A method for generating commodity digital identity based on block chain

A digital identity and blockchain technology, applied in business, data processing applications, instruments, etc., can solve problems such as poor confidentiality, unfavorable index, easy to be cracked, etc., to reduce the possibility of adding effective digital identities, reduce The effect of repeating digital identities and facilitating digital management

Active Publication Date: 2019-01-11
合肥高科创新科技有限公司
View PDF7 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The second type of method for randomly generating digital identities has the following disadvantages: (1) Ensure that digital identities have no collisions based on probability. When the namespace is small and the number of products is large, the possibility of digital identity conflicts will increase; As the primary key of the database, it is not good for the index; (3) too random, if it is applied to the management of similar products of different companies, it will require additional overhead to maintain which coded product belongs to which company
However, the method of adopting naming conventio

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method for generating commodity digital identity based on block chain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0023] like figure 1 As shown, a method for generating a digital identity of a commodity based on a blockchain is suitable for a commodity anti-counterfeiting verification system based on a blockchain; the method for generating a digital identity for a commodity specifically includes the following steps:

[0024] Step S1, commodity code generating step: receive externally input commodity information; encode according to the preset coding rules according to the content of the commodity information, and generate a fixed-length character string code as the commodity code C.

[0025] In the commodity code generation step, the process of coding according to the preset coding rules according to the content of the commodity information specifically includes:

[0026] Obtain the content of the product information, including: product category, manufacturer name, category information, production time, and its own serial number;

[0027] Generate a fixed-length character string code, th...

specific example

[0029] Assuming that the product A to be coded is a wine product, its product information includes the type of product A, winery name, category information, production time, and its own serial number. For example, suppose the product information of product A is liquor, Anhui Bozhou Gujing tribute Liquor Co., Ltd., Gujing Niannian Puree 8 years, March 5, 2018 at 8:35, 43086983216.

[0030] The number corresponding to the category information of the commodity A is used as the initial character of the code C of the commodity A. The category information is divided into three types: white wine, red wine, and other wines; respectively corresponding to the numbers S, W, and O. At this time, the commodity A corresponds to code C as "S".

[0031] Completely describe the winery name of the product A in Chinese, and connect the obtained character string after the code C in the previous step. At this time, the code C is "S Anhui Bozhou Gujing Distillery Co., Ltd.".

[0032] Completely de...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method for generating commodity digital identity based on a block chain. The method can shield the differences of the coding mode, coding length, manufacturer name length, commodity category information, etc. of different manufacturers, and finally obtain a fixed-length digital identity, which is convenient for the digital management of the products of the manufacturers, and also conducive to the comprehensive management of the products, without the need of distinguishing the different details of each manufacturer. Two different hashing algorithms are adopted, which toa certain extent reduces the possibility of duplicate digital identities in the same system using the method, and reduces the possibility of digital identity collision. The ECDSA algorithm of asymmetric cryptosystem is adopted, which is called the elliptic curve digital signature algorithm. If the key is not disclosed, other people cannot generate the same digital identity according to the same commodity information; generated digital identities do not collide, that is, do not duplicate; the identity can only be generated by a vendor that owns a private key and cannot be forged.

Description

technical field [0001] The invention belongs to the technical field of commodity anti-counterfeiting verification, and in particular relates to a block chain-based digital identity generation method. Background technique [0002] At present, there are mainly three types of digital identity generation methods. One is artificial generation. In the same namespace, subsequent uniqueness verification is required to ensure uniqueness; namespace is the space composed of possible combinations of digital identities; the second is random generation by computer. , in a low-concurrency scenario, it is suitable to be generated centrally through a service and ensure the high availability of this service; the third is generated by the computer according to the naming convention, in a high-concurrency scenario, it is suitable to use a naming convention that guarantees the independence of the namespace , generated by multiple services in parallel. [0003] The first type of artificial gener...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06Q30/00G06Q40/04
CPCG06Q30/0185G06Q40/04
Inventor 赵亮邹菁琳贾娟商飞古春生古继宝
Owner 合肥高科创新科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products