[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN107341676A - False proof mark and the method for tracing to the source - Google Patents

False proof mark and the method for tracing to the source Download PDF

Info

Publication number
CN107341676A
CN107341676A CN201710582450.XA CN201710582450A CN107341676A CN 107341676 A CN107341676 A CN 107341676A CN 201710582450 A CN201710582450 A CN 201710582450A CN 107341676 A CN107341676 A CN 107341676A
Authority
CN
China
Prior art keywords
false proof
source
commodity
key
service provider
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710582450.XA
Other languages
Chinese (zh)
Inventor
李勇
谈宇清
谢庆芬
傅邦宁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Tian Jing Yuan Yuan Technology Co Ltd
Original Assignee
Shenzhen Tian Jing Yuan Yuan Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Tian Jing Yuan Yuan Technology Co Ltd filed Critical Shenzhen Tian Jing Yuan Yuan Technology Co Ltd
Priority to CN201710582450.XA priority Critical patent/CN107341676A/en
Publication of CN107341676A publication Critical patent/CN107341676A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • G06Q30/0185Product, service or business identity fraud
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
    • G06K17/0022Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisions for transferring data to distant stations, e.g. from a sensing device
    • G06K17/0025Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisions for transferring data to distant stations, e.g. from a sensing device the arrangement consisting of a wireless interrogation device in combination with a device for optically marking the record carrier
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/06009Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
    • G06K19/06046Constructional details
    • GPHYSICS
    • G09EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
    • G09FDISPLAYING; ADVERTISING; SIGNS; LABELS OR NAME-PLATES; SEALS
    • G09F3/00Labels, tag tickets, or similar identification or indication means; Seals; Postage or like stamps
    • G09F3/02Forms or constructions
    • G09F3/0297Forms or constructions including a machine-readable marking, e.g. a bar code
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0863Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Development Economics (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Accounting & Taxation (AREA)
  • Signal Processing (AREA)
  • Economics (AREA)
  • Finance (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention relates to a kind of false proof trace to the source mark and method, including manufacturer to apply for encryption key to the false proof service provider that traces to the source;Unique identification information is generated for each product of oneself, calculating then, which is encrypted, using encryption key generates false proof ciphertext;By the use of the encryption key as anti-fake code coding on packing box;Again false proof ciphertext coding on product in packing box;The false proof key traced to the source service provider while generate decryption, and encrypt keeping person's inquiry to be consumed;Consumer applies for the key of decryption to the false proof service provider that traces to the source, and decrypts the false proof ciphertext, obtains the unique identification information of product.The present invention makes full use of smart mobile phone, mobile Internet and block chain technology, double anti-forge is carried out by the anti-fake code on commodity and its outer packing, corresponding relation based on original packaging is encrypted, it is easy to quickly check falsfication, and comprehensive merchandise related information is obtained, it is finally reached the target of the production and the circulation that prevent fake and forged class commodity.

Description

False proof mark and the method for tracing to the source
Technical field
The present invention relates to commodity trace to the source and anti-counterfeiting technology, more particularly to a kind of false proof trace to the source mark and method, specifically Say, the present invention relates to provide encryption key, the offline security product characteristic information of manufacturer, final consumption by the false proof service provider that traces to the source Person, which decrypts, to be compared, and is traced to the source and false proof mark and method with realizing.
Background technology
In dispatching from the factory with sales process for commodity, anti-counterfeiting design, especially high-quality and famous-brand product or food are be unable to do without, is disappeared Expense person requires reliably to trace to the source and false proof guarantee.In the Internet of things era, consumer's also further requirement is especially eaten to commodity The relevant informations such as the production and transport of product possess right to know.In the prior art in the anti-counterfeit package design of commodity, not only in product There are trade mark, various words and antifalsification label in outer box, also tend to be designed with various marks in itself in product.Such as in the market is sold The egg sold, being carried except there is the information such as manufacturer, product brand on packing box, on each egg includes trade mark and production The coding of trade name.Because the egg under organic free-ranging mode is compared with common cage egg, profile is similar but with higher Price, counterfeit protection measures of the prior art are difficult to prevent illegal retailer from falsely using Anti-fake external package and commodity coding, with common cage Poultry egg pretends to be organic free-ranging egg of high added value, adulterates, mixes the spurious with the genuine.
The coding on the shell of commodity before existing commodity sign method is mainly dispatched from the factory.The content of coding can be figure With word addend combinatorics on words.Manufacturer attempts to improve counterfeit difficulty by the particularity of coding combination, and terminal is consumed Person is mainly compared by naked eyes to discern the false from the genuine.Ye You companies release cell phone application, utilize the spray on camera items scanning shell Code character is closed, and the true and false of security code is judged by smart mobile phone APP image recognition technology.
Such as:East Sea herding egg production cooperative society of Xiao Tang townshiies of Xiangshan County of Zhejiang Province uses food-grade prepared Chinese ink in the chicken of product Trade mark, the name of an article and product batch number are uniformly stamped on egg, is tracked management to product quality while realizing false proof.
Shenzhen is shaken the commodity code-spraying equipment of wild commodity smart machine limited company exploitation, and trade mark can be sprayed on egg Pattern and for distinguishing the source of egg and the character recognition code of date of manufacture.It is well known that the commodity that consumer is concerned about Relevant information is difficult all to identify on commodity and its packing box.
Existing commodity sign method, by increasing counterfeit difficulty and counterfeit cost, it is difficult to thoroughly prevent counterfeit and personation Behavior, compromise the interests of consumer and brand article manufacturer.So we need new preferably trace to the source and method for anti-counterfeit.
The content of the invention
False proof trace to the source mark and method proposed by the present invention, make full use of smart mobile phone, mobile Internet and block chain skill Art, double anti-forge is carried out by the labeling on commodity and its outer packing and/or coding character, to knowing another characteristic letter for commodity Cease and its between particular envelope coding, the corresponding relation based on original packaging is encrypted (i.e. can not again more after commodity mounted box Transducer package box).The checking work of the present invention consumer of and can simplification simultaneously, is easy to quickly check falsfication, and obtain comprehensive business Product relevant information, it is finally reached the target of the production and the circulation that prevent fake and forged class commodity.
The false proof mark of tracing to the source of one kind disclosed by the invention, including commodity can be attached to and/or be attached to the commodity False proof ciphertext and anti-fake code on packing box;The false proof ciphertext is that calculating is encrypted as key by the anti-fake code Gained afterwards;The false proof ciphertext includes the characteristic information of the commodity;When the false proof ciphertext is decrypted, you can judge the commodity The true and false and/or obtain the information of tracing to the source of the commodity.
The described false proof ciphertext includes the characteristic information of the commodity, including following one or more than one kinds of group Close:The natural bion feature of the commodity, the color of the commodity, resemblance, the random labelling artificially assigned, with the business The real scene shooting picture or video that condition closes.
Described anti-fake code is rivest, shamir, adelman as the algorithm that calculating is encrypted in key, described false proof volume A part for code or the anti-fake code is public key, and corresponding private key can only pass through acquisition request by consumer.
Described false proof ciphertext and anti-fake code and mutual corresponding relation, it is offline after being also encrypted to preserve.
A kind of false proof source tracing method disclosed by the invention, comprises the following steps:
Manufacturer applies for the key i.e. public key of more than one encryption to the false proof service provider that traces to the source;The false proof service of tracing to the source The key that business generates more than one corresponding decryption simultaneously is private key, and encrypts keeping person's inquiry to be consumed;
The manufacturer generates unique identification information for each product of oneself, is then public affairs using an encryption key Key generates false proof ciphertext after the unique identification information being encrypted calculating;Each product in same packing box is using same Individual encryption key is public key to generate false proof ciphertext;
The manufacturer by the use of the encryption key be public key as a part for anti-fake code or anti-fake code and By the anti-fake code coding on packing box;The false proof ciphertext coding on the corresponding product in the packing box or is adhered to In the inside of the packing box and indicate the corresponding relation with the product of the package interior;
Consumer applies for the key i.e. private key of decryption to the false proof service provider that traces to the source, and uses the close of the decryption Key is private key to decrypt the false proof ciphertext, the unique identification information of the acquisition each product.
In an embodiment of the present invention, also comprise the following steps:Manufacturer registers at the false proof service provider that traces to the source, and obtains Obtain manufacturer's coding;And/or code-spraying equipment is registered by the false proof service provider that traces to the source, distribution code-spraying equipment coding.
Or also comprise the following steps in an embodiment of the present invention:The manufacturer is to the false proof service provider that traces to the source There is provided one or more than one kinds of in the following information for the key i.e. batch products of public key for having used the encryption Combination:Quantity, specification, technical parameter and the time of making the product of product;Then the false proof service provider that traces to the source is close by the encryption of granting Key is that the related endowed information of public key is issued in block chain for inquiry;The decryption corresponding with the anti-fake code of activation simultaneously is close The application of key and private key.
Described consumer to it is described it is false proof trace to the source service provider application decryption key i.e. private key when, first send the bag Anti-fake code in mounted box gives the false proof service provider that traces to the source;And the false proof service provider that traces to the source successfully is providing the close of decryption After key is private key, then destroy corresponding to private key;Or by the Status Change of the commodity corresponding to the packing box it is " consumption ".
Also comprise the following steps in an embodiment of the present invention:Anyone of commodity circulation links can be by the anti-fake code The barcode scanning time, positional information is published in block chain;The information that consumer and dealer can be inquired about in block chain.
The false proof source tracing method of the present invention, product packing box are minimum commodity circulation unit, be recorded its dispatch from the factory, In circulation and the state occupied to consumer.
False proof trace to the source mark and the method for the present invention, antifalsification label (such as Quick Response Code) and packing box in commodity outer packing In each commodity feature identification information between there is the corresponding relation that can not change, and this feature information is encrypted, Du The fraud of intermediate links absolutely, the quality of commodity is ensure that, reduce food safety risk.The feature recognition letter of each specific commodity Breath (being typically natural bion feature or the random labelling artificially assigned) by preserving offline after encryption, nothing Method is obtained privately by third party, and by mobile terminal devices such as smart mobile phones, consumer readily identifies the true and false of commodity, and obtains The comprehensively relevant information of production and intermediate links is obtained, and there can only be a ultimate consumer to obtain decryption with private key to solve Ciphertext is read, so as to the feature identification information of the quick obtaining commodity, is finally reached the production for preventing fake and forged class commodity and stream Logical target.The solicited message that consumer uploads is collected by the false proof service provider that traces to the source, and can recognize commodity circulation and consumption whereby Relevant information.
Brief description of the drawings
Fig. 1 is the workflow diagram of the false proof service provider that traces to the source in one embodiment of the invention.
Fig. 2 is the false proof flow chart of tracing to the source of the manufacturer of one embodiment of the invention.
Fig. 3 is that the consumer of one embodiment of the invention traces to the source flow chart.
Fig. 4 is the false proof flow chart of tracing to the source of the application program of one embodiment of the invention.
Fig. 5 is the code-spraying equipment workflow diagram of one embodiment of the invention.
Fig. 6 is dealer's workflow diagram of one embodiment of the invention.
Fig. 7 is the block chain workflow diagram of one embodiment of the invention.
Embodiment
The present invention will be further described in detail with specific embodiment below in conjunction with the accompanying drawings.
The false proof service provider that traces to the source is authenticated and registered to code-spraying equipment and commodity production business, and is respectively that they divide With unique coding, such as code-spraying equipment A, commodity production business B.By taking the processing of egg product purged and packed as an example, by egg product manufacturer's Own information system compiles a feature identification information to each egg.This feature identification information can be by above-mentioned A, B and date of manufacture The composition such as information plus random number, flowing water value and check field, realizes one yard of an egg for each commodity (i.e.:Each commodity has Unique identification information concentrates the feature identification information of the product, abbreviation X).
Unique identification information X can include the check field of itself a variety of verification scheme.Including but not limited to:
1st, the color verification of coding character.Shower nozzle can set a variety of coding colors, such as green, black and blueness.Often Kind color sets a color coding, and writes in X field;
2nd, a check bit is added in X last position.For example, if some digits divided by 7 since the date, obtain Remainder as check bit, be added in X last position, etc.;
3rd, commodity packaging system is weighed to each commodity automatically, takes first three digit (such as 43.21 of the commodity weight Gram, value 432) as in weight check field write-in X;
4th, the random three-figure plain code numeral of spray one on commodity, and be recorded in X.
In commodity packaging, apply for that the Quick Response Code on the packing box identifies ID (having uniqueness) to the false proof service provider that traces to the source Afterwards, by the use of Quick Response Code ID values as public key, the feature identification information X of the commodity loaded to each plan in the packing box is carried out Encryption, obtains character string Y.Then character string Y is handled through code-spraying equipment, is automatically converted into bar code pattern, be sprayed on correspondingly Commodity on.The false proof service provider that traces to the source can also automatically generate a private key while each packing box Quick Response Code ID is generated. The latter is stored on the privately owned server of the false proof service provider that traces to the source.
After commodity packaging factory applies for Quick Response Code ID successes to the false proof service provider that traces to the source, the endowed information of each all can conduct One record can write in block chain (record including but not limited to following field:Commodity factory title, merchandise news, the application time, Packing specification, endowed ID), and the endowed information can not be changed, unsuppressible-suppression and forgery.
Ultimate consumer can be first scanned in outer box after commodity are bought with intelligent terminal (such as smart mobile phone) Quick Response Code, then the endowed information by searching on block chain determine the authenticity and legitimacy (reason of the Quick Response Code:Trace to the source block The endowed time of each Quick Response Code, and the time being activated after dispatching from the factory are have recorded on chain.When ultimate consumer successfully obtains After corresponding private key, the Quick Response Code state is changed to " failure " automatically), then parse manufacturer information and it is endowed when Between information.Then, consumer can be and privately owned using the false proof service provider that traces to the source with the bar code on the egg of any one in scan box Character string Y contained by bar code is decrypted private key in database, so as to obtain X.Then the commodity packaging to being included in X again Factory's information, date of manufacture information are compared with the information obtained from block chain, to judge whether both coincide.
Further, character string X includes encoding mechanism check logic set in advance.Sprayed simultaneously when being scanned such as mobile phone Code image recognition, and verify the color code used in coding.If matching is errorless, for genuine piece.If wrong to not upper or parsing By mistake, then it is judged as fake products.The false proof service provider that traces to the source to the intelligent terminal of ultimate consumer when private key is provided Proof of identity can be carried out, it is ensured that private key only can be provided successfully once.After consumer successfully completes once false proof verification, the packaging The state of commodity corresponding to box will be changed to " consumption ".Corresponding private key also can be from the privately owned clothes of the false proof service provider that traces to the source It is engaged in destroying in device, so as to realize " burn-after-reading " of commodity counterfeit prevention information.
A kind of embodiment of false proof mark of tracing to the source, including be attached to commodity and/or be attached on the packing box of the commodity False proof ciphertext and anti-fake code;The false proof ciphertext be by anti-fake code as key be encrypted calculating after gained;It is false proof close Text includes the characteristic information of the commodity;When false proof ciphertext is decrypted, the characteristic information of the product, then the spy with the commodity are obtained Sign compares, you can judges the true and false of the commodity and/or obtains the information of tracing to the source of the commodity.
Here anti-fake code is rivest, shamir, adelman as the algorithm that calculating is encrypted in key, described false proof volume A part for code or the anti-fake code is public key, and corresponding private key could be obtained by customer requests.
The false proof ciphertext includes the characteristic information of the commodity, is the natural bion feature of the commodity, or It is color, the resemblance information of the commodity, or the random labelling artificially assigned, or the real scene shooting picture of the commodity, Or video.
The false proof ciphertext and anti-fake code and mutual corresponding relation of manufacturer's establishment, by encryption safely, offline guarantor Deposit.
A kind of embodiment of false proof source tracing method, comprises the following steps:Manufacturer is some to false proof service provider's application of tracing to the source The key of encryption is public key;Business men is again unique identification information corresponding to each product generation of oneself, then using one Individual encryption key is to generate false proof ciphertext after public key the identification information is encrypted calculating;Product in same packing box is adopted False proof ciphertext is generated with same encryption key is public key;Recycle the encryption key i.e. public key as anti-fake code or A part for anti-fake code and by the anti-fake code coding on packing box;Again the false proof ciphertext coding in the packaging On corresponding product in box or it is attached to the inside of the packing box and indicates the corresponding relation with the product of the package interior; Consumer decrypts the false proof ciphertext, obtained described every to the key i.e. private key of false proof service provider's application decryption of tracing to the source The unique identification information of one product.
When manufacturer to it is described it is false proof trace to the source service provider provide such as batch products quantity, specification and technical parameter, And after the data of time of making the product etc. production and technical elements, the false proof corresponding anti-fake code of service provider's activation of tracing to the source is available for looking into Ask, activate the decruption key i.e. private key of preservation for application.Manufacturer can be oneself with the private key of oneself to the false proof service of tracing to the source The data that business provides are encrypted and digital signature.
When the false proof service provider that traces to the source is judged as the request first that legitimate consumer sends, then believed according to described anti-fake code Breath returns to private key corresponding to the AES, when the false proof service provider that traces to the source confirms that the private key has successfully been provided, then destroy corresponding to Private key;Or by the Status Change of the commodity corresponding to the packing box it is " consumption ".To ensure that each private key only can be by success Granting and using once.Can be the new anti-fake code of the commodity application and false proof close if meeting with consumer and returning goods Text, it is necessary to retract factory again and carry out secondary operation, cleaning coding, repack;There are the commodity or nondurable goods of shelf-life, move back Directly commodity are destroyed after goods.
Manufacturer can also register at the false proof service provider that traces to the source, and obtain manufacturer's coding;And/or code-spraying equipment quilt False proof service provider's registration of tracing to the source, distribution code-spraying equipment coding.
The false proof service provider that traces to the source is after having provided encryption key i.e. public key and having activated for inquiry, by related endowed information Issue is in block chain;Any of commodity circulation links per capita can send out barcode scanning time, positional information and packing box anti-fake code Cloth is into block chain;The false proof service provider that traces to the source (commodity production business or block chain), using the product packing box as minimum Commodity circulation unit, record it and dispatch from the factory, in circulation and the state occupied to consumer.It is " endowed ", " respectively Dispatch from the factory " and " consumption ".If the public key is obtained in block chain by counterfeiter, and for encrypting fake products, because not knowing The specific AES in road, the ciphertext after encryption can not be untied with corresponding private key.
In the above-described embodiments, corresponding relation of the manufacturer based on original packaging is encrypted (i.e. can not after commodity mounted box Packing box is changed again).The feature identification information (usual) of each specific commodity, can not be by third party by being preserved offline after encryption Obtain privately, be finally reached the target of the production and the circulation that prevent fake and forged class commodity.Tracing to the source, it is each to have recorded on block chain The endowed time of individual anti-fake code (public key), and the time being activated after dispatching from the factory.Corresponding to being successfully obtained as ultimate consumer After private key, the anti-fake code state is changed to " failure " automatically.
The false proof service provider that traces to the source can carry out identity school when private key is provided to the intelligent terminal of ultimate consumer Test, it is ensured that private key only can be provided successfully once.After consumer successfully completes once false proof verification, the business corresponding to the packing box The state of product will be changed to " consumption ".Corresponding private key can also be destroyed from the privately owned server of the false proof service provider that traces to the source Fall, so as to realize " burn-after-reading " of commodity counterfeit prevention information.
Unique features information corresponding to each so-called product, a three-figure plain code can be sprayed at random on commodity above Numeral.Can also and will voluntarily it be compared by consumer after the external appearance characteristic information parsing of the commodity.Commodity are using packing box as minimum stream Logical unit, it is " endowed ", " having dispatched from the factory " respectively and " has disappeared from dispatching from the factory to circulation, then to consumer, its condition of merchandise Take ".With reference to the self registering timing node of different scanning persons and positional information, constitute the whole false proof retrospect traced to the source according to According to.Ensureing product features identification information encryption, offline preservation safely.
In another embodiment of the present invention, code-spraying equipment manufacturer and commodity production business are carried out by Professional Certification mechanism After certification and registration, distribute one respectively and be uniquely encoded to A and B.Commodity production business gives each commodity by built-in system Compile a serial number.The rule of serial number can be that date of manufacture (YYYYMMDD) plus 8 bit stream water sequence numbers ultimately form a string Total length is the character string of 32, consisting of ABC (reference length is 16) and 8 date codes add 8 serial numbers. Wherein, the starting symbol of last 8 serial numbers is randomly generated.In addition, in 8 date codes and 8 serial numbers and then increasing Add a check bit verified to this 16 bit value.Check logic is the remainder conduct that after this 16 digit divided by 7, will be obtained Check number.
In commodity packaging, apply for that the Quick Response Code on the packing box identifies from commodity packaging factory to the false proof service provider that traces to the source After (there is uniqueness), by the use of Quick Response Code ID values as public key, the feature identification information X of each commodity is encrypted, Obtain character string Y.Then character string Y is handled through code-spraying equipment, is automatically converted into bar code pattern, is sprayed on corresponding commodity On.
After commodity packaging factory applies for Quick Response Code success to the false proof service provider that traces to the source, the endowed information of each all can write area (field of record includes in block chain:Commodity factory coding, application time, packing specification, endowed ID), and the information can not be more Change, unsuppressible-suppression and forgery.
