices
US20090019019A1 (en) * 2005-07-12 2009-01-15 The Diallog Works Ltd. Method and system for obtaining information
WO2016172906A1 (en) * 2015-04-30 2016-11-03 深圳市星电商科技有限公司 Method for searching for electronic transaction certificate, and electronic transaction terminal
WO2016172905A1 (en) * 2015-04-30 2016-11-03 深圳市星电商科技有限公司 Method and device for searching for electronic transaction certificate, and network search engine
CN107273556A (en) * 2017-08-23 2017-10-20 上海点融信息科技有限责任公司 Block chain data index method and equipment
WO2018194379A1 (en) * 2017-04-18 2018-10-25 주식회사 코인플러그 Method for approving use of card by using token id on basis of blockchain and merkle tree structure associated therewith, and server using same
CN109766707A (en) * 2019-01-17 2019-05-17 南方科技大学 Data processing method, device, equipment and medium based on block chain
CN110022298A (en) * 2019-03-04 2019-07-16 阿里巴巴集团控股有限公司 The method, apparatus of proof validation based on block chain, electronic equipment
CN110032891A (en) * 2019-04-16 2019-07-19 中国电力科学研究院有限公司 A kind of smart grid distributed cryptograph search method and system model based on alliance's block chain
CN110602050A (en) * 2018-04-28 2019-12-20 腾讯科技(深圳)有限公司 Authentication method and device for block chain access, storage medium and electronic device

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2000003526A1 (en) * 1998-07-08 2000-01-20 Overx, Inc. System and method for establishing and retrieving data based on global indices
US20090019019A1 (en) * 2005-07-12 2009-01-15 The Diallog Works Ltd. Method and system for obtaining information
WO2016172906A1 (en) * 2015-04-30 2016-11-03 深圳市星电商科技有限公司 Method for searching for electronic transaction certificate, and electronic transaction terminal
WO2016172905A1 (en) * 2015-04-30 2016-11-03 深圳市星电商科技有限公司 Method and device for searching for electronic transaction certificate, and network search engine
WO2018194379A1 (en) * 2017-04-18 2018-10-25 주식회사 코인플러그 Method for approving use of card by using token id on basis of blockchain and merkle tree structure associated therewith, and server using same
CN107273556A (en) * 2017-08-23 2017-10-20 上海点融信息科技有限责任公司 Block chain data index method and equipment
CN110602050A (en) * 2018-04-28 2019-12-20 腾讯科技(深圳)有限公司 Authentication method and device for block chain access, storage medium and electronic device
CN109766707A (en) * 2019-01-17 2019-05-17 南方科技大学 Data processing method, device, equipment and medium based on block chain
CN110022298A (en) * 2019-03-04 2019-07-16 阿里巴巴集团控股有限公司 The method, apparatus of proof validation based on block chain, electronic equipment
CN110032891A (en) * 2019-04-16 2019-07-19 中国电力科学研究院有限公司 A kind of smart grid distributed cryptograph search method and system model based on alliance's block chain

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113064902A (en) * 2021-04-06 2021-07-02 北京瑞卓喜投科技发展有限公司 Method and device for retrieving transaction data on chain and electronic equipment
CN113628052A (en) * 2021-08-18 2021-11-09 杭州云象网络技术有限公司 Block chain asset and contract processing method, system and device based on prediction machine
CN115860932A (en) * 2022-11-14 2023-03-28 临沂大学 Cross-fragment transaction method, device and medium

Also Published As

Publication number Publication date
CN111324611B (en) 2023-12-29

Similar Documents

Publication Publication Date Title
US11190355B2 (en) Secure biometric authentication using electronic identity
US8788830B2 (en) Method and apparatus for logging based identification
US11646891B2 (en) Compact recordation protocol
CN111324611B (en) Certificate retrieval method and device for asset type certificate
JP2020511059A (en) Information authentication method and system
EP1793527A2 (en) Apparatus and method for managing electronic original data
US11621851B2 (en) Block chain proof for identification
CN101118585A (en) Method and apparatus for authenticating a user
US7519822B2 (en) Method and apparatus for processing descriptive statements
Hakak et al. A framework for authentication of digital Quran
CN103310141A (en) Method and system for monitoring of certificate information security
KR102319006B1 (en) First copyright holder authentication system using blockchain and its method
US6993521B2 (en) System and method for arranging digital certificates on a hardware token
CN109918451A (en) Data base management method and system based on block chain
Hadler et al. An improved version of a tool mark comparison algorithm
CN111461191B (en) Method and device for determining image sample set for model training and electronic equipment
US11316686B2 (en) Protections for unauthorized copying (anti-cloning) method and system
CN112434506A (en) Electronic protocol signing processing method, device, computer equipment and medium
CN110097258B (en) User relationship network establishment method, device and computer readable storage medium
WO2023172190A1 (en) Method and apparatus for accessing data in a plurality of machine readable medium
CN112560055B (en) Credible electronic license system based on PKI technology and working method
CN113240556B (en) Infringement processing method, device, equipment and medium based on intelligent decision
CN118246889A (en) Full-flow configuration method and system for government service matters
Gao et al. Similarity-based Secure Deduplication for IIoT Cloud Management System
KR20230057791A (en) Method and system for managing literary work by using blockchain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant