CN106570710A - Commodity anti-counterfeiting method and device - Google Patents
Commodity anti-counterfeiting method and device Download PDFInfo
- Publication number
- CN106570710A CN106570710A CN201610970477.1A CN201610970477A CN106570710A CN 106570710 A CN106570710 A CN 106570710A CN 201610970477 A CN201610970477 A CN 201610970477A CN 106570710 A CN106570710 A CN 106570710A
- Authority
- CN
- China
- Prior art keywords
- commodity
- public key
- key
- public
- private key
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 66
- 238000012795 verification Methods 0.000 claims abstract description 17
- 238000004519 manufacturing process Methods 0.000 claims description 59
- 230000004044 response Effects 0.000 claims description 48
- 238000003860 storage Methods 0.000 claims description 12
- 239000011248 coating agent Substances 0.000 claims description 10
- 238000000576 coating method Methods 0.000 claims description 10
- 230000027455 binding Effects 0.000 abstract description 10
- 238000009739 binding Methods 0.000 abstract description 10
- 238000005516 engineering process Methods 0.000 description 41
- 238000007726 management method Methods 0.000 description 22
- 230000008569 process Effects 0.000 description 15
- 238000012856 packing Methods 0.000 description 14
- 239000002994 raw material Substances 0.000 description 14
- 238000013022 venting Methods 0.000 description 14
- 230000006378 damage Effects 0.000 description 8
- 230000006870 function Effects 0.000 description 8
- 230000002265 prevention Effects 0.000 description 8
- 238000010586 diagram Methods 0.000 description 6
- 238000010200 validation analysis Methods 0.000 description 6
- 238000005336 cracking Methods 0.000 description 5
- 238000012423 maintenance Methods 0.000 description 5
- 239000000463 material Substances 0.000 description 5
- 230000001360 synchronised effect Effects 0.000 description 5
- 230000006399 behavior Effects 0.000 description 4
- 230000009286 beneficial effect Effects 0.000 description 4
- 238000013500 data storage Methods 0.000 description 4
- 230000000694 effects Effects 0.000 description 4
- 238000009434 installation Methods 0.000 description 4
- 239000000203 mixture Substances 0.000 description 4
- 238000012546 transfer Methods 0.000 description 4
- 230000008859 change Effects 0.000 description 3
- OWZREIFADZCYQD-NSHGMRRFSA-N deltamethrin Chemical compound CC1(C)[C@@H](C=C(Br)Br)[C@H]1C(=O)O[C@H](C#N)C1=CC=CC(OC=2C=CC=CC=2)=C1 OWZREIFADZCYQD-NSHGMRRFSA-N 0.000 description 3
- 238000007689 inspection Methods 0.000 description 3
- 238000004806 packaging method and process Methods 0.000 description 3
- 238000007639 printing Methods 0.000 description 3
- 238000012545 processing Methods 0.000 description 3
- 230000008901 benefit Effects 0.000 description 2
- 239000002131 composite material Substances 0.000 description 2
- 238000013524 data verification Methods 0.000 description 2
- 230000001419 dependent effect Effects 0.000 description 2
- 230000001066 destructive effect Effects 0.000 description 2
- 210000004247 hand Anatomy 0.000 description 2
- 230000007246 mechanism Effects 0.000 description 2
- 230000008439 repair process Effects 0.000 description 2
- 238000012552 review Methods 0.000 description 2
- 230000002123 temporal effect Effects 0.000 description 2
- PEDCQBHIVMGVHV-UHFFFAOYSA-N Glycerine Chemical compound OCC(O)CO PEDCQBHIVMGVHV-UHFFFAOYSA-N 0.000 description 1
- 206010068052 Mosaicism Diseases 0.000 description 1
- 230000005856 abnormality Effects 0.000 description 1
- 230000004913 activation Effects 0.000 description 1
- 230000003044 adaptive effect Effects 0.000 description 1
- 238000004458 analytical method Methods 0.000 description 1
- 230000008485 antagonism Effects 0.000 description 1
- 238000013475 authorization Methods 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 238000012790 confirmation Methods 0.000 description 1
- 239000012792 core layer Substances 0.000 description 1
- 238000010219 correlation analysis Methods 0.000 description 1
- 238000013499 data model Methods 0.000 description 1
- 230000007812 deficiency Effects 0.000 description 1
- 238000009826 distribution Methods 0.000 description 1
- 235000013399 edible fruits Nutrition 0.000 description 1
- 239000004744 fabric Substances 0.000 description 1
- 239000003550 marker Substances 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 230000008450 motivation Effects 0.000 description 1
- 238000012946 outsourcing Methods 0.000 description 1
- 238000004321 preservation Methods 0.000 description 1
- 238000003672 processing method Methods 0.000 description 1
- 238000007789 sealing Methods 0.000 description 1
- 230000011218 segmentation Effects 0.000 description 1
- 210000003765 sex chromosome Anatomy 0.000 description 1
- 229910052709 silver Inorganic materials 0.000 description 1
- 239000004332 silver Substances 0.000 description 1
- 239000000126 substance Substances 0.000 description 1
- 230000009897 systematic effect Effects 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/018—Certifying business or products
- G06Q30/0185—Product, service or business identity fraud
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/06009—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
- G06K19/06037—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking multi-dimensional coding
Landscapes
- Business, Economics & Management (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Accounting & Taxation (AREA)
- Entrepreneurship & Innovation (AREA)
- Development Economics (AREA)
- Economics (AREA)
- Finance (AREA)
- Marketing (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The embodiment of the invention discloses a commodity anti-counterfeiting method and a device. The method comprises the following steps of generating the public key and the private key of a commodity; storing the hash values of the serial number, the public key and the private key of the commodity and the circulation data of the commodity in a common database by using a block chain; upon receiving the verification information of the public key of the commodity and determining the stored state of the public key in the common database, determining the first legal sales state of the commodity according to the serial number and the circulation data of the commodity, and marking the state of the commodity to be sold out; upon receiving the verification information of the secret key of the commodity and determining the stored state of the public key corresponding to the secret key in the common database, determining the first legal verification state of the commodity according to the serial number and the circulation data of the commodity, and marking the state of the commodity to be verified. Through preparing the public key and the private key of the commodity into special two-dimension codes and pasting the special two-dimension codes onto the outer package and the surface of the commodity, the readability, the verifiability and the binding performance of anti-counterfeiting marks are ensured. Meanwhile, by means of the block chain, the commodity circulation traceability and the commodity source uniqueness are ensured. At the same time, the cost is reduced.
Description
Technical field
The present embodiments relate to field of computer technology, and in particular to a kind of antiforge method for commodities and device.
Background technology
General anti-counterfeiting technology has false proof antiforge, chemical material, physical security, digital technology and information anti-both at home and abroad
Pseudo-, packaging destructive structure is false proof and biological characteristic is false proof etc., and the purpose of these technologies is all to create a kind of business that can be false proof
Product are identified, but so far, all these technologies be all part solve antifraud marker in the uniqueness, readable that requires
Property, verifiability and with by protection commodity can bind sex chromosome mosaicism, in addition, all these technologies mostly do text on commodity counterfeit prevention
Chapter, cannot realize that low cost is cracked down on counterfeit goods.
The shortcoming of these anti-counterfeiting technologies is described as follows with deficiency:
The uniqueness of anti-counterfeiting mark:Most of commodity false proof marks are all because that processing technique is complicated, manufacturing technology is advanced,
Secrecy, causes anti-counterfeiting cost high and allows fake producer to hope and halt, if contrary technology is once divulged a secret or processing technology progress,
The level that fake producer copys is also higher than genuine piece, allows false proof manufacturer oneself all without distinguishable.In addition, complex manufacturing technology causes to prevent
Puppet can only be made by professional false proof company, due to the possibility of internal crime, objectively do not ensure that the uniqueness of anti-counterfeiting mark
Problem.
The readable and verifiability of anti-counterfeiting mark:Some anti-counterfeit commodities utilize the Nature texture and physical characteristics of materials come
Unique mark is manufactured, but cannot read or read complexity, cause to read equipment manufacturing cost costliness, it is impossible to which popularization is pushed away
Extensively.
Secondly, after false proof mark data reads, a kind of verification mode is exactly to compare with manufacturer commodity data database data,
Once can the validation database divulge a secret or privately prevent usurp (based on manufacturer be it is false proof ecology in shareholder), the result of checking
Can not fully prove the verity of commodity, thus this verification mode lose it is just.Another way is by setting in checking
In standby, the threshold value of preset false proof business men setting is judged, this method can only be done general because being not related to the characteristic of particular commodity
Adaptive verifies that threshold value is too high, can filter out genuine commodity, and the too low possibility for just having fraud is worse to be, it is impossible to prevent false proof
Manufacturer internal is committed a crime.
Anti-counterfeiting mark and the binding property by protection commodity:At present, anti-counterfeiting mark is if it were not for being pasted onto commodity interior packing
Upper (or integral with commodity packaging), otherwise be exactly to be physically held on commodity, as a part for commodity;Therefore, it is all of
Anti-counterfeiting mark, unless disposable anti-counterfeiting mark, can be separated with commodity violence itself, cannot solve repeatability makes
Problem.
Crack down on counterfeit goods with high costs:As anti-counterfeiting mark cannot ensure uniquely, checking data cannot be just, and anti-counterfeiting mark repeats profit
With etc. reason, above-mentioned anti-counterfeiting technology only makes an issue of on false proof, but cannot crack down on counterfeit goods, reason be evidence obtaining high cost,
Phenomenon of disputing over trifles is serious, and in actual life, anti-counterfeiting mark has become the magic weapon that fake products responsibility is escaped by manufacturer in fact, it is all of after
Fruit can only be undertaken by consumer.
Anti-counterfeiting cost is high:Anti-counterfeiting technology is higher, and internal control requirement is tighter, in addition to anti-counterfeiting technology cost itself, interior
Portion's management cost into geometric growth, therefore, the higher anti-counterfeit commodities of technology are more unsuitable for large-scale promotion.
False proof main body unicity:The strength of the single dependence manufacturer of false proof mode, is whole with enterprise's one's own antagonism at present
Individual unordered, exclusive concern with money, lacks sincere society, often unable to do what one wishes.
The content of the invention
As existing method has the problems referred to above, the embodiment of the present invention proposes a kind of antiforge method for commodities and device.
In a first aspect, the embodiment of the present invention proposes a kind of antiforge method for commodities, including:
The public key and private key of commodity are generated according to asymmetric arithmetic;
The serial number of the commodity, the public key, the cryptographic Hash of the public key and currency data are stored using block chain
In public database;
If receiving the checking information of the public key and determining the public key in the common data according to the cryptographic Hash
In storehouse, and the serial number according to the commodity and the currency data determine that the commodity are legal first time sale, then will
The status indication of the commodity is to sell;
If the checking information and the corresponding public key of the private key of the private key are received in the public database, and root
Determine that the commodity are legal first time checking according to the serial number and the currency data of the commodity, then by the commodity
Status indication is to have verified that;
Wherein, the Quick Response Code that the public key is fabricated to is pasted onto in the outer package of the commodity, what the private key was fabricated to
Quick Response Code is pasted onto the surface of the commodity.
Alternatively, the Quick Response Code that the public key and/or the private key are fabricated to is covered using disposable not visible coating.
Alternatively, the public key and private key that commodity are generated according to asymmetric arithmetic, further includes:
Using the public key as commodity product ID, the corresponding private key of the public key is fabricated to fake certification two dimension
Code.
Alternatively, the private key is affixed directly to the surface of the commodity after being fabricated to Quick Response Code.
Alternatively, the employing block chain is by the serial number of the commodity, the public key, the cryptographic Hash of the public key and stream
Logical data storage is further included in public database:
The serial number of the commodity, the public key, the cryptographic Hash of the public key and currency data are stored using block chain
In block chain public database, oracle, sql server, mysql or DB data base.
Alternatively, if the checking information for the receiving the private key and corresponding public key of the private key is in the public number
According to storehouse, and the serial number according to the commodity and the currency data determine that the commodity are legal first time checking, then
By the status indication of the commodity after having verified that, also to include:
The private key is sent to intelligent terminal and is stored, and the cryptographic Hash of the private key is sent to the public number
According in storehouse.
Second aspect, the embodiment of the present invention also propose a kind of anti-fake device for commodity, including:
Key production module, for the public key and private key of commodity are generated according to asymmetric arithmetic;
Public key storage module, for using block chain by the serial number of the commodity, the public key, the public key Hash
Value and currency data are stored in public database;
Public key verifications module, if for receiving the checking information of the public key and determining the public affairs according to the cryptographic Hash
Key is in the public database, and the serial number according to the commodity and the currency data determine that the commodity are legal
Sell for the first time, then by the status indication of the commodity to sell;
Private key authentication module, if for receiving the checking information and the corresponding public key of the private key of the private key described
In public database, and the serial number according to the commodity and the currency data determine that the commodity are to test legal first time
Card, then by the status indication of the commodity to have verified that;
Wherein, the Quick Response Code that the public key is fabricated to is pasted onto in the outer package of the commodity, what the private key was fabricated to
Quick Response Code is pasted onto the surface of the commodity.
Alternatively, the Quick Response Code that the public key and/or the private key are fabricated to is covered using disposable not visible coating.
Alternatively, the key production module be further used for using the public key as commodity product ID, it is described
The corresponding private key of public key is fabricated to fake certification Quick Response Code.
Alternatively, the private key is affixed directly to the surface of the commodity after being fabricated to Quick Response Code.
Alternatively, the memory module is further used for the serial number of the commodity, the public key, institute using block chain
The cryptographic Hash and currency data for stating public key is stored in block chain public database, oracle, sql server, mysql or DB number
According in storehouse.
Alternatively, described device also includes:
Secret storage module, is stored for the private key is sent to intelligent terminal, and by the Hash of the private key
Value is sent into the public database.
As shown from the above technical solution, the embodiment of the present invention is by the public key (public key combination) and private key by asymmetric generation
Outer package (case packing) and the surface of commodity are respectively adhered on after being fabricated to Quick Response Code, it is ensured that the readability of anti-counterfeit commodities, can
Confirmatory and binding property;Using block chain to commodity serial number, public key cryptographic Hash, and dependent merchandise attribute and currency data
Stored, it is ensured that the trackability of anti-counterfeit commodities circulation and the uniqueness in commodity source, while reducing cost of cracking down on counterfeit goods;It is logical
Verification public key and private key are crossed, the real state of commodity is determined, the digital asset for registering commodity is really weighed, it is ensured that false proof main body
Unicity, while reducing anti-counterfeiting cost.
Description of the drawings
In order to be illustrated more clearly that the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing
Accompanying drawing to be used needed for having technology description is briefly described, it should be apparent that, drawings in the following description are only this
Some embodiments of invention, for those of ordinary skill in the art, on the premise of not paying creative work, can be with
Other accompanying drawings are obtained according to these figures.
A kind of schematic flow sheet of antiforge method for commodities that Fig. 1 is provided for one embodiment of the invention;
The generating principle of the anti-counterfeiting mark pair that Fig. 2 is provided for one embodiment of the invention, the schematic flow sheet for making and using;
Serial anti-fake two-dimension code and the schematic diagram of composition that Fig. 3 is provided for one embodiment of the invention;
False proof each participant service logic and the schematic diagram of flow process that Fig. 4 is provided for one embodiment of the invention;
Salesman merchandise sales flow process and the schematic diagram of principle that Fig. 5 is provided for one embodiment of the invention;
Consumer's goods fake certification flow process and the schematic diagram of principle that Fig. 6 is provided for one embodiment of the invention;
Private key authentication flow process and the schematic diagram of principle that Fig. 7 is provided for one embodiment of the invention;
Fig. 8 uses process maintenance, servicing operations data record and commodity second-hand for the commodity that one embodiment of the invention is provided
The schematic diagram that flow of goods turns;
A kind of structural representation of anti-fake device for commodity that Fig. 9 is provided for one embodiment of the invention.
Specific embodiment
Below in conjunction with the accompanying drawings, the specific embodiment of the present invention is further described.Following examples are only used for more
Technical scheme is clearly demonstrated, and can not be limited the scope of the invention with this.
Fig. 1 shows a kind of schematic flow sheet of antiforge method for commodities that the present embodiment is provided, including:
S101, public key and private key that commodity are generated according to asymmetric arithmetic;
Wherein, the public key (Conbined public or double key) is fabricated to Quick Response Code and is pasted onto in the outer package (case packing) of the commodity,
The private key is fabricated to the surface that Quick Response Code is pasted onto the commodity.
S102, the commodity serial number, public key cryptographic Hash and item property and currency data are stored in using block chain
In block chain public database;
If S103, the checking information for receiving the public key and the public key are in the public database, and are legal
First time sale, then by the status indication of the commodity to sell;
If S104, the checking information for receiving the private key and the corresponding public key of the private key are in the public database
In, and verify for legal first time, then by the status indication of the commodity to have verified that;
The present embodiment is based on using Cryptography Principles (asymmetric cryptographic algorithm) the production anti-fake two-dimension code unique with making
Technology, using asymmetric arithmetic public key, private key directly as anti-counterfeiting mark code technology.After fake certification code (private key) generation not
Land, be directly connected to printer making fake certification Quick Response Code, it is ensured that the technology of fake certification code secret.Using Double anti-counterfeit code
(or many security codes), merchandise sales, fake certification operation are separated, and can be ensured that commodity counterfeit prevention completes closed loop checking, be prevented consumption
Person does not verify the effectiveness of product and caused commodity serial number repeats use of faking, and does not affect the use habit of consumer,
Beneficial to the popularization of the technology.(met with commodity sudden huge profits segmentation using once destructive Quick Response Code as the carrier of anti-counterfeiting mark code
Destruction), anti-counterfeiting mark code and the binding issue by protection commodity are basically solved, lawless person's sudden huge profits point are effectively prevented
Cut anti-counterfeiting mark to acquire an advantage.
In addition, the claim of the special anti-fake two-dimension code is not exclusively to (or how false proof to above-mentioned Double anti-counterfeit code
Code) technology, be also covered by a public key as product ID, private key is not only contained as single security code mode of fake certification code
Cover region block chain data storage method, also including in other conventional central databases or Distributed Storage mode, uses and is somebody's turn to do
False proof, the mode of tracing to the source of technology.
The technology of commodity circulation data is stored based on block chain, it is ensured that currency data can not be distorted and irreversibility:
A, define a kind of based on block chain technology, commodity as a kind of digital asset, created using digital asset,
Cloth, the process concluded the business are come the collection for realizing commodity circulation data and the commodity circulation data structure recorded, and provide single-stranded checking,
Multiple technology is sold in particular commodity repetition during avoiding commodity circulation.The guarantee of right is not only in publicly-owned, alliance, private
There is the data structure used in block chain, be also included within the right of the data structure used in third party database technology.
B, define in commodity circulation, from commodity production, manufacture outbound, to logistics provider, distributor (depositary management personnel),
Retailer (second level distributor, second level distributor depositary management personnel), shop-assistant, consumer purchase commodity, to consumer's commodity in use,
Maintenance commodity (repair and maintenance) record is preserved, used as all processes of second-hand goods dealing.And creativeness solves second-hand goods stream
By journey, based on digital envelope encrypt digital rights transferring technology.
Define a kind of salesman, consumption personnel based on commodity unique mark, commodity uniquely circulate chain, commodity license award
The authentication mechanism of power and method and the technology of other auxiliary verification modes.
Based on pki technologies, digital signature principle, it is to ensure the trusting relationship transmitted in block chain, there is provided one kind is disobeyed
Bad external certificate and complete production firm and logistics, distributor, the authorisation and authentication technology of distributor and salesman.The technology
Can ensure in block chain memory technology, the enterprise key secret being related to during hiding commodity circulation is that is, false proof beneficial to this
The practical application and spread of method, and beneficial to the confirmation of responsibility and claim cracked down on counterfeit goods.
Also include the management corresponding with above-mentioned technical requirements and method for running, not because of the change of title or data field
Change, the scene that uses is different and cause claims to be failed.
By the above-mentioned technology that can ensure that the sale of commodity closed loop, from economics, (fake producer pays a price, but can without profit
Figure) prevent the environment of fake producer's growth, the side of this combination computer logic technology and the universal regular solve problem of economics
Method is also the CLAIM OF BENEFIT of the patent.