Ultimate consumer can be first scanned in outer box after commodity are bought with intelligent terminal (such as smart mobile phone) Quick Response Code, then the endowed information by searching on block chain determine the authenticity of the Quick Response Code, then parse commodity factory information With endowed temporal information.Then, consumer can scan the bar code on the commodity in any one box, and utilize false proof clothes of tracing to the source Character string Y contained by bar code is decrypted private key in business business's built-in system, so as to obtain X.Then the business to being included in X again Product packing factory information, date of manufacture information are compared with the information obtained from block chain, to judge whether both coincide.Then Verify whether check bit is correct again.Can also and will voluntarily it be compared by consumer after the external appearance characteristic information parsing of the commodity.If Above- mentioned information matches errorless, then is genuine piece.If to not upper or parsing mistake, it is judged as fake products.
The invention provides a kind of endowed feature recognition with each piece of commodity in the packing box of commodity outer packing Quick Response Code Built between coding method between information, and both numbers can not forge, tripartite can not steal, consumer is easy to again The false proof source tracing method of rapid verification.
This false proof source tracing method is by using block chain technology to factory corresponding to the Quick Response Code mark on producer's packing box Business and endowed time are recorded, and can not be forged using block chained record information, the characteristic such as unsuppressible-suppression ensures the endowed information It is genuine and believable, realize one yard of a box;
Production firm voluntarily carries out uniqueness coding (unique identification coding) by certain coding rule to each commodity, from And realize one yard of a commodity;
During commodity packaging, rule of combination that different commodity are fitted into some specific packing box be it is random, still The commodity and the direct corresponding relation of packing box are unique, and third party can not steal or speculate;
Ink jet numbering machine automatically encodes the unique identification of each commodity and carried out when coding is carried out to each specific commodity Encryption (use rivest, shamir, adelman, preferably ECC, i.e. elliptic curve encryption algorithm), with bar code or other plain modes It is sprayed on commodity shell.
As a result of public key of the part or all of field in the Quick Response Code ID of the packing box as encryption, so as to remember The corresponding relation between the commodity and packing box loaded is recorded;The intelligent terminal of consumer is using private key to the bar shaped on commodity Code information is decrypted, after obtaining the unique identifier of commodity, then to the tax in the information and packing box in the unique identifier Code information is compared and logic verify, so as to judge the true and false of the commodity.
The basis of the uniqueness of identification code of the present invention on commodity packaging case is ensured and the uniqueness of each commodity code On, by using asymmetric encryption, the cleverly part using public key information as the coding (Quick Response Code) of packing box, and it is private Key information holds in close confidence in the process of circulation, so as to ensure that outer packing identification code and the encrypted generation of commodity code in packing box Article code (bar code) between corresponding relation, can not be grasped by third party, it is also difficult to forged by third party.By this skill Art, while ensureing the encryption of product features identification information safety, preserving offline, can also it allow ultimate consumer can be very easily Verified, reduce the identification cost of consumer;Service provider and recognized by introducing false proof trace to the source with the third party of public credibility Card mechanism carries out the false proof service of tracing to the source and authentication service to commodity production enterprise, then coordinates third party testing agency to commercial quality Spot-check, improve the public credibility of commercial quality;Commodity production business can set the date of manufacture and shelf-life of every box commodity. Quick Response Code on consumer scans' packing box can determine whether the box commodity whether within the shelf-life, and the remaining shelf-life is also more Long;Coding on packing box need not be printed as Quick Response Code in kind by false proof service provider that traces to the source etc. or other types of antifalsification label enters Row is in kind to be delivered, and is pasted onto without by security code label on packing material, but label coding electricity is voluntarily downloaded by processing enterprise In packaging link voluntarily coding after sub-information, human resources are saved, have eliminated labeling cost.
It is the workflow diagram of the false proof service provider that traces to the source in one embodiment of the invention as shown in Figure 1, including:It is false proof to trace to the source Service provider should apply issuing code-spraying equipment registration code A;It should apply issuing manufacturer's registration code B.And according to third party's detection machine The quality testing record (or oneself detection) of structure, answers manufacturer to apply for that generation is uniquely corresponding to the high-quality of quality testing report Prove code C.The false proof service provider that traces to the source answers the request of manufacturer to generate some keys for encrypting, decrypting, wherein encryption key By by coding on the packing box of product, one yard of a box.Endowed information and high-quality proof code C issues are assigned in block chain again Code information includes manufacturer ID, endowed time, packing box specification and packing box ID.It is false proof to trace to the source in circulation and process of consumption Service provider receives the encryption key of consumer's upload, i.e., the coding on packing box, decrypted corresponding to according to the request of consumer Key is sent to consumer;Requestor's relevant information of this inquiry is recorded simultaneously, and historical query number and place is also anti- Feed a part of the consumer as information of tracing to the source.False proof trace to the source service provider's analysis of history inquiry times and place, find doubtful Early warning is sent during counterfeit behavior, and after counterfeit product is identified, has the false proof service provider that traces to the source to take measures, such as in block Warning message, or even legal means are issued in chain.
It is the false proof flow chart of tracing to the source of the manufacturer of one embodiment of the invention as shown in Figure 2, including:Manufacturer obtains first Obtain the coding from the false proof service provider that traces to the source:Having code-spraying equipment coding A, (each code-spraying equipment need to register the color kind of print cartridge One of class, the foundation as built-in check) and manufacturer's coding B.Secondly, manufacturer be certain batch products Bid-winning rate detect or Person provides testing result application high-quality proof code C.Batch products quantity, specification and the technical parameter are also provided in case consumer and Dealer inquires about.It is each simultaneously to false proof key of service provider's application corresponding to encryption, the decryption of product packaging quantity of tracing to the source Individual product packaging corresponds to a pair of encryption keys and decruption key.Manufacturer is feature corresponding to each product generation of oneself Code-spraying equipment coding A, manufacturer coding B and high-quality proof code C can be included in identification information X, this feature identification information X, also The characteristic informations such as picture or the video of product can be included, meter is then encrypted to identification information X using encryption key Encrypted cipher text Y is generated after calculation;Again encryption key coding on packing box;Encrypted cipher text Y codings on product;Packing box with Product is delivered after uniquely corresponding to packaging in box.Barcode scanning changes condition of merchandise.
It is that the consumer of one embodiment of the invention traces to the source flow chart as shown in Figure 3, including:Consumer passes through coding first Encryption key on packing box links and obtains corresponding endowed information and high-quality proof code C in block chain, is therefrom given birth to The information such as the data of business men and product correlation.The false proof service provider that traces to the source is linked by encryption key of the coding on packing box again, Decruption key corresponding to acquisition, and local information is uploaded to the false proof service provider that traces to the source.By decruption key to coding on product Encrypted cipher text Y be decrypted, obtain the product information contained in encrypted cipher text Y, be compared with the feature of product, with block The information obtained in chain is compared, so as to judge the true and false.
It is the false proof flow chart of tracing to the source of the application program of one embodiment of the invention as shown in Figure 4, this application program can With the application program being mounted in the APP or special equipment in smart mobile phone or tablet personal computer.Traced back into false proof After the function of source, including:The coding (encryption key) on packing box is read in prompting, the code of the reading is verified, if passed through The relevant information that verification is then searched in block chain;Correspond to the related information of the batch products, including bag in display block chain The endowed information of mounted box, associated production business information, the type counterfeit goodses information warning and high-quality proof code C;To false proof clothes of tracing to the source The private key for business's application correlation of being engaged in.The coding that prompting is read on product is encrypted cipher text Y;Use the private from the false proof service provider that traces to the source Encrypted cipher text Y is decrypted key, the Product Feature Information that display decryption obtains;Then with the information and packing box in block chain In product be compared, be either prompted to consumer estimate compare or provide options for consumer estimate commodity provide Answer, so as to obtain corresponding false proof information and the conclusion of tracing to the source.
It is the code-spraying equipment workflow diagram of one embodiment of the invention as shown in Figure 5, including:Code-spraying equipment is close encrypting Key is automatically converted into Quick Response Code coding on packing box.Code-spraying equipment also adds unique identification information corresponding to each product Ciphertext Y is automatically converted into Quick Response Code coding on product.Bar code or Quick Response Code can also be not converted into directly to spray coding On the packing box and product of code.The corresponding relation of product in packing box and packing box is unique, not modifiable.Encrypt close Literary Y or its coding can also coding at the inside of packing box or other positions.
It is dealer's workflow diagram of one embodiment of the invention as shown in Figure 6, after dealer stocks up, scans product bag The Quick Response Code loaded onto, the endowed information in block chain is obtained, channel information compares with stocking up, and judges the true and false, and packing box is compiled Code, barcode scanning time, (dealer is assigned with proving the private key of oneself identity to position information addition block chain, by block Multiple common recognition nodes verification on chain can be used as new circulation record after and be received by block chain).Each dealer is equal Can the voluntarily storage of record product, restocking and sales information.
It is the block chain workflow diagram of one embodiment of the invention as shown in Figure 7, including:Block chain receives false proof trace to the source The endowed information of service provider's issue, including manufacturer ID, endowed time, packing box specification, packing box ID, the related batch products Detection information, high-quality proof code C etc.;After verifying manufacturer's identity, the time of making the product of endowed commodity is recorded.Searched for according to request Corresponding record in block chain, the endowed information of correlation is returned to requestor, and the circulation status information of such commodity, containing going through The identity information of time of secondary barcode scanning, positional information and barcode scanning people.

