A method of verifying and authenticating authenticity of digital assets

A technology of digital assets and authenticity, applied in the direction of digital data authentication, digital data protection, digital transmission system, etc., to achieve the effect of ensuring effective progress

Pending Publication Date: 2021-02-02
AOWEI INFORMATION TECH JIANGSU CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] This application provides a method for verifying the authenticity of certified digital assets to solve the problem of how to ensure the authenticity of digital assets received by buyers

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method of verifying and authenticating authenticity of digital assets
  • A method of verifying and authenticating authenticity of digital assets
  • A method of verifying and authenticating authenticity of digital assets

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0078] see figure 2 , figure 2 It is a flow chart of the first and second embodiments of the method for verifying the authenticity of certified digital assets provided by this application.

[0079] S101: After receiving the authenticated digital asset data whose authenticity has not been verified, the client needs to send the authenticated digital asset data to the digital asset registration platform; wherein, the authenticated digital asset data is the data including the authentication code and the digital asset entity package; in this embodiment, the data package can be in the form of an encrypted ciphertext data package plus a public key. At this time, when the client sends the data package to the digital asset registration platform, it needs to send the public key together to decrypt it through the public key the packet.

[0080] S102: The digital asset registration platform uses a digital signature algorithm to calculate the hash value A of the digital asset entity, a...

Embodiment 2

[0089] The difference between this embodiment and Embodiment 1 is that, in addition to extracting and storing the hash value in the authentication summary through the digital asset registration platform to verify the authenticity of the authenticated digital asset received by the client, the blockchain can also be extracted The hash value in the blockchain digest stored in the network is used to verify the authenticity of the certified digital assets received by the client, see also figure 2 , the digital asset registration platform at this time can be replaced by blockchain public chain nodes or sub-chain nodes. Methods as below:

[0090] S201: The client sends the certified digital asset data to the public chain node or sub-chain node in the blockchain network; wherein, the certified digital asset data is a data packet including the authentication code and the digital asset entity; in this embodiment The form of the data packet is the same as that in the first embodiment, ...

Embodiment 3

[0098] The difference between this embodiment and the first embodiment is that the first embodiment uses the form of sending the authentication code and the data packet of the digital asset entity, and the digital asset registration platform calculates the hash value of the digital asset entity to complete the verification process. In order to avoid problems such as mobile digital asset entities occupying too many transmission resources, increasing computing resource consumption and delaying the verification process, the client can complete the hash value calculation process for digital asset entities, and only the calculated hash value and authentication The code is sent to the digital asset registration platform. At this time, the digital asset registration platform only needs to perform the extraction and verification process. For details, see image 3 , image 3 The flow charts of the third and fourth embodiments of the method for verifying the authenticity of certified di...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method for verifying and authenticating authenticity of digital assets. The method comprises the steps that a client sends authentication digital asset data to a digital assetregistration platform or a block chain network, the digital asset registration platform or the block chain network verifies the authenticity of an entity or an authentication code in the obtained authentication digital asset data, and a verification result is fed back to the client. According to the method provided by the invention, the hash value with authenticity is extracted through the digital asset registration platform or the block chain network to verify the authenticity of the digital asset entity received by the client, so that the client can confirm whether the received digital asset entity is a real entity or not and perform corresponding operation on the real or false entity; and effective operation of digital asset transaction is ensured.

Description

technical field [0001] The embodiment of the present application relates to the technical field of digital assets, in particular to a method for verifying and authenticating digital assets. Background technique [0002] The digital asset certification platform, also known as the right confirmation platform, is mainly aimed at confirming the rights of a large number of intellectual works or achievements that have not been registered for copyright. Its functions are mainly reflected in two aspects: 1. To confirm the rights of tradeable rights of registered copyrights, trademarks or patents that have obtained patent certificates; 2. To confirm the rights of a large number of unregistered intellectual works or achievements. For intellectual works or achievements whose rights have been confirmed by the digital asset certification platform, they need to be managed by the corresponding platform in the form of registration, that is, the digital asset registration platform. The digit...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/64G06Q30/00G06Q50/18
CPCG06F21/64G06Q30/0185G06Q50/184G06F21/44G06Q30/06G06Q2220/18H04L63/126H04L63/123H04L9/3239H04L9/3247H04L9/50
Inventor 白杰李冬云吴先锋
Owner AOWEI INFORMATION TECH JIANGSU CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products