Specifically, the present embodiment solves the uniqueness in anti-counterfeit commodities source:Systematicness solves commodity counterfeit prevention, problem of cracking down on counterfeit goods
In be related to the production of uniqueness anti-counterfeiting mark, read, checking and to by technical problems and related such as protection commodity bindings
Management rule.The trackability of anti-counterfeit commodities circulation:Using computer block chain technology, it is systematic elaborate commodity production,
Currency data message sense, and technology realization and the corresponding management rule of low cost evidence obtaining.The verifiability of anti-counterfeit commodities:
Method describes to realize commodity production, closed loop is false proof in the process of circulation, the ultimate principle of checking.The method of offer need not be looked forward to
Industry cost input, anti-counterfeiting mark are enterprise oneself printing and making, only will follow certain rule in commodity circulation management,
Therefore it is adapted to large-scale promotion.Method causes fake producer profitless with authentication mechanism, decision logic, is general in economics
Generation criterion is organically blended with information technology.In addition to know-why and service logic, the realization of method also contemplates ease for use
And manageability.Guarantee there is no the possibility of fraud.Fake producer is profitless.Imitation behavior can be reviewed with low cost, can be met
Consumer quickly cracks down on counterfeit goods, complaint.For enterprise, because without the need for cost input, can large-scale promotion.This is false proof, trace to the source
Method is easily understood, and common people can be allowed quickly to trust, it is easy to promote.Meanwhile, also technically accomplish not revealing excessive enterprise
Industry vital strategic secrets information.The method is independent of public rights power, is entirely enterprise autonomy behavior, can save flood tide social resources;It is actual
On be that the one kind that realizes of low cost is independent of public rights power, based on enterprise, consumer's condominium, autonomous false proof, method of cracking down on counterfeit goods with
Concept, social meaning have a far reaching influence.
The embodiment of the present invention is fabricated to Quick Response Code and is glued respectively by the public key (Conbined public or double key) and private key by asymmetric generation
It is attached to outer package (case packing) and the surface of commodity, it is ensured that the readability of anti-counterfeit commodities, verifiability and binding property;Using
Block chain is stored to commodity serial number, public key cryptographic Hash and item property and currency data, it is ensured that anti-counterfeit commodities circulate
Trackability and commodity source uniqueness, while cost of cracking down on counterfeit goods is relative saving;By verification public key and private key, determine true
The state of real commodity, the numeral for registering commodity are really weighed, it is ensured that the unicity of false proof main body, while reducing anti-counterfeiting cost.
Further, on the basis of said method embodiment, the Quick Response Code that the public key and/or the private key are fabricated to
Covered using disposable not visible coating.
Covered by adopting disposable not visible coating, public key and/or private key are fabricated to Quick Response Code, be ensure that
Public key and/or private key are used again.
Further, on the basis of said method embodiment, S101 is further included:
Using the public key of the commodity as product ID, the corresponding private key of the public key is used as fake certification code.
Further, on the basis of said method embodiment, the private key is affixed directly to institute after being fabricated to Quick Response Code
State the surface of commodity.
The surface of the commodity is pasted onto after private key is not stored, is fabricated directly into Quick Response Code, private key is ensure that
Privacy.
Technical scheme described in detail below and principle:
A1, the uniqueness of anti-counterfeiting mark are generated, carrier explanation, it is readable and with by the binding property of protection commodity
1. the generation of anti-counterfeiting mark and making
As shown in Fig. 2 the method use one kind being identified based on cryptographic two-dimension code anti-counterfeit, each commodity is by asymmetric
A pair of secret keys that algorithm is produced is anti-as its anti-counterfeiting mark pair, wherein public key and corresponding commodity set of serial numbers composite commodity
Pseudo- sales code, private key and corresponding commodity set of serial numbers composite commodity fake certification code, concrete manufacturing process is:
Commodity serial number in a, synchronous enterprise erp systems, routine call random number production function, using asymmetric arithmetic
A pair of secret keys is generated as the anti-counterfeiting mark pair of the commodity.
B, public key cryptographic Hash is stored in Computer Database (or LIST SERVER), and with corresponding commodity sequence
Number combination is fabricated to anti-fake venting code, for the commodity of case packing, all commodity serial numbers in case packing and public key is combined
Into false proof batch sales code, private key and corresponding commodity serial number are fabricated directly into fake certification code.In manufacturing process,
Private key does not allow to preserve, and is fabricated directly into commodity counterfeit prevention identifying code by the security code printing device direct-connected with computer.
C, anti-fake venting code (false proof batch sales code) are pasted on commodity outer package (case packing), and fake certification code is pasted on
Commodity inner packing or the part as commodity, are directly adhered on commodity.
2. the uniqueness of anti-counterfeiting mark is proved
Uniqueness based on the provable anti-counterfeiting mark of following reason:
A, oval asymmetric arithmetic (ECDSA) are the basic algorithms in contemporary cryptology, widely used in the world to be used as
User identity identification in computer utility.At present, it is domestic (close as the asymmetric arithmetic in business's level of confidentiality application using the algorithm
Key length requirement more than 256), and the asymmetric arithmetic that People's Republic of China's " law of electronic signature " is approved, in silver
Go (Web bank's account fund transfer), used between government and enterprise in a large number.
The fake certification code that private key in b, the algorithm is constituted " is not landed " in whole manufacturing process, is directly printed, is made
It is made fake certification code, it is ensured that once generation, anyone does not know.When fake certification code is verified, it is not necessary in data base
Private key is compared, but is verified using password principle, therefore fake certification code is also without lane database is stored in, no
Can cause to reveal.
C, security code are to using Quick Response Code, used as carrier, simple, easy, production firm can be made with oneself completely, be not required to
To be made by the false proof company of specialty, prevent the possibility that the key production phase divulges a secret.Once occurring faking, responsibility is also beneficial to
Assert.
D, before sales, fake certification code to any damage or exposure, be all considered to the serial number commodity counterfeit prevention and fail, from
And effectively prevent fake producer from obtaining anti-counterfeiting mark by violence.
3. anti-counterfeiting mark carrier:From simple easily production Quick Response Code as the carrier of anti-counterfeiting mark pair, and have as follows
Characteristic:
A, the Quick Response Code are private mark, and there is coating on surface, opens coating and could read.
B, from disposable printing paper as printed material.
The damage of c, any abnormalities of the Quick Response Code, including before sales opens surface coating, significantly damages vestige
Etc. all regard as commodity false proof mark leakage, the anti-counterfeiting mark fails.
4. the binding of anti-counterfeiting mark and commodity:Security code is bound together with commodity from superpower seccotine, it is any
Sudden huge profits separate, and can cause security code to damage failure.
In A2, commodity production and the process of circulation foundation of Data-Link with trace to the source
Commodity production includes commodity production process and commodity ex-warehouse with circulation, through logistics, distributor at different levels, to final
Whole process in consumer's handss, broad sense are said, it is also possible to cover the link in being delivered to consumer's handss soon.These data are
Can be stored in commodity vendor database, it is also possible to be stored in third party database, in order to ensure can not distorting for data
With fairness, the characteristic that at any time can look into, trace to the source transparent to consumer, this method is using newest block chain technology storage commodity
All data in production and the process of circulation.
In order to meet above-mentioned requirements, the method need to realize block chain core layer, commodity production enterprises end, logistics provider end,
Distributor end and shop-assistant app, consumer's app programs, concrete function and implementation method do following elaboration, as shown in Figure 4:
1. block chain core is realized and service logic
The module is the bottom core of block chain, as a kind of special digital asset, using the bottom skill of digital cash
Art, realizes the data storage in the process of circulation by the establishment of commodity assets, issue and transaction, and other business module functions are equal
Set up on the module, in order to reduce the exploitation of size of code, bottom core adopts Open Source Code, but according to business characteristic, weight
Data model and and service logic are devised newly.
A, block chain transaction data structure
A, the data structure of block catenary system user
System user includes raw material manufacturer, commodity production business, logistics provider at different levels, distributor at different levels (containing retailer),
And shop-assistant, consumer (second-hand goods consumer), specific data structure is as follows:
Raw material manufacturer, the definition of commodity production quotient data structure:Raw material manufacturer id (commodity production business id), former material
Material manufacturer's title (commodity production business's title), Institution Code, registered address, business scope, effect duration, legal representative, public key,
User type and signature (raw material manufacturer or commodity production business)
Logistics provider and distributor's (containing at different levels) data structure definition:Logistics provider id (distributor id), logistics provider's title (are sold
Business's title), Institution Code, registered address, business scope, effect duration, legal representative, public key, brand, trade mark, certification, follow mark
Accurate, user type and signature (logistics provider or commodity production business)
Shop-assistant, consumer's (containing second-hand consumer) data structure definition:Shop-assistant, consumer id (contain second-hand consumption
Person), shop-assistant, consumer's (contain second-hand consumer) name, public key, sex, the date of birth, ID (identity number) card No. (cryptographic Hash), live
Location, telephone number, user type, signature (shop-assistant or consumer or second-hand consumer)
Annotation:, in addition to id, public key, user type and signature, other can for logistics provider and distributor, shop-assistant, consumer
Not fill out, mark is anonymous.
B, commodity asset creation data structure
Commodity create data structure:Commodity id, trade name, commodity production business id, brand, trade mark, certification, follow mark
Accurate, signature (commodity production business)
Raw material creates data structure:Raw material id, raw material title, raw material manufacturer id, brand, trade mark, certification,
Follow standard, signature (raw material manufacturer)
C, commodity issue data structure
Commodity issue data structure definition:Commodity id, commodity manufacturer id, commodity serial number, commodity public key cryptographic Hash, commodity
Transport number, commerical batches number, two time selling and inspection declaration code, original producton location, raw material, commodity counterfeit prevention identifying code the photo that focuses (can
Choosing), commodity manufacturer signature (commodity data)
D, logistics provider's (containing logistics providers at different levels and the Express firm in ecommerce) data currency structure
Commodity logistics data structure is defined:Commodity id, logistics provider id, Commodity Transportation number, arrival time, transport license number, fortune
Defeated director, traffic route (hashed value), logistics provider's signature (commodity logistics data)
E, distributor's (containing distributors at different levels and retailer) data currency structure
Merchandise quotient data structure is defined:Commodity id, commodity manufacturer id, distributor id, Commodity Transportation number, commerical batches
Number, entry time, warehouse locations, shelf number, warehouseman's (cryptographic Hash), distributor signature (commodity stocks data)
F, salesman (shop-assistant) data structure
Shop-assistant's data structure definition:Distributor id, shop-assistant id, commodity id, commerical batches number, commodity serial number, pin
Sell type, selling time, distribution state (sold, do not sold), salesman's signature (article sales data)
G, consumer data structure
Consumer data structure is defined:Consumer id, commodity id, commodity serial number, the commodity proving time, checking information
(true, false), commodity private key cryptographic Hash,
(commodity checking data) are signed by consumer
H, second-hand consumer data structure
Second-hand consumer data structure definition:Second-hand consumer id, commodity serial number, the commodity transfer time, transferable information,
Commodity private key cryptographic Hash,
(second-hand goods assignment data) is signed by second-hand consumer
2. production firm's module is realized and service logic
The module is used by commodity production manufacturer, and concrete composition and major function are described as follows:
A, program initialization are arranged
The generation of production firm's key pair and mandate, the typing of related data;Two-dimentional decoding apparatus initialization and connectivity verification;
LIST SERVER (optional) and the connection and configuration of data base.