Claims (10)

1. a kind of false proof mark of tracing to the source, it is characterised in that including that can be attached to commodity and/or be attached to the packaging of the commodity False proof ciphertext and anti-fake code on box;The false proof ciphertext be by the anti-fake code as key be encrypted calculating after institute ;The false proof ciphertext includes the characteristic information of the commodity;When the false proof ciphertext is decrypted, you can judge the true of the commodity Information of tracing to the source that is pseudo- and/or obtaining the commodity.
2. false proof mark of tracing to the source as claimed in claim 1, it is characterised in that the described false proof ciphertext includes the commodity Characteristic information, including following one or more than one kinds of combination:The natural bion feature of the commodity, the commodity Color, resemblance, the random labelling artificially assigned, the real scene shooting picture related to the commodity or video.
3. false proof mark of tracing to the source as claimed in claim 1, it is characterised in that described anti-fake code is encrypted as key The algorithm of calculating is rivest, shamir, adelman, and a part for described anti-fake code or the anti-fake code is public key, corresponding private Key can only pass through acquisition request by consumer.
4. false proof mark of tracing to the source as claimed in claim 1, it is characterised in that described false proof ciphertext and anti-fake code and Mutual corresponding relation, it is offline after being also encrypted to preserve.
5. a kind of false proof source tracing method, it is characterised in that comprise the following steps:
Manufacturer applies for the key i.e. public key of more than one encryption to the false proof service provider that traces to the source;The false proof service provider that traces to the source is same The key of more than one decryption is private key corresponding to Shi Shengcheng, and encrypts keeping person's inquiry to be consumed;
The manufacturer generates unique identification information for each product of oneself, is then public key pair using an encryption key The unique identification information generates false proof ciphertext after calculating is encrypted;Each product in same packing box is added using same Key is public key to generate false proof ciphertext;
The manufacturer, which by the use of the encryption key is public key, is used as a part for anti-fake code or anti-fake code and should Anti-fake code coding is on packing box;The false proof ciphertext coding on the corresponding product in the packing box or is attached to institute State the inside of packing box and indicate the corresponding relation with the product of the package interior;
Consumer applies for the key i.e. private key of decryption to the false proof service provider that traces to the source, and is using the key of the decryption Private key decrypts the false proof ciphertext, obtains the unique identification information of each product.
6. false proof source tracing method as claimed in claim 5, it is characterised in that also comprise the following steps:Manufacturer traces back false proof Registered at the service provider of source, obtain manufacturer's coding;And/or code-spraying equipment is registered by the false proof service provider that traces to the source, distribution Code-spraying equipment encodes.
7. false proof source tracing method as claimed in claim 5, it is characterised in that also comprise the following steps:The manufacturer is to institute State it is false proof trace to the source service provider provide used the encryption the key i.e. batch products of public key following information in one Kind or more than one combination:Quantity, specification, technical parameter and the time of making the product of product;The then false proof service of tracing to the source Business issues the related endowed information that the encryption key of granting is public key in block chain for inquiry;Simultaneously activation with it is described false proof Decruption key corresponding to coding is the application of private key.
8. false proof source tracing method as claimed in claim 7, it is characterised in that described consumer is to the false proof service of tracing to the source When the key of business's application decryption is private key, the anti-fake code on the packing box is first sent to the false proof service provider that traces to the source; It is described it is false proof trace to the source service provider successfully provide decryption key i.e. private key after, then destroy corresponding to private key;Or this is wrapped The Status Change of commodity corresponding to mounted box is " consumption ".
9. false proof source tracing method as claimed in claim 7, it is characterised in that also comprise the following steps:Commodity circulation links The barcode scanning time of the anti-fake code, positional information can be published in block chain by anyone;Consumer and dealer can look into Ask the information in block chain.
10. false proof source tracing method as claimed in claim 7, it is characterised in that a described product packing box is minimum Commodity circulation unit, it is recorded it and dispatches from the factory, in circulation and the state occupied to consumer.
CN201710582450.XA 2017-07-17 2017-07-17 False proof mark and the method for tracing to the source Pending CN107341676A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710582450.XA CN107341676A (en) 2017-07-17 2017-07-17 False proof mark and the method for tracing to the source

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710582450.XA CN107341676A (en) 2017-07-17 2017-07-17 False proof mark and the method for tracing to the source

Publications (1)

Publication Number Publication Date
CN107341676A true CN107341676A (en) 2017-11-10

Family

ID=60219852

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710582450.XA Pending CN107341676A (en) 2017-07-17 2017-07-17 False proof mark and the method for tracing to the source

Country Status (1)

Country Link
CN (1) CN107341676A (en)

