Blockchain based asset verification method, device and system
A verification method and blockchain technology, applied in the field of asset verification methods, devices and systems based on blockchain, can solve problems such as the inability to provide asset verification services stably and effectively, and achieve the effect of effective asset verification services and effective provision.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0047] figure 1 It is a schematic flowchart of a blockchain-based asset verification method provided by Embodiment 1 of the present invention. The method can be applied to asset verification on the blockchain chain, and the method can be executed by an asset verification device based on the blockchain. The device can be composed of hardware and / or software, and can generally be integrated into computers, mobile phones, etc. In a terminal device as a network node. Specifically include the following:
[0048] S110, the node receives the asset identity information of the asset to be verified, and obtains the asset verification information matching the asset identity information from the blockchain; wherein, the asset verification information includes: certification center qualification verification information, service provider qualification verification information and asset verification information.
[0049] Specifically, the qualification verification information of the cer...
Embodiment 2
[0091] figure 2 It is a schematic flow diagram of an authentication center authentication provided by Embodiment 2 of the present invention. This method can be applied to the situation where the certification center is on the chain, and the method can be executed by the certification center certification device, which can be composed of hardware and / or software, and can generally be integrated in the certification center equipment with certification functions such as the server of the certification authority middle. Specifically include the following:
[0092] S210. The certification center periodically sends certification application information to each node included in the network, wherein the nodes include representative nodes and miner nodes.
[0093] Exemplarily, whenever the certification center is successfully authenticated on the chain, it will update its own security certificate. In order to ensure the security and reliability of the certification center, it is nec...
Embodiment 3
[0117] image 3It is a schematic flowchart of a service provider authentication provided by Embodiment 3 of the present invention. This method is applicable to the situation where the service provider is on the chain, and the method can be executed by the service provider authentication device, which can be composed of hardware and / or software, and generally can be integrated in the service provider's server and other service provider equipment with authentication functions middle. Specifically include the following:
[0118] S310. The service provider provides a service provider qualification certificate to the certification center. After receiving the service provider qualification certificate, the certification center assigns a service provider identifier to the service provider if it is determined that the service provider has passed the qualification review according to the service provider qualification certificate.
[0119] Exemplarily, after the certification center ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