B, the generation of anti-counterfeiting mark pair and management
Commodity serial number in synchronous erp systems, generates commodity false proof mark pair according to serial number.
The making of c, Quick Response Code
Program include Quick Response Code generate with make module, anti-fake venting Quick Response Code by commodity serial number with constitute with public key,
Fake certification code is made up of commodity serial number and private key.
D, data syn-chronization and issue
For with manufacturer's erp database in phase, and block chain data publication.
E, logistics, dealer management and mandate
The function mainly includes that distributor, logistics provider authorize, freeze, cancelling and synchronously issuing.
Production firm's service logic:
A, installation system software produce manufacturer's identity key pair, fill in manufacturer's essential information, connection validation database
(LIST SERVER is optional) and Quick Response Code make printer, sign entitlement logistics provider and distributor, complete initial setting up.
B, synchronous erp system articles serial number generate corresponding commodity false proof mark pair according to production requirement.
C, makes anti-fake venting Quick Response Code and fake certification Quick Response Code, is distributed to production line workshop.Above step can be with one
Secondary property Mass production, or according to commodity output size, produce in batches according to the moon, season or year.
D, direct labor check the availability (whether damaging) of anti-counterfeiting mark pair, and anti-fake venting code is pasted on commodity outsourcing
Vanning, is pasted on fake certification identification code commodity inner packing or the part as commodity itself.
E, by Data synchronization interface synchronously when time commodity production data (optional).
F, click commodity ex-warehouse, related data write block chain, erp systems (optional).
3. logistics provider's module is realized
The module is used by logistics provider, and concrete composition and major function are described as follows:
A, the generation of logistics provider's key pair and authorized, the Initialize installation such as connection and configuration of data base, related logistics
The typing of data.
B, data syn-chronization and issue, it is synchronous to download block chain data, logistics data is issued to block chain.
Logistics provider's service logic:
A, installation system software produce logistics provider's identity key pair, fill in essential information, connection validation database, complete
Into initial setting up.
B, authorized and temporal information according to manufacturer, read when time logistics related data, according to verification of data from block chain
Entrucking information.
C, rear typing is arrived at when time logistics data, including time, traffic route, name driver, delivery receitp.
D, related data write block chain.
4. distributor's module is realized
The module is used by distributors at different levels, and concrete composition and major function are described as follows:
A, the generation of distributor's key pair and mandate, the typing of related data;The connection and configuration of data base.
B, data syn-chronization and issue
It is synchronous to download block chain data, distributor's inventory management data is issued to block chain.
C, shop-assistant's management
Sales force management data base, including Data Enter are set up, is issued to freeze, the function such as revocation.
Business of dealer logic:
A, installation system software produce distributor's identity key pair, fill in essential information, connection validation database, enter
Row depositary management personnel and salesman mandate, complete initial setting up.
B, authorized and temporal information according to manufacturer, read when time commodity data, according to verification of data commodity from block chain
Warehouse-in information.
After c, warehouse-in, typing is when secondary commodity storage location, shelf number, administrator's information, and delivery receitp.
D, related data write block chain.
5. salesman app
The module is used by salesmaies at different levels, checks and verify that merchandise sales are recorded, it is also possible to enter together with consumer
Do business product authenticity verification.
Support ios and Android system.
Salesman service logic, as shown in Figure 5:
After a, person to be consumed select commodity payment, check whether anti-fake venting Quick Response Code destroysBy the goods registration of destruction
Warehouse-in.
B, using mobile phone app scan anti-fake venting Quick Response Code, cross-check information, it is errorless after confirm.(process can also be with receiving
Silver-colored machine bindings, it is considered to ease for use)
Above-mentioned sales information is write block chain by c, app automatically.
D, customer demand can be answered, verify commodity counterfeit prevention identifying code on the spot.
5. consumer app
The module is used by consumer, carries out commodity true and false checking.
Support ios and Android system.
Consumer's service logic is divided to two aspects, one side to complete the checking of commodity and turning for commodity digital rights and interests
Move, as shown in fig. 6-7, be described in detail as follows:
A, consumer can be at delivery of cargo scenes, or (individual guarantees harmless transmission and preserves) is first checked when commodity are used
Whether the fake certification code in commodity inner packing or commodity is damaged, once damaged consumer can make fake products judges that (consumer is certainly
Except the problem of body).
B, for the product sold by ecommerce, consumer shoots the photograph of commodity false proof mark code using high definition camera
Piece, compares with block chain Central Plains photo is stored in, and completes auxiliary checking.
C, fake certification Quick Response Code is opened, using the true and false of mobile phone app scanning validation commodity.
After the completion of d, checking, the private key in fake certification code is automatically saved in Client handset app (private by consumer's signature
Key is protected), and private key cryptographic Hash is sent to block chain, complete the electronic certificate that commodity rights and interests belong to consumer.
E, the uniqueness in order to ensure the private key, consumer need destruction checking Quick Response Code (to guarantee that others can not scan again
Read private key).
Second aspect, as shown in figure 8, consumer is during preservation or commodity in use, can be according to second-hand goods
Form transfers other consumers, and concrete transference has:
A, the information that can be transferred the possession of with typing, or for important commodity, maintenance can be recorded or according to the repair and maintenance stage
Use information etc. is recorded respectively.
B, the transfer of second-hand things of commodity be meant that and the digital properties rights and interests (commodity private key) of commodity transferred second-hand consumer,
Take the form of and recipient is transferred by the form of digital envelope, encryption.
A3, commodity counterfeit prevention and checking principle of tracing to the source
1. the anti-fake venting code of salesman verifies key element
Whether a, the anti-fake venting code outward appearance are damaged
B, the anti-fake venting code whether there is, if useWhether use time is correct
Whether the commodity that c, the anti-fake venting code are represented are sold by the distributor that production firm authorizes, and whether salesman
Authorize via distributor
Whether the commodity circulation chain that d, the anti-fake venting code are represented is unique
2. consumer's goods fake certification key element
Whether a, the fake certification code outward appearance are damaged
B, with the presence or absence of public key information corresponding with the fake certification code-phase
Whether the commodity that c, the fake certification code are represented had carried out fake certification, if it did not, write has verified that letter
Breath, if it has been experienced that showing proving time and relevant information.
3. fake certification code verifies principle
A, scanned by mobile phone app and read commodity manufacturer's information, serial number and the private key information.
B, mobile phone produce checking random number, and use private key signature.
C, search block chain, find production firm's anti-fake venting code corresponding with the commodity serial number, use anti-fake venting
Code decrypt the signature, decrypted result with verify random number compare, if equally, it was demonstrated that the private key with the presence of corresponding public key,
The commodity are true, effective.
A4, commodity are faked and false proof ecological analysis
1. production firm
Manufacturer itself fakes and correlation analysiss:
A, enterprises' production capacity are not enough, approve that by certain mode the commodity of other manufacturers can be with the goods markss pin
Sell, such case is not substantially to fake, and is a kind of commercial activity, and enterprise there are interests scheme, also risky, once consumer's sense
Feel commodity problem, or go wrong to marking business administration, cause commercial quality to glide, the lighter's brand names are damaged, and severe one is related to
And arrive legal responsibility.
B, enterprise because raw material supply it is not enough, or production management is improper, makes a false report raw material supply, false item authentication etc.
Deng, substantially nor enterprise fakes, but a kind of Enterprise Credit, commercial quality problem, if commodity raw material information record exists
In block chain, then by inquiring about block chain, by raw material, manufacturer reports, the mode of government offices' supervision is solved.
C, enterprise are for capital operation, or form is played tricks, and need to fabricate the sales volume of commodity, enterprise need simultaneously with
Logistics, distributor forge related data together, the most it is difficult to, in the handheld terminal of terminal consumer, generation, must be fabricated by enterprise
Valency cost is huge.
2. logistics provider
The mode of fraud:In transit, sudden huge profits destruction anti-counterfeiting mark, records anti-counterfeiting mark number, makes the false proof of vacation
Mark, because needing individual processing one by one, is limited by haulage time, route, and the possibility played tricks on a large scale is little, but
Can not exclude and play tricks individually.
The method of process:Loglstics enterprise is strict with according to this rule related logistics information write area block chain, while also
Further control measures can be taken, the method for enterprise's official seal strip of paper used for sealing is such as added a cover on van, big packing cratess.Because
Logistics data evidence obtaining is related to the responsible partys such as individual, once there is fraud situation, logistics company can prove one's own innocence.
3. distributor
Fraud mode:As logistics provider, need sudden huge profits to disassemble anti-counterfeiting mark, obtain commodity false proof mark number, make
In storehouse, large-scale fraud must be internal staff's crime in case place, or till trade intentionally, but because true commodity number
Amount is certain, and distributor itself can be obtained without interests, but can not exclude the imitation behavior of depositary management personnel smallest number privately.
Processing method:It is required that distributor gives block chain depositary management data is activation according to this requirement, furthermore it is possible to strengthen warehouse
Management, installs video monitoring, and warehouse personnel's discrepancy resignation system.Because the evidence obtaining of depositary management data is related to the responsibility master such as individual
Body, once there is fraud situation, distributor, depositary management personnel can prove one's own innocence.
4. profitability fake producer
Profitability fake producer is the personal or group that faked for the purpose of profit, from the point of view of the anti-fraud system described in method, this
Planting fraud needs to meet two conditions:One is before merchandise sales, or before the false product copied are sold.And commodity pin
Need to verify the legitimacy of distributor when selling, so fake producer cannot make a profit by selling.
The method sale, Validation Mode have prevented the possibility of profitability fraud, and false proof root is solved from interests motivation
This problem.
5. malice fake producer
So-called malice fake producer is referred to not for the purpose of profit, otherwise is exactly that rival disregards cost malice for it,
Otherwise be exactly personal resentment malice for it, both of these case belongs to non-commercial crime category;In addition, crime time, place are also only
Can be on logistics road or distributor's storehouse, Jing is analyzed above, and this probability is also substantially absent from.
Even if having, fake producer is also to be paid, the true business for obtaining with certain cost (the false commodity of manufacture replace genuine commodity)
Product oneself can not can only be used or collect in commercial type.
In sum, the method can be called to account from the production uniqueness of anti-counterfeiting mark, commodity circulation trackability, fake producer
Property, fake producer is profitless etc., and several aspects ensure that false proof effectiveness.
Subject identity during A5, commodity circulation is proved and management rule
Subject identity during commodity circulation, method have following requirement:
A, production firm adopt real-name authentication (issuing digital certificate by the e-commerce certification authority of authorized by state);
B, logistics provider and distributor are network anonymous, manufacturer is responsible for reviewing
C, salesman, depositary management personnel are network anonymous, distributor is responsible for reviewing;
D, consumer's anonymity (real name is optional).