Cited By (48)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108055125A (en) * 2017-11-23 2018-05-18 阿里巴巴集团控股有限公司 A kind of encryption and decryption method and device of product information
CN108596636A (en) * 2018-04-20 2018-09-28 中国联合网络通信集团有限公司 Method for anti-counterfeit, device and terminal device
CN108629603A (en) * 2018-05-07 2018-10-09 烟台大学 A kind of antiforge method for commodities based on Quick Response Code
CN108694594A (en) * 2018-05-29 2018-10-23 阿里巴巴集团控股有限公司 Commodity source tracing method and device, electronic equipment based on block chain
CN108734480A (en) * 2018-05-22 2018-11-02 四川海纳仁东科技有限公司 Red wine scarcity method of proof based on block chain
CN108830617A (en) * 2018-06-12 2018-11-16 黑启栋 Super code anti-counterfeiting method and system based on block chain
CN108839977A (en) * 2018-06-08 2018-11-20 湖南万容普联再生资源有限公司 A kind of system of Waste sorting recycle, method and device
CN108876401A (en) * 2018-05-29 2018-11-23 阿里巴巴集团控股有限公司 Commodity Claims Resolution method and device, electronic equipment based on block chain
CN108985785A (en) * 2018-04-03 2018-12-11 东莞市天眼网络科技有限公司 A method of Comodity anti-fake system and examination commodity true and false based on block chain
CN109102305A (en) * 2018-08-06 2018-12-28 程昔恩 A kind of article anti-counterfeit and source tracing method realized using block chain and its intelligent contract
CN109214829A (en) * 2018-08-02 2019-01-15 佛山鑫达智汇科技有限公司 Food safety source tracing method and device
CN109308621A (en) * 2018-05-27 2019-02-05 成都零光量子科技有限公司 A kind of safe and efficient product false proof and recognition methods
CN109347632A (en) * 2018-10-23 2019-02-15 北京金山安全软件有限公司 Block chain ID generation and use method, device, electronic equipment and storage medium
CN109345256A (en) * 2018-09-14 2019-02-15 北京清大智信科技有限公司 A kind of false proof device of the credible transaction of collectibles, method and system
CN109816401A (en) * 2019-01-17 2019-05-28 柳州康云互联科技有限公司 A kind of product traceability and anti-counterfeiting system and method based on two dimensional code
CN109886685A (en) * 2019-02-28 2019-06-14 易齐盈(重庆)电子商务有限公司 A kind of commodity tracing system and method based on block chain
CN109951427A (en) * 2017-12-21 2019-06-28 航天信息股份有限公司 A kind of product traceability method and system, cloud are traced to the source platform
CN109978727A (en) * 2019-03-28 2019-07-05 上海荷福人工智能科技(集团)有限公司 A kind of AI intelligent building operation platform
CN110020798A (en) * 2019-03-28 2019-07-16 上海荷福人工智能科技(集团)有限公司 A kind of approaches to IM of tracing to the source of the project progress based on artificial intelligence
CN110097378A (en) * 2019-04-24 2019-08-06 杭州宇链科技有限公司 A kind of commodity transaction record and circulation motivational techniques based on block chain technology
CN110222053A (en) * 2019-05-21 2019-09-10 深圳壹账通智能科技有限公司 A kind of acquisition methods and relevant device of the data of tracing to the source based on block chain
CN110232574A (en) * 2019-05-07 2019-09-13 中国平安财产保险股份有限公司 Product Validation method, apparatus, equipment and storage medium based on block chain
CN110472116A (en) * 2018-04-28 2019-11-19 腾讯科技(深圳)有限公司 Alliance's block chain business network and its federation node, product data storage method
CN110472973A (en) * 2018-05-09 2019-11-19 成都众宜天成科技有限公司 Fruit monitoring administration method based on block chain
CN110503438A (en) * 2019-07-10 2019-11-26 王伟林 A kind of production anti-fake traceability system and method based on block chain
CN110535819A (en) * 2018-10-22 2019-12-03 朱胜 A kind of application method of asymmetric encryption techniques on block chain is anti-fake
CN110599205A (en) * 2019-09-19 2019-12-20 腾讯科技(深圳)有限公司 Product anti-counterfeiting method, device, storage medium and computer equipment
CN110633922A (en) * 2018-05-31 2019-12-31 北京京东尚科信息技术有限公司 Information verification method and system
CN110659332A (en) * 2019-10-12 2020-01-07 链农(深圳)信息科技有限公司 Video recording system and method based on block chain
CN110728524A (en) * 2018-07-16 2020-01-24 北京鸥鹏物联技术服务有限公司 Article tracing method, electronic device and readable storage medium
CN110766421A (en) * 2019-10-21 2020-02-07 深圳市炳德区块链技术有限公司 Commodity anti-counterfeiting method and device based on block chain
CN110852764A (en) * 2019-11-14 2020-02-28 微企智联科技(广州)有限公司 Anti-counterfeiting traceable product identification device and method based on block chain technology
CN110889477A (en) * 2018-08-15 2020-03-17 齐爱民 Commodity anti-counterfeiting code generation method based on block chain
CN111259418A (en) * 2018-09-05 2020-06-09 贝富(广州)新技术有限公司 Anti-counterfeiting method, system and storage medium based on block chain
CN111400779A (en) * 2020-01-07 2020-07-10 李蕴光 High-dimensional data encryption method and system
US10719884B2 (en) 2018-03-30 2020-07-21 Alibaba Group Holding Limited Blockchain-based service execution method and apparatus, and electronic device
CN111445268A (en) * 2020-03-29 2020-07-24 武汉积墨包装印刷有限公司 Printing ink tracing method based on block chain and 5G communication
CN111539502A (en) * 2020-03-25 2020-08-14 中国平安财产保险股份有限公司 Anti-counterfeiting two-dimensional code generation method and device, server and storage medium
CN111598591A (en) * 2020-05-25 2020-08-28 汉中本密科技有限公司 Product anti-counterfeiting method and system
CN111639729A (en) * 2020-05-28 2020-09-08 深圳威尔智能系统有限公司 Anti-counterfeiting tracing method based on RFID and block chain
CN111833071A (en) * 2019-03-26 2020-10-27 财团法人亚洲大学 Method for establishing and inquiring production and marketing histories for quality assurance of agricultural products
CN112365271A (en) * 2020-11-04 2021-02-12 广东未来信息有限公司 Liquefied petroleum gas cylinder traceability system and method based on block chain, information data processing terminal and computer readable storage medium
CN112862047A (en) * 2021-02-06 2021-05-28 陈永林 Double-authorization intelligent anti-counterfeit label generation method
CN112990944A (en) * 2021-03-22 2021-06-18 北京电信规划设计院有限公司 External package anti-counterfeiting method adopting digital codes and Internet of things double labels
CN113077268A (en) * 2021-04-02 2021-07-06 西南石油大学 Agricultural product information traceability system and method based on NFC and block chain
CN113140256A (en) * 2020-01-20 2021-07-20 深圳华大智造科技有限公司 Substance DNA tracing method
CN114140132A (en) * 2021-11-24 2022-03-04 芯电智联(北京)科技有限公司 Anti-counterfeiting traceability system
CN115329919A (en) * 2022-10-08 2022-11-11 北京微点科学技术有限公司 Random additional point anti-counterfeiting method and device based on micro-point code

