CN107341676A - False proof mark and the method for tracing to the source - Google Patents
False proof mark and the method for tracing to the source Download PDFInfo
- Publication number
- CN107341676A CN107341676A CN201710582450.XA CN201710582450A CN107341676A CN 107341676 A CN107341676 A CN 107341676A CN 201710582450 A CN201710582450 A CN 201710582450A CN 107341676 A CN107341676 A CN 107341676A
- Authority
- CN
- China
- Prior art keywords
- false proof
- source
- commodity
- key
- service provider
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 26
- 238000012856 packing Methods 0.000 claims abstract description 70
- 238000004806 packaging method and process Methods 0.000 claims abstract description 19
- 238000005507 spraying Methods 0.000 claims description 20
- 238000002372 labelling Methods 0.000 claims description 6
- 230000008859 change Effects 0.000 claims description 5
- UELITFHSCLAHKR-UHFFFAOYSA-N acibenzolar-S-methyl Chemical compound CSC(=O)C1=CC=CC2=C1SN=N2 UELITFHSCLAHKR-UHFFFAOYSA-N 0.000 claims description 4
- 230000004913 activation Effects 0.000 claims description 3
- 238000009826 distribution Methods 0.000 claims description 3
- 238000004519 manufacturing process Methods 0.000 abstract description 24
- 238000005516 engineering process Methods 0.000 abstract description 5
- 230000004044 response Effects 0.000 description 24
- 238000010586 diagram Methods 0.000 description 8
- 238000012795 verification Methods 0.000 description 7
- 238000001514 detection method Methods 0.000 description 3
- 230000007246 mechanism Effects 0.000 description 3
- 230000008569 process Effects 0.000 description 3
- 239000007921 spray Substances 0.000 description 3
- 238000012360 testing method Methods 0.000 description 3
- 238000013461 design Methods 0.000 description 2
- 239000000976 ink Substances 0.000 description 2
- 238000004321 preservation Methods 0.000 description 2
- 230000002265 prevention Effects 0.000 description 2
- 238000012545 processing Methods 0.000 description 2
- 238000012372 quality testing Methods 0.000 description 2
- XLYOFNOQVPJJNP-UHFFFAOYSA-N water Substances O XLYOFNOQVPJJNP-UHFFFAOYSA-N 0.000 description 2
- 241000287828 Gallus gallus Species 0.000 description 1
- 238000004458 analytical method Methods 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 238000004140 cleaning Methods 0.000 description 1
- 239000003086 colorant Substances 0.000 description 1
- 239000012141 concentrate Substances 0.000 description 1
- 230000005611 electricity Effects 0.000 description 1
- 239000004744 fabric Substances 0.000 description 1
- 239000000463 material Substances 0.000 description 1
- 239000000203 mixture Substances 0.000 description 1
- 244000144977 poultry Species 0.000 description 1
- 238000003860 storage Methods 0.000 description 1
- 230000002123 temporal effect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/018—Certifying business or products
- G06Q30/0185—Product, service or business identity fraud
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K17/00—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
- G06K17/0022—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisions for transferring data to distant stations, e.g. from a sensing device
- G06K17/0025—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisions for transferring data to distant stations, e.g. from a sensing device the arrangement consisting of a wireless interrogation device in combination with a device for optically marking the record carrier
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/06009—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
- G06K19/06046—Constructional details
-
- G—PHYSICS
- G09—EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
- G09F—DISPLAYING; ADVERTISING; SIGNS; LABELS OR NAME-PLATES; SEALS
- G09F3/00—Labels, tag tickets, or similar identification or indication means; Seals; Postage or like stamps
- G09F3/02—Forms or constructions
- G09F3/0297—Forms or constructions including a machine-readable marking, e.g. a bar code
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0863—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Business, Economics & Management (AREA)
- Computer Networks & Wireless Communication (AREA)
- Development Economics (AREA)
- General Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Entrepreneurship & Innovation (AREA)
- Accounting