6th, low cost crack down on counterfeit goods according to and principle
In the method for anti-counterfeit, each main body responsibility is detailed perfectly clear, open, fair, reliable, and can review, concrete manifestation
:
Clearly, anti-counterfeiting mark involves anti-counterfeiting mark production firm to being responsible for by production firm, not for a, false proof main body responsibility.
B, cryptographic algorithm are simple, reliable, and the fake certification code self-generating based on asymmetric arithmetic rises, and anyone does not know
Road, has no way of copying.
C, commodity circulation phase data can be traced to the source, can be collected evidence.With PKI technologies, block chain technology guarantees that currency data can not be usurped
Change, non-repudiation.
Although d, logistics, distributor, salesman, depositary management personnel are network anonymous, by responsible party (production firm
And distributor) can review, otherwise, undertaken by responsible party.
Once e, have commodity fake, can be looked into by block chain and take commodity production and currency data, find problem source
Point.
By above description, no matter when, what stage there is commodity imitation behavior, consumer can determine in time
Responsible party, and counterindemnity is obtained, again without undertaking the loss that fake products brings, production firm can also pass through the party for consumer
Method safeguards the just rights of oneself.
Fig. 9 shows a kind of structural representation of anti-fake device for commodity that the present embodiment is provided, and described device includes:Key
Generation module 901, public key storage module 902, public key verifications module 903 and private key authentication module 904, wherein:
The key production module 901, for the public key and private key of commodity are generated according to asymmetric arithmetic;
The public key storage module 902, for using block chain by the commodity serial number, public key cryptographic Hash, Yi Jixiang
Underlying commodity attribute and currency data are stored in public database;
The public key verifications module 903, if for receiving the checking information and the public key of the public key in the public affairs
Altogether in data base, and sell for legal first time, then by the status indication of the commodity to sell;
The private key authentication module 904, if checking information and the corresponding public affairs of the private key for receiving the private key
Key is in the public database, and verifies for legal first time, then by the status indication of the commodity to have verified that;
Wherein, the public key is fabricated to Quick Response Code and is pasted onto in the outer package of the commodity, and the private key is fabricated to two dimension
Code is pasted onto the surface of the commodity.
Specifically, the key production module 901 generates the public key and private key of commodity according to asymmetric arithmetic;The storage
The commodity serial number, public key cryptographic Hash, and dependent merchandise attribute and currency data are stored in by module 902 using block chain
In public database;If the public key verifications module 903 receives the checking information and the public key of the public key in the public affairs
Altogether in data base, and sell for legal first time, then by the status indication of the commodity to sell;The private key verifies mould
If block 904 receives the checking information of the private key and the corresponding public key of the private key is in the public database, and to close
The first time checking of method, then by the status indication of the commodity to have verified that.
The embodiment of the present invention is fabricated to Quick Response Code and is glued respectively by the public key (public key combination) and private key by asymmetric generation
It is attached to outer package (case packing) and the surface of commodity, it is ensured that the readability of anti-counterfeit commodities, verifiability and binding property;Using
Block chain is stored to commodity serial number, public key cryptographic Hash and item property and currency data, it is ensured that anti-counterfeit commodities circulate
Trackability and commodity source uniqueness, while cost of cracking down on counterfeit goods is relative saving;By verification public key and private key, business is determined
The real state of product, the digital asset for registering commodity are really weighed, it is ensured that the unicity of false proof main body, while reducing anti-counterfeiting cost.
Further, on the basis of said apparatus embodiment, the public key (public key combination) and/or the private key make
Into Quick Response Code covered using disposable not visible coating.
Further, on the basis of said apparatus embodiment, the key production module is further used for the public affairs
Product ID of the key as commodity, the corresponding private key of the public key is used as fake certification code.
Further, on the basis of said apparatus embodiment, the private key is affixed directly to institute after being fabricated to Quick Response Code
State the surface of commodity.
Wherein, key production module for generating the public key and private key of commodity and a kind of public according to asymmetric arithmetic
Key, private key are encoded into the coded system of Quick Response Code;
Public key storage module, for using block chain by item property and streams such as the commodity serial number, public key cryptographic Hash
Logical data storage in public database, commodity as a kind of digital asset, is created using digital asset, is issued, being concluded the business
Process is realizing the collection of commodity circulation data and record;
Public key verifications module, if for receiving the checking information and the public key of the public key in the public database
In, and sell for legal first time, then by the status indication of the commodity to sell;
Private key authentication module, if for receiving the checking information and the corresponding public key of the private key of the private key described
In public database, and verify for legal first time, then by the status indication of the commodity to have verified that;
Wherein, the Quick Response Code (public key combination) that the public key makes is pasted onto in the outer package (case packing) of the commodity,
The Quick Response Code that the private key makes is pasted onto the surface of the commodity.
Furthermore, it is contemplated that commodity can marketing packing multiformity, the method have also been devised a kind of false proof batch sales code, by
In packaging, all commodity serial numbers and public key are combined into, referred to as public key combination, and checking principle is ibid.
Method feature also includes, in order to ensure the demand of commodity commodity inspection declaration or secondhand sales in use, there is provided
A kind of inspection declaration, second-hand goods sales code, are stored in block chain public database by commodity public key encryption.
Anti-fake device for commodity described in the present embodiment can be used for performing said method embodiment, its principle and technique effect
Similar, here is omitted.
Device embodiment described above is only schematic, wherein the unit as separating component explanation can
To be or may not be physically separate, as the part that unit shows can be or may not be physics list
Unit, you can local to be located at one, or can also be distributed on multiple NEs.Which is selected according to the actual needs can
In some or all of module realizing the purpose of this embodiment scheme.Those of ordinary skill in the art are not paying creativeness
Work in the case of, you can to understand and implement.
Through the above description of the embodiments, those skilled in the art can be understood that each embodiment can
By software plus required general hardware platform mode realizing, naturally it is also possible to by hardware.Based on such understanding, on
State the part that technical scheme substantially contributes prior art in other words to embody in the form of software product, should
Computer software product can be stored in a computer-readable storage medium, such as ROM/RAM, magnetic disc, CD etc., including some fingers
Order is used so that a computer equipment (can be personal computer, server, or network equipment etc.) performs each enforcement
Method described in some parts of example or embodiment.
It should be noted that:Above example only to illustrate technical scheme, rather than a limitation;Although reference
Previous embodiment has been described in detail to the present invention, it will be understood by those within the art that:Which still can be right
Technical scheme described in foregoing embodiments is modified, or carries out equivalent to which part technical characteristic;And this
A little modifications are replaced, and do not make the essence of appropriate technical solution depart from the spirit and model of various embodiments of the present invention technical scheme
Enclose.
Claims (12)
1. a kind of antiforge method for commodities, it is characterised in that include:
The public key and private key of commodity are generated according to asymmetric arithmetic;
The serial number of the commodity, the public key, the cryptographic Hash of the public key and currency data are stored in by public affairs using block chain
Altogether in data base;
If receiving the checking information of the public key and determining the public key in the public database according to the cryptographic Hash,
And the serial number according to the commodity and the currency data determine that the commodity are legal first time sale, then by the business
The status indication of product is to sell;
If receiving the checking information and the corresponding public key of the private key of the private key in the public database, and according to institute
The serial number and the currency data for stating commodity determines that the commodity are legal first time checking, then by the state of the commodity
It is labeled as having verified that;
Wherein, the Quick Response Code that the public key is fabricated to is pasted onto in the outer package of the commodity, the two dimension that the private key is fabricated to
Code is pasted onto the surface of the commodity.
2. method according to claim 1, it is characterised in that the Quick Response Code that the public key and/or the private key are fabricated to
Covered using disposable not visible coating.
3. method according to claim 1, it is characterised in that public key and the private that commodity are generated according to asymmetric arithmetic
Key, further includes:
Using the public key as commodity product ID, the corresponding private key of the public key is fabricated to fake certification Quick Response Code.
4. method according to claim 2, it is characterised in that the private key is affixed directly to described after being fabricated to Quick Response Code
The surface of commodity.
5. method according to claim 1, is further characterized in that, the employing block chain is by the serial number of the commodity, institute
State public key, the cryptographic Hash of the public key and currency data to be stored in public database, further include:
The serial number of the commodity, the public key, the cryptographic Hash of the public key and currency data are stored in by area using block chain
In block chain public database, oracle, sql server, mysql or DB data base.
6. method according to claim 1, is further characterized in that, if the checking information for receiving the private key and described
The corresponding public key of private key in the public database, and according to the serial number of the commodity and the currency data determine
Commodity are legal first time checking, then by the status indication of the commodity, after having verified that, also to include:
The private key is sent to intelligent terminal and is stored, and the cryptographic Hash of the private key is sent to the public database
In.
7. a kind of anti-fake device for commodity, it is characterised in that include:
Key production module, for the public key and private key of commodity are generated according to asymmetric arithmetic;
Public key storage module, for using block chain by the serial number of the commodity, the public key, the cryptographic Hash of the public key and
Currency data is stored in public database;
Public key verifications module, if for receiving the checking information of the public key and determining that the public key exists according to the cryptographic Hash
In the public database, and the serial number according to the commodity and the currency data determine that the commodity are legal first
Secondary sale, then by the status indication of the commodity to sell;
Private key authentication module, if for receiving the checking information and the corresponding public key of the private key of the private key described public
In data base, and the serial number according to the commodity and the currency data determine that the commodity are legal first time checking,
Then by the status indication of the commodity to have verified that;
Wherein, the Quick Response Code that the public key is fabricated to is pasted onto in the outer package of the commodity, the two dimension that the private key is fabricated to
Code is pasted onto the surface of the commodity.
8. device according to claim 7, it is characterised in that the Quick Response Code that the public key and/or the private key are fabricated to
Covered using disposable not visible coating.
9. device according to claim 7, it is characterised in that the key production module is further used for the public key
Used as the product ID of commodity, the corresponding private key of the public key is fabricated to fake certification Quick Response Code.
10. device according to claim 8, it is characterised in that the private key is affixed directly to institute after being fabricated to Quick Response Code
State the surface of commodity.
11. devices according to claim 7, are further characterized in that, the memory module is further used for will using block chain
The serial number of the commodity, the public key, the cryptographic Hash of the public key and currency data be stored in block chain public database,
In oracle, sql server, mysql or DB data base.