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103729770A (en) * 2013-12-26 2014-04-16 重庆文理学院 Novel anti-fake traceability system and method
CN104091272A (en) * 2014-07-09 2014-10-08 北京信长城技术研究院 Identifying and tracing system with unique identity and method
CN105976192A (en) * 2016-05-10 2016-09-28 深圳市云天星光数字技术有限公司 Anti-fake method and system employing multi-layer marking codes in mutual combination
CN106022187A (en) * 2016-05-13 2016-10-12 成都陌云科技有限公司 High-efficient O2O implementation method
CN106557933A (en) * 2016-10-28 2017-04-05 国芯科技(北京)有限公司 Product false proof source tracing method and product false proof traceability system
CN106570710A (en) * 2016-10-27 2017-04-19 纸飞机(北京)科技有限公司 Commodity anti-counterfeiting method and device

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103729770A (en) * 2013-12-26 2014-04-16 重庆文理学院 Novel anti-fake traceability system and method
CN104091272A (en) * 2014-07-09 2014-10-08 北京信长城技术研究院 Identifying and tracing system with unique identity and method
CN105976192A (en) * 2016-05-10 2016-09-28 深圳市云天星光数字技术有限公司 Anti-fake method and system employing multi-layer marking codes in mutual combination
CN106022187A (en) * 2016-05-13 2016-10-12 成都陌云科技有限公司 High-efficient O2O implementation method
CN106570710A (en) * 2016-10-27 2017-04-19 纸飞机(北京)科技有限公司 Commodity anti-counterfeiting method and device
CN106557933A (en) * 2016-10-28 2017-04-05 国芯科技(北京)有限公司 Product false proof source tracing method and product false proof traceability system