12. devices according to claim 7, are further characterized in that, described device also includes:
Secret storage module, is stored for the private key is sent to intelligent terminal, and the cryptographic Hash of the private key is sent out
Deliver in the public database.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610970477.1A CN106570710A (en) | 2016-10-27 | 2016-10-27 | Commodity anti-counterfeiting method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610970477.1A CN106570710A (en) | 2016-10-27 | 2016-10-27 | Commodity anti-counterfeiting method and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106570710A true CN106570710A (en) | 2017-04-19 |
Family
ID=58541598
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610970477.1A Pending CN106570710A (en) | 2016-10-27 | 2016-10-27 | Commodity anti-counterfeiting method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106570710A (en) |
Cited By (71)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107169776A (en) * | 2017-05-10 | 2017-09-15 | 无锡井通网络科技有限公司 | Product certification method for anti-counterfeit based on block chain technology |
CN107220837A (en) * | 2017-05-31 | 2017-09-29 | 北京汇通金财信息科技有限公司 | A kind of destination object source tracing method and device |
CN107292629A (en) * | 2017-05-12 | 2017-10-24 | 深圳蜂链科技有限公司 | Anti-counterfeit tracking verification method based on block chain and the device using this method |
CN107341676A (en) * | 2017-07-17 | 2017-11-10 | 深圳天净喔溯源科技有限公司 | False proof mark and the method for tracing to the source |
CN107481022A (en) * | 2017-08-21 | 2017-12-15 | 合肥蓝胖子科技有限公司 | Commodity cloud Antiforge system method based on mobile Internet |
CN107491946A (en) * | 2017-07-10 | 2017-12-19 | 北京云知科技有限公司 | It is a kind of to store virtual objects to the method, apparatus of block chain and electronic equipment |
CN107633414A (en) * | 2017-10-18 | 2018-01-26 | 上海唯链信息科技有限公司 | A kind of case and bag based on block chain technology are false proof and traceability system |
CN107679876A (en) * | 2017-10-18 | 2018-02-09 | 上海唯链信息科技有限公司 | A kind of medicine equipment based on block chain technology is false proof and traceability system |
CN107705134A (en) * | 2017-10-11 | 2018-02-16 | 重庆印链科技有限公司 | Anti-fake network system based on block chain |
CN107730278A (en) * | 2017-10-18 | 2018-02-23 | 上海唯链信息科技有限公司 | A kind of false proof and retroactive method of the medicine based on block chain technology |
CN107730279A (en) * | 2017-10-18 | 2018-02-23 | 上海唯链信息科技有限公司 | A kind of original factory of vehicle based on block chain technology dispatches from the factory false proof and traceability system |
CN107748994A (en) * | 2017-10-31 | 2018-03-02 | 杭州趣链科技有限公司 | A kind of anti-fake traceability system based on block chain |
CN107786546A (en) * | 2017-09-30 | 2018-03-09 | 电子科技大学 | A kind of red wine anti-fake traceability system based on privately owned chain |
CN107944894A (en) * | 2017-12-27 | 2018-04-20 | 上海唯链信息科技有限公司 | A kind of Retail commodity method for tracing based on block chain technology |
CN108009778A (en) * | 2017-12-25 | 2018-05-08 | 南京思利华信息科技有限公司 | A kind of supply chain management method |
CN108055125A (en) * | 2017-11-23 | 2018-05-18 | 阿里巴巴集团控股有限公司 | A kind of encryption and decryption method and device of product information |
CN108141436A (en) * | 2015-07-10 | 2018-06-08 | 因特鲁斯特公司 | Constrained devices are registered |
CN108197957A (en) * | 2018-01-12 | 2018-06-22 | 北京欧链科技有限公司 | A kind of method for anti-counterfeit and system based on block chain |
CN108537047A (en) * | 2018-02-09 | 2018-09-14 | 北京京东尚科信息技术有限公司 | The method and device of information is generated based on block chain |
CN108564182A (en) * | 2018-04-16 | 2018-09-21 | 安徽中科智链信息科技有限公司 | A kind of life period of an equipment management system and method based on block chain technology |
CN108681904A (en) * | 2018-04-01 | 2018-10-19 | 蒋欣言 | A kind of fake certification implementation method of bottled formula commodity |
CN108694594A (en) * | 2018-05-29 | 2018-10-23 | 阿里巴巴集团控股有限公司 | Commodity source tracing method and device, electronic equipment based on block chain |
CN108712263A (en) * | 2018-06-11 | 2018-10-26 | 北京京东尚科信息技术有限公司 | Information Authentication method, apparatus, system and computer readable storage medium |
CN108734480A (en) * | 2018-05-22 | 2018-11-02 | 四川海纳仁东科技有限公司 | Red wine scarcity method of proof based on block chain |
CN108881253A (en) * | 2018-06-29 | 2018-11-23 | 全链通有限公司 | Block chain real name participatory approaches and system |
CN108876403A (en) * | 2018-05-31 | 2018-11-23 | 北京京东尚科信息技术有限公司 | For obtaining the methods, devices and systems of information |
CN109064197A (en) * | 2018-08-06 | 2018-12-21 | 佛山市苔藓云链科技有限公司 | A kind of supply chain opening registration and Verification System and method based on block chain |
CN109087413A (en) * | 2018-06-11 | 2018-12-25 | 北京溯安链科技有限公司 | Intelligent processing method, smart lock, system, equipment and medium based on block chain |
CN109102308A (en) * | 2018-09-05 | 2018-12-28 | 深圳正品创想科技有限公司 | Merchandise news maintaining method, block chain node and its system based on block chain |
CN109146528A (en) * | 2018-09-05 | 2019-01-04 | 郑州信大壹密科技有限公司 | Antiforge method for commodities and system based on block chain |
CN109191149A (en) * | 2018-08-22 | 2019-01-11 | 合肥高科创新科技有限公司 | A kind of commodity digital identity generation method based on block chain |
CN109272317A (en) * | 2018-09-27 | 2019-01-25 | 北京金山安全软件有限公司 | Block chain private key obtaining method and device and electronic equipment |
CN109274640A (en) * | 2018-06-07 | 2019-01-25 | 艾维克科技股份有限公司 | Decentralized software information establishing system and method |
CN109508998A (en) * | 2017-09-11 | 2019-03-22 | 中兴通讯股份有限公司 | A kind of tobacco based on block chain is traced to the source method for anti-counterfeit and system |
CN109523277A (en) * | 2018-11-20 | 2019-03-26 | 王建新 | Product false proof electronic tag authentication method and system |
CN109544182A (en) * | 2018-11-20 | 2019-03-29 | 孟凡富 | Product false proof verification method and system |
CN109544160A (en) * | 2018-11-20 | 2019-03-29 | 杭州呯嘭智能技术有限公司 | A kind of transaction authenticity verification methods and system based on block chain and intelligent contract |
CN109583820A (en) * | 2018-12-19 | 2019-04-05 | 东莞市盟大塑化科技有限公司 | A kind of freight tracking method based on block chain technology |
CN109687958A (en) * | 2018-12-28 | 2019-04-26 | 全链通有限公司 | A kind of design of art work certificate and verification method based on fidelity block chain |
CN109886685A (en) * | 2019-02-28 | 2019-06-14 | 易齐盈(重庆)电子商务有限公司 | A kind of commodity tracing system and method based on block chain |
CN109951427A (en) * | 2017-12-21 | 2019-06-28 | 航天信息股份有限公司 | A kind of product traceability method and system, cloud are traced to the source platform |
CN109949050A (en) * | 2019-03-12 | 2019-06-28 | 翟红鹰 | Blockchain-based product identification and analysis method, terminal equipment and storage medium |
CN109977274A (en) * | 2019-03-31 | 2019-07-05 | 杭州复杂美科技有限公司 | A kind of data query and verification method, system, equipment and storage medium |
WO2019161774A1 (en) * | 2018-02-24 | 2019-08-29 | Weiqian Information Technology (Shanghai) Ltd., Co. | Methods, application server, block chain node and media for logistics tracking and source tracing |
WO2019192072A1 (en) * | 2018-04-03 | 2019-10-10 | 东莞市天眼网络科技有限公司 | Blockchain-based merchandise anti-counterfeiting system, and method for checking authenticity of merchandise |
CN110458670A (en) * | 2019-08-16 | 2019-11-15 | 弦子科技(北京)有限公司 | A kind of commodity digital voucher processing method and device |
CN110493039A (en) * | 2018-08-06 | 2019-11-22 | 腾讯科技(深圳)有限公司 | Device management method and equipment management system based on block chain |
CN110535819A (en) * | 2018-10-22 | 2019-12-03 | 朱胜 | A kind of application method of asymmetric encryption techniques on block chain is anti-fake |
CN110633922A (en) * | 2018-05-31 | 2019-12-31 | 北京京东尚科信息技术有限公司 | Information verification method and system |
CN110728511A (en) * | 2018-06-28 | 2020-01-24 | 厦门本能管家科技有限公司 | Commodity transaction method and system based on block chain |
CN110765146A (en) * | 2019-10-21 | 2020-02-07 | 深圳市炳德区块链技术有限公司 | Block chain-based merchant credit value method, device, node and storage medium thereof |
CN110826087A (en) * | 2019-11-01 | 2020-02-21 | 腾讯科技(深圳)有限公司 | Block chain-based decoration material management method, device, terminal and medium |
CN110889477A (en) * | 2018-08-15 | 2020-03-17 | 齐爱民 | Commodity anti-counterfeiting code generation method based on block chain |
CN111179014A (en) * | 2018-11-09 | 2020-05-19 | 霍尼韦尔国际公司 | System and method for securely creating a listing of devices on a device online marketplace platform |
CN111242644A (en) * | 2020-01-16 | 2020-06-05 | 王李琰 | A method, system and platform for commodity anti-counterfeiting and circulation management based on blockchain |
CN111339203A (en) * | 2020-02-28 | 2020-06-26 | 北京金和网络股份有限公司 | Block chain data acquisition method, device and system |
CN111373430A (en) * | 2017-10-24 | 2020-07-03 | 大羚羊区块链金融科技股份有限公司 | Block chain based electronic transaction system and method for sales removal platform |
CN111626389A (en) * | 2020-05-26 | 2020-09-04 | 郭致平 | Two-dimensional code-based instant check type checkout code system and use method thereof |
CN112292716A (en) * | 2018-06-24 | 2021-01-29 | 工业365公司 (有限责任) | Method for verifying the authenticity of a product and printed image |
CN112288442A (en) * | 2020-10-15 | 2021-01-29 | 江苏图码信息科技有限公司 | Associated customized image code anti-counterfeiting tracing system and application component |
CN111932285B (en) * | 2020-09-28 | 2021-02-09 | 四川省数字证书认证管理中心有限公司 | Anti-counterfeiting verification method based on digital signature technology |