Cited By (74)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108055125A (en) * 2017-11-23 2018-05-18 阿里巴巴集团控股有限公司 A kind of encryption and decryption method and device of product information
CN108055125B (en) * 2017-11-23 2020-06-30 阿里巴巴集团控股有限公司 Method and device for encrypting and decrypting product information
WO2019100872A1 (en) * 2017-11-23 2019-05-31 阿里巴巴集团控股有限公司 Method and apparatus for encrypting and decrypting product information
CN111865586B (en) * 2017-11-23 2023-01-10 创新先进技术有限公司 Method and device for encrypting product information
US10778427B2 (en) 2017-11-23 2020-09-15 Alibaba Group Holding Limited Method and apparatus for encrypting and decrypting product information
CN111865586A (en) * 2017-11-23 2020-10-30 创新先进技术有限公司 Method and device for encrypting product information
TWI712916B (en) * 2017-11-23 2020-12-11 開曼群島商創新先進技術有限公司 Encryption and decryption method and device for product information and its electronic equipment and computer readable storage medium
CN109951427B (en) * 2017-12-21 2021-04-16 航天信息股份有限公司 Product tracing method and system and cloud tracing platform
CN109951427A (en) * 2017-12-21 2019-06-28 航天信息股份有限公司 A kind of product traceability method and system, cloud are traced to the source platform
US11049188B2 (en) 2018-03-30 2021-06-29 Advanced New Technologies Co., Ltd. Blockchain-based service execution method and apparatus, and electronic device
US11113769B2 (en) 2018-03-30 2021-09-07 Advanced New Technologies Co., Ltd. Blockchain-based service execution method and apparatus, and electronic device
US10719884B2 (en) 2018-03-30 2020-07-21 Alibaba Group Holding Limited Blockchain-based service execution method and apparatus, and electronic device
CN108985785A (en) * 2018-04-03 2018-12-11 东莞市天眼网络科技有限公司 A method of Comodity anti-fake system and examination commodity true and false based on block chain
CN108596636A (en) * 2018-04-20 2018-09-28 中国联合网络通信集团有限公司 Method for anti-counterfeit, device and terminal device
CN110472116A (en) * 2018-04-28 2019-11-19 腾讯科技(深圳)有限公司 Alliance's block chain business network and its federation node, product data storage method
CN108629603B (en) * 2018-05-07 2021-09-21 烟台大学 Commodity anti-counterfeiting method based on two-dimensional code
CN108629603A (en) * 2018-05-07 2018-10-09 烟台大学 A kind of antiforge method for commodities based on Quick Response Code
CN110472973A (en) * 2018-05-09 2019-11-19 成都众宜天成科技有限公司 Fruit monitoring administration method based on block chain
CN108734480A (en) * 2018-05-22 2018-11-02 四川海纳仁东科技有限公司 Red wine scarcity method of proof based on block chain
CN109308621A (en) * 2018-05-27 2019-02-05 成都零光量子科技有限公司 A kind of safe and efficient product false proof and recognition methods
US11023981B2 (en) 2018-05-29 2021-06-01 Advanced New Technologies Co., Ltd. Blockchain-based commodity claim method and apparatus, and electronic device
AU2019204054C1 (en) * 2018-05-29 2021-05-27 Advanced New Technologies Co., Ltd. Blockchain-based commodity claim method and apparatus, and electronic device
CN108694594A (en) * 2018-05-29 2018-10-23 阿里巴巴集团控股有限公司 Commodity source tracing method and device, electronic equipment based on block chain
TWI706347B (en) * 2018-05-29 2020-10-01 香港商阿里巴巴集團服務有限公司 Block chain-based commodity claim settlement method and device, and electronic equipment
CN108876401B (en) * 2018-05-29 2022-03-01 创新先进技术有限公司 Commodity claim settlement method and device based on block chain and electronic equipment
AU2019204063B2 (en) * 2018-05-29 2020-11-26 Advanced New Technologies Co., Ltd. Blockchain-based merchandise tracing methods and apparatus
US10922757B2 (en) 2018-05-29 2021-02-16 Advanced New Technologies Co., Ltd. Blockchain-based commodity claim method and apparatus, and electronic device
AU2019204054B2 (en) * 2018-05-29 2020-09-10 Advanced New Technologies Co., Ltd. Blockchain-based commodity claim method and apparatus, and electronic device
AU2019204063C1 (en) * 2018-05-29 2021-05-13 Advanced New Technologies Co., Ltd. Blockchain-based merchandise tracing methods and apparatus
CN108876401A (en) * 2018-05-29 2018-11-23 阿里巴巴集团控股有限公司 Commodity Claims Resolution method and device, electronic equipment based on block chain
CN110633922B (en) * 2018-05-31 2023-11-07 北京京东尚科信息技术有限公司 Information verification method and system
CN110633922A (en) * 2018-05-31 2019-12-31 北京京东尚科信息技术有限公司 Information verification method and system
CN108839977A (en) * 2018-06-08 2018-11-20 湖南万容普联再生资源有限公司 A kind of system of Waste sorting recycle, method and device
CN108830617A (en) * 2018-06-12 2018-11-16 黑启栋 Super code anti-counterfeiting method and system based on block chain
CN110728524A (en) * 2018-07-16 2020-01-24 北京鸥鹏物联技术服务有限公司 Article tracing method, electronic device and readable storage medium
CN109214829A (en) * 2018-08-02 2019-01-15 佛山鑫达智汇科技有限公司 Food safety source tracing method and device
CN109214829B (en) * 2018-08-02 2021-09-17 河北同福健康产业有限公司 Food safety tracing method and device
CN109102305A (en) * 2018-08-06 2018-12-28 程昔恩 A kind of article anti-counterfeit and source tracing method realized using block chain and its intelligent contract
CN109102305B (en) * 2018-08-06 2022-03-29 程昔恩 Article anti-counterfeiting and tracing method realized by block chain and intelligent contract thereof
CN110889477A (en) * 2018-08-15 2020-03-17 齐爱民 Commodity anti-counterfeiting code generation method based on block chain
CN111259418A (en) * 2018-09-05 2020-06-09 贝富(广州)新技术有限公司 Anti-counterfeiting method, system and storage medium based on block chain
CN109345256A (en) * 2018-09-14 2019-02-15 北京清大智信科技有限公司 A kind of false proof device of the credible transaction of collectibles, method and system
CN110535819A (en) * 2018-10-22 2019-12-03 朱胜 A kind of application method of asymmetric encryption techniques on block chain is anti-fake
CN109347632A (en) * 2018-10-23 2019-02-15 北京金山安全软件有限公司 Block chain ID generation and use method, device, electronic equipment and storage medium
CN109816401A (en) * 2019-01-17 2019-05-28 柳州康云互联科技有限公司 A kind of product traceability and anti-counterfeiting system and method based on two dimensional code
CN109886685A (en) * 2019-02-28 2019-06-14 易齐盈(重庆)电子商务有限公司 A kind of commodity tracing system and method based on block chain
CN111833071A (en) * 2019-03-26 2020-10-27 财团法人亚洲大学 Method for establishing and inquiring production and marketing histories for quality assurance of agricultural products
CN110020798A (en) * 2019-03-28 2019-07-16 上海荷福人工智能科技(集团)有限公司 A kind of approaches to IM of tracing to the source of the project progress based on artificial intelligence
CN109978727A (en) * 2019-03-28 2019-07-05 上海荷福人工智能科技(集团)有限公司 A kind of AI intelligent building operation platform
CN110097378A (en) * 2019-04-24 2019-08-06 杭州宇链科技有限公司 A kind of commodity transaction record and circulation motivational techniques based on block chain technology
CN110232574A (en) * 2019-05-07 2019-09-13 中国平安财产保险股份有限公司 Product Validation method, apparatus, equipment and storage medium based on block chain
CN110222053A (en) * 2019-05-21 2019-09-10 深圳壹账通智能科技有限公司 A kind of acquisition methods and relevant device of the data of tracing to the source based on block chain
CN110503438A (en) * 2019-07-10 2019-11-26 王伟林 A kind of production anti-fake traceability system and method based on block chain
CN110599205A (en) * 2019-09-19 2019-12-20 腾讯科技(深圳)有限公司 Product anti-counterfeiting method, device, storage medium and computer equipment
CN110659332A (en) * 2019-10-12 2020-01-07 链农(深圳)信息科技有限公司 Video recording system and method based on block chain
CN110766421A (en) * 2019-10-21 2020-02-07 深圳市炳德区块链技术有限公司 Commodity anti-counterfeiting method and device based on block chain
CN110852764A (en) * 2019-11-14 2020-02-28 微企智联科技(广州)有限公司 Anti-counterfeiting traceable product identification device and method based on block chain technology
CN111400779A (en) * 2020-01-07 2020-07-10 李蕴光 High-dimensional data encryption method and system
CN113140256A (en) * 2020-01-20 2021-07-20 深圳华大智造科技有限公司 Substance DNA tracing method
CN111539502A (en) * 2020-03-25 2020-08-14 中国平安财产保险股份有限公司 Anti-counterfeiting two-dimensional code generation method and device, server and storage medium
CN111445268A (en) * 2020-03-29 2020-07-24 武汉积墨包装印刷有限公司 Printing ink tracing method based on block chain and 5G communication
CN111598591A (en) * 2020-05-25 2020-08-28 汉中本密科技有限公司 Product anti-counterfeiting method and system
CN111639729A (en) * 2020-05-28 2020-09-08 深圳威尔智能系统有限公司 Anti-counterfeiting tracing method based on RFID and block chain
CN111639729B (en) * 2020-05-28 2023-10-27 深圳威尔智能系统有限公司 RFID and blockchain-based anti-counterfeiting tracing method
CN112365271A (en) * 2020-11-04 2021-02-12 广东未来信息有限公司 Liquefied petroleum gas cylinder traceability system and method based on block chain, information data processing terminal and computer readable storage medium
CN112862047B (en) * 2021-02-06 2023-09-15 陈永林 Dual-authorization intelligent anti-counterfeit label generation method
CN112862047A (en) * 2021-02-06 2021-05-28 陈永林 Double-authorization intelligent anti-counterfeit label generation method
CN112990944B (en) * 2021-03-22 2024-03-22 北京电信规划设计院有限公司 External packing anti-counterfeiting method adopting digital codes and internet of things double labels
CN112990944A (en) * 2021-03-22 2021-06-18 北京电信规划设计院有限公司 External package anti-counterfeiting method adopting digital codes and Internet of things double labels
CN113077268B (en) * 2021-04-02 2022-09-09 西南石油大学 Agricultural product information traceability system and method based on NFC and block chain
CN113077268A (en) * 2021-04-02 2021-07-06 西南石油大学 Agricultural product information traceability system and method based on NFC and block chain
CN114140132A (en) * 2021-11-24 2022-03-04 芯电智联(北京)科技有限公司 Anti-counterfeiting traceability system
CN115329919B (en) * 2022-10-08 2023-05-12 北京微点科学技术有限公司 Random additional point anti-counterfeiting method and device based on micro point code
CN115329919A (en) * 2022-10-08 2022-11-11 北京微点科学技术有限公司 Random additional point anti-counterfeiting method and device based on micro-point code

Similar Documents

Publication Publication Date Title
CN107341676A (en) False proof mark and the method for tracing to the source
US7614546B2 (en) Method and system for deterring product counterfeiting, diversion and piracy
US8421593B2 (en) Apparatus, systems and methods for authentication of objects having multiple components
EP0996928B1 (en) Verification of authenticity of goods by use of random numbers
US7996319B2 (en) Authentication and tracking system
CN104854642B (en) For the method and apparatus using physical features mark manufacture article
US8615470B2 (en) Authentication and tracking system
US9010654B2 (en) Monitoring moving articles
US20080011841A1 (en) System and Method of Detecting Product Code Duplication and Product Diversion
US20140122353A1 (en) Methods and systems for making, tracking and authentication of products
CN104574119B (en) A kind of method that commodity Jianzhen traces to the source
CN106971311A (en) A kind of false proof traceability system of logistics Means of Agricultural Production and method
US20130024387A1 (en) Systems and Methods for Tracking Assigned Code Strings
US20130317996A1 (en) Systems and Methods for Tracking Status of Random Unique Code Strings and Generation of Random Unique Code Strings

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20171110

RJ01 Rejection of invention patent application after publication