CN109905351B (en) * | 2017-12-08 | 2021-02-26 | 北京京东尚科信息技术有限公司 | Method, device, server and computer readable storage medium for storing data |
CN112523612A (en) * | 2020-11-24 | 2021-03-19 | 苏州良驱劣区块链科技有限公司 | Anti-fake intelligence lock based on block chain |
CN112561516A (en) * | 2020-11-20 | 2021-03-26 | 优思物联科技(深圳)有限公司 | Method and system for realizing commodity code scanning payment service based on two-dimensional code |
CN112689979A (en) * | 2018-09-18 | 2021-04-20 | 王健 | Article identity management method, terminal, micro-processing unit, identification equipment and system |
CN107679877B (en) * | 2017-10-18 | 2021-04-30 | 上海唯链信息科技有限公司 | Cosmetic anti-counterfeiting and tracing system based on block chain technology |
CN112865972A (en) * | 2021-03-31 | 2021-05-28 | 深圳市巽震科技孵化器有限公司 | Initialization method, device and system based on digital certificate platform and storage device |
CN113037738A (en) * | 2017-05-16 | 2021-06-25 | 江峰 | Virtual account block chain verification system with external fixed physical node |
CN114548331A (en) * | 2020-11-18 | 2022-05-27 | 鲍勃斯脱梅克斯股份有限公司 | Method for providing authenticity information |
CN115018432A (en) * | 2022-08-09 | 2022-09-06 | 库蜂成都科技有限公司 | Method, device, medium and equipment for generating cargo serial number |
CN115660395A (en) * | 2022-11-02 | 2023-01-31 | 江苏理工学院 | Product anti-counterfeiting method based on artificial intelligence |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102129589A (en) * | 2011-02-10 | 2011-07-20 | 谢仁康 | Asymmetric encryption two-dimension code anti-counterfeiting method |
CN102799990A (en) * | 2012-06-19 | 2012-11-28 | 袁开国 | Double-two-dimensional product anti-counterfeiting scheme based on PKI (Public Key Infrastructure) |
CN103020684A (en) * | 2012-12-07 | 2013-04-03 | 北京印刷学院 | Anti-counterfeiting device, anti-counterfeiting recognition device and system for commodity packaging |
CN104767615A (en) * | 2015-03-02 | 2015-07-08 | 苏盛辉 | Commodity anti-counterfeiting method based on asymmetric identity |
CN105469132A (en) * | 2016-01-13 | 2016-04-06 | 上海众烁信息科技有限公司 | Duplicate coding internet of things traceability security label and 2-dimensional bar code security traceability method |
US20160306982A1 (en) * | 2015-04-14 | 2016-10-20 | Manifold Technology, Inc. | System and method for providing a cryptographic platform for exchanging information |
-
2016
- 2016-10-27 CN CN201610970477.1A patent/CN106570710A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102129589A (en) * | 2011-02-10 | 2011-07-20 | 谢仁康 | Asymmetric encryption two-dimension code anti-counterfeiting method |
CN102799990A (en) * | 2012-06-19 | 2012-11-28 | 袁开国 | Double-two-dimensional product anti-counterfeiting scheme based on PKI (Public Key Infrastructure) |
CN103020684A (en) * | 2012-12-07 | 2013-04-03 | 北京印刷学院 | Anti-counterfeiting device, anti-counterfeiting recognition device and system for commodity packaging |
CN104767615A (en) * | 2015-03-02 | 2015-07-08 | 苏盛辉 | Commodity anti-counterfeiting method based on asymmetric identity |
US20160306982A1 (en) * | 2015-04-14 | 2016-10-20 | Manifold Technology, Inc. | System and method for providing a cryptographic platform for exchanging information |
CN105469132A (en) * | 2016-01-13 | 2016-04-06 | 上海众烁信息科技有限公司 | Duplicate coding internet of things traceability security label and 2-dimensional bar code security traceability method |
Cited By (93)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108141436A (en) * | 2015-07-10 | 2018-06-08 | 因特鲁斯特公司 | Constrained devices are registered |
CN107169776A (en) * | 2017-05-10 | 2017-09-15 | 无锡井通网络科技有限公司 | Product certification method for anti-counterfeit based on block chain technology |
CN107292629A (en) * | 2017-05-12 | 2017-10-24 | 深圳蜂链科技有限公司 | Anti-counterfeit tracking verification method based on block chain and the device using this method |
CN113037738A (en) * | 2017-05-16 | 2021-06-25 | 江峰 | Virtual account block chain verification system with external fixed physical node |
CN107220837A (en) * | 2017-05-31 | 2017-09-29 | 北京汇通金财信息科技有限公司 | A kind of destination object source tracing method and device |
CN107491946A (en) * | 2017-07-10 | 2017-12-19 | 北京云知科技有限公司 | It is a kind of to store virtual objects to the method, apparatus of block chain and electronic equipment |
CN107341676A (en) * | 2017-07-17 | 2017-11-10 | 深圳天净喔溯源科技有限公司 | False proof mark and the method for tracing to the source |
CN107481022A (en) * | 2017-08-21 | 2017-12-15 | 合肥蓝胖子科技有限公司 | Commodity cloud Antiforge system method based on mobile Internet |
CN109508998A (en) * | 2017-09-11 | 2019-03-22 | 中兴通讯股份有限公司 | A kind of tobacco based on block chain is traced to the source method for anti-counterfeit and system |
CN107786546A (en) * | 2017-09-30 | 2018-03-09 | 电子科技大学 | A kind of red wine anti-fake traceability system based on privately owned chain |
CN107705134A (en) * | 2017-10-11 | 2018-02-16 | 重庆印链科技有限公司 | Anti-fake network system based on block chain |
CN107730279A (en) * | 2017-10-18 | 2018-02-23 | 上海唯链信息科技有限公司 | A kind of original factory of vehicle based on block chain technology dispatches from the factory false proof and traceability system |
CN107730278A (en) * | 2017-10-18 | 2018-02-23 | 上海唯链信息科技有限公司 | A kind of false proof and retroactive method of the medicine based on block chain technology |
CN107679877B (en) * | 2017-10-18 | 2021-04-30 | 上海唯链信息科技有限公司 | Cosmetic anti-counterfeiting and tracing system based on block chain technology |
CN107679876A (en) * | 2017-10-18 | 2018-02-09 | 上海唯链信息科技有限公司 | A kind of medicine equipment based on block chain technology is false proof and traceability system |
CN107633414A (en) * | 2017-10-18 | 2018-01-26 | 上海唯链信息科技有限公司 | A kind of case and bag based on block chain technology are false proof and traceability system |
CN107730279B (en) * | 2017-10-18 | 2021-07-16 | 上海唯链信息科技有限公司 | Automobile original factory anti-counterfeiting and tracing system based on block chain technology |
CN111373430A (en) * | 2017-10-24 | 2020-07-03 | 大羚羊区块链金融科技股份有限公司 | Block chain based electronic transaction system and method for sales removal platform |
CN107748994A (en) * | 2017-10-31 | 2018-03-02 | 杭州趣链科技有限公司 | A kind of anti-fake traceability system based on block chain |
CN108055125B (en) * | 2017-11-23 | 2020-06-30 | 阿里巴巴集团控股有限公司 | Method and device for encrypting and decrypting product information |
US10778427B2 (en) | 2017-11-23 | 2020-09-15 | Alibaba Group Holding Limited | Method and apparatus for encrypting and decrypting product information |
TWI712916B (en) * | 2017-11-23 | 2020-12-11 | 開曼群島商創新先進技術有限公司 | Encryption and decryption method and device for product information and its electronic equipment and computer readable storage medium |
CN108055125A (en) * | 2017-11-23 | 2018-05-18 | 阿里巴巴集团控股有限公司 | A kind of encryption and decryption method and device of product information |
CN109905351B (en) * | 2017-12-08 | 2021-02-26 | 北京京东尚科信息技术有限公司 | Method, device, server and computer readable storage medium for storing data |
CN109951427A (en) * | 2017-12-21 | 2019-06-28 | 航天信息股份有限公司 | A kind of product traceability method and system, cloud are traced to the source platform |
CN108009778B (en) * | 2017-12-25 | 2022-01-04 | 南京思利华信息科技有限公司 | Supply chain management method |
CN108009778A (en) * | 2017-12-25 | 2018-05-08 | 南京思利华信息科技有限公司 | A kind of supply chain management method |
CN107944894A (en) * | 2017-12-27 | 2018-04-20 | 上海唯链信息科技有限公司 | A kind of Retail commodity method for tracing based on block chain technology |
CN108197957A (en) * | 2018-01-12 | 2018-06-22 | 北京欧链科技有限公司 | A kind of method for anti-counterfeit and system based on block chain |
CN108537047A (en) * | 2018-02-09 | 2018-09-14 | 北京京东尚科信息技术有限公司 | The method and device of information is generated based on block chain |
WO2019161774A1 (en) * | 2018-02-24 | 2019-08-29 | Weiqian Information Technology (Shanghai) Ltd., Co. | Methods, application server, block chain node and media for logistics tracking and source tracing |
CN110197346A (en) * | 2018-02-24 | 2019-09-03 | 巍乾全球技术有限责任公司 | Logistic track and the method traced to the source, application server, block chain node and medium |
CN110197346B (en) * | 2018-02-24 | 2024-12-10 | 巍乾全球技术有限责任公司 | Logistics tracking and tracing method, application server, blockchain node and medium |
CN108681904A (en) * | 2018-04-01 | 2018-10-19 | 蒋欣言 | A kind of fake certification implementation method of bottled formula commodity |
WO2019192072A1 (en) * | 2018-04-03 | 2019-10-10 | 东莞市天眼网络科技有限公司 | Blockchain-based merchandise anti-counterfeiting system, and method for checking authenticity of merchandise |
CN108564182B (en) * | 2018-04-16 | 2021-10-08 | 安徽中科智链信息科技有限公司 | Equipment full life cycle management system and method based on block chain technology |
CN108564182A (en) * | 2018-04-16 | 2018-09-21 | 安徽中科智链信息科技有限公司 | A kind of life period of an equipment management system and method based on block chain technology |
CN108734480A (en) * | 2018-05-22 | 2018-11-02 | 四川海纳仁东科技有限公司 | Red wine scarcity method of proof based on block chain |
CN108694594A (en) * | 2018-05-29 | 2018-10-23 | 阿里巴巴集团控股有限公司 | Commodity source tracing method and device, electronic equipment based on block chain |
CN108876403A (en) * | 2018-05-31 | 2018-11-23 | 北京京东尚科信息技术有限公司 | For obtaining the methods, devices and systems of information |
CN110633922B (en) * | 2018-05-31 | 2023-11-07 | 北京京东尚科信息技术有限公司 | Information verification method and system |
CN110633922A (en) * | 2018-05-31 | 2019-12-31 | 北京京东尚科信息技术有限公司 | Information verification method and system |
CN109274640A (en) * | 2018-06-07 | 2019-01-25 | 艾维克科技股份有限公司 | Decentralized software information establishing system and method |
CN108712263A (en) * | 2018-06-11 | 2018-10-26 | 北京京东尚科信息技术有限公司 | Information Authentication method, apparatus, system and computer readable storage medium |
CN109087413A (en) * | 2018-06-11 | 2018-12-25 | 北京溯安链科技有限公司 | Intelligent processing method, smart lock, system, equipment and medium based on block chain |
CN112292716A (en) * | 2018-06-24 | 2021-01-29 | 工业365公司 (有限责任) | Method for verifying the authenticity of a product and printed image |
CN110728511B (en) * | 2018-06-28 | 2022-08-09 | 本无链科技(深圳)有限公司 | Commodity transaction method and system based on block chain |
CN110728511A (en) * | 2018-06-28 | 2020-01-24 | 厦门本能管家科技有限公司 | Commodity transaction method and system based on block chain |
CN108881253A (en) * | 2018-06-29 | 2018-11-23 | 全链通有限公司 | Block chain real name participatory approaches and system |
CN108881253B (en) * | 2018-06-29 | 2020-11-06 | 全链通有限公司 | Block chain real name participation method and system |
CN110493039A (en) * | 2018-08-06 | 2019-11-22 | 腾讯科技(深圳)有限公司 | Device management method and equipment management system based on block chain |
CN109064197A (en) * | 2018-08-06 | 2018-12-21 | 佛山市苔藓云链科技有限公司 | A kind of supply chain opening registration and Verification System and method based on block chain |
CN110889477A (en) * | 2018-08-15 | 2020-03-17 | 齐爱民 | Commodity anti-counterfeiting code generation method based on block chain |
CN109191149A (en) * | 2018-08-22 | 2019-01-11 | 合肥高科创新科技有限公司 | A kind of commodity digital identity generation method based on block chain |
CN109191149B (en) * | 2018-08-22 | 2022-02-22 | 合肥高科创新科技有限公司 | Commodity digital identity generation method based on block chain |
CN109102308A (en) * | 2018-09-05 | 2018-12-28 | 深圳正品创想科技有限公司 | Merchandise news maintaining method, block chain node and its system based on block chain |
CN109146528A (en) * | 2018-09-05 | 2019-01-04 | 郑州信大壹密科技有限公司 | Antiforge method for commodities and system based on block chain |
CN112689979B (en) * | 2018-09-18 | 2023-11-24 | 王健 | Article identity management method, terminal, microprocessor unit, identification device and system |
CN112689979A (en) * | 2018-09-18 | 2021-04-20 | 王健 | Article identity management method, terminal, micro-processing unit, identification equipment and system |
CN109272317A (en) * | 2018-09-27 | 2019-01-25 | 北京金山安全软件有限公司 | Block chain private key obtaining method and device and electronic equipment |
CN110535819A (en) * | 2018-10-22 | 2019-12-03 | 朱胜 | A kind of application method of asymmetric encryption techniques on block chain is anti-fake |
CN111179014B (en) * | 2018-11-09 | 2025-02-18 | 霍尼韦尔国际公司 | System and method for securely creating a listing of a device on an online device marketplace platform |
CN111179014A (en) * | 2018-11-09 | 2020-05-19 | 霍尼韦尔国际公司 | System and method for securely creating a listing of devices on a device online marketplace platform |
CN109523277A (en) * | 2018-11-20 | 2019-03-26 | 王建新 | Product false proof electronic tag authentication method and system |
CN109544182A (en) * | 2018-11-20 | 2019-03-29 | 孟凡富 | Product false proof verification method and system |
CN109523277B (en) * | 2018-11-20 | 2021-05-25 | 王建新 | Product anti-counterfeiting electronic tag authentication method and system |
CN109544182B (en) * | 2018-11-20 | 2021-05-14 | 孟凡富 | Product anti-counterfeiting verification method and system |
CN109544160A (en) * | 2018-11-20 | 2019-03-29 | 杭州呯嘭智能技术有限公司 | A kind of transaction authenticity verification methods and system based on block chain and intelligent contract |
CN109583820A (en) * | 2018-12-19 | 2019-04-05 | 东莞市盟大塑化科技有限公司 | A kind of freight tracking method based on block chain technology |
CN109583820B (en) * | 2018-12-19 | 2021-04-20 | 东莞市盟大塑化科技有限公司 | Cargo tracking method based on block chain technology |
CN109687958A (en) * | 2018-12-28 | 2019-04-26 | 全链通有限公司 | A kind of design of art work certificate and verification method based on fidelity block chain |
CN109886685A (en) * | 2019-02-28 | 2019-06-14 | 易齐盈(重庆)电子商务有限公司 | A kind of commodity tracing system and method based on block chain |
CN109949050A (en) * | 2019-03-12 | 2019-06-28 | 翟红鹰 | Blockchain-based product identification and analysis method, terminal equipment and storage medium |
CN109949050B (en) * | 2019-03-12 | 2022-07-15 | 广东恒立信息科技有限公司 | Block chain-based product identification analysis method, terminal device and storage medium |
CN109977274A (en) * | 2019-03-31 | 2019-07-05 | 杭州复杂美科技有限公司 | A kind of data query and verification method, system, equipment and storage medium |
CN110458670A (en) * | 2019-08-16 | 2019-11-15 | 弦子科技(北京)有限公司 | A kind of commodity digital voucher processing method and device |
CN110765146A (en) * | 2019-10-21 | 2020-02-07 | 深圳市炳德区块链技术有限公司 | Block chain-based merchant credit value method, device, node and storage medium thereof |
CN110826087B (en) * | 2019-11-01 | 2023-07-25 | 腾讯科技(深圳)有限公司 | Decoration material management method, device, terminal and medium based on block chain |
CN110826087A (en) * | 2019-11-01 | 2020-02-21 | 腾讯科技(深圳)有限公司 | Block chain-based decoration material management method, device, terminal and medium |
CN111242644A (en) * | 2020-01-16 | 2020-06-05 | 王李琰 | A method, system and platform for commodity anti-counterfeiting and circulation management based on blockchain |
CN111339203A (en) * | 2020-02-28 | 2020-06-26 | 北京金和网络股份有限公司 | Block chain data acquisition method, device and system |
CN111626389A (en) * | 2020-05-26 | 2020-09-04 | 郭致平 | Two-dimensional code-based instant check type checkout code system and use method thereof |
CN111932285B (en) * | 2020-09-28 | 2021-02-09 | 四川省数字证书认证管理中心有限公司 | Anti-counterfeiting verification method based on digital signature technology |
WO2022077135A1 (en) * | 2020-10-15 | 2022-04-21 | 江苏图码信息科技有限公司 | Anti-counterfeiting tracing system and application component for associated customized graphic code |
CN112288442A (en) * | 2020-10-15 | 2021-01-29 | 江苏图码信息科技有限公司 | Associated customized image code anti-counterfeiting tracing system and application component |
CN114548331A (en) * | 2020-11-18 | 2022-05-27 | 鲍勃斯脱梅克斯股份有限公司 | Method for providing authenticity information |
CN112561516A (en) * | 2020-11-20 | 2021-03-26 | 优思物联科技(深圳)有限公司 | Method and system for realizing commodity code scanning payment service based on two-dimensional code |
CN112523612A (en) * | 2020-11-24 | 2021-03-19 | 苏州良驱劣区块链科技有限公司 | Anti-fake intelligence lock based on block chain |
CN112865972B (en) * | 2021-03-31 | 2023-03-14 | 深圳市巽震科技孵化器有限公司 | Initialization method, device and system based on digital certificate platform and storage device |
CN112865972A (en) * | 2021-03-31 | 2021-05-28 | 深圳市巽震科技孵化器有限公司 | Initialization method, device and system based on digital certificate platform and storage device |
CN115018432A (en) * | 2022-08-09 | 2022-09-06 | 库蜂成都科技有限公司 | Method, device, medium and equipment for generating cargo serial number |
CN115660395B (en) * | 2022-11-02 | 2023-05-30 | 江苏理工学院 | Product anti-counterfeiting method based on artificial intelligence |
CN115660395A (en) * | 2022-11-02 | 2023-01-31 | 江苏理工学院 | Product anti-counterfeiting method based on artificial intelligence |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106570710A (en) | Commodity anti-counterfeiting method and device | |
US20230214792A1 (en) | Computer implemented systems and methods | |
Toyoda et al. | A novel blockchain-based product ownership management system (POMS) for anti-counterfeits in the post supply chain | |
US20200043001A1 (en) | Pet Food Traceability System and Method Therefor | |
US20200065761A1 (en) | System and method for provision of supply chain financing of ethically verified product where there has been verification of production processes and products inspection using blockchain smart contracts | |
CN104268758B (en) | A kind of Comodity anti-fake system based on invoice and third-party E-commerce platform | |
KR20220113307A (en) | System to provide genuinity verification and ownership change records of product esset by using a blockchain and a genuine authentiation tag technologies | |
Wang et al. | Auditable protocols for fair payment and physical asset delivery based on smart contracts | |
US20140164251A1 (en) | User generated autonomous digital token system | |
US20090167489A1 (en) | Anti-forgery method and apparatus based on cpk electronic tag | |
CN107180350A (en) | A kind of method of the multi-party shared transaction metadata based on block chain, apparatus and system | |
CN107423980A (en) | Data trade reference platform and method in a kind of supply chain | |
CN106209877A (en) | A kind of be certification core with block chain backstage false-proof authentication system | |
JP2016512675A (en) | Secure trading system and method | |
CN104574092A (en) | Commodity anti-counterfeiting system based on invoice and commodity stocks accounting and anti-counterfeiting method | |
CN108011709A (en) | A kind of data trade method based on block chain | |
CN112435128B (en) | Supply chain tracing system based on multi-level block chain technology | |
CN112100667B (en) | Charity organization supervision and management method based on novel block chain structure | |
CN112767091A (en) | Method, device and medium for processing supervisable bid and privacy based on block chain | |
CN109835084B (en) | Application of novel anti-counterfeiting material in anti-counterfeiting payment, currency anti-counterfeiting, bank card and the like | |
Lam et al. | Textile and apparel supply chain with distributed ledger technology (DLT) | |
CN113597330B (en) | Entertainment card with electronic authentication device | |
CN114124428B (en) | Block chain-based access method and device for Internet of things equipment | |
CN110310130B (en) | A kind of anti-counterfeiting method and system | |
CN104182866A (en) | Product or object anti-counterfeiting system and method suitable for situations, such as switch transaction and the like |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170419 |
|
RJ01 | Rejection of invention patent application after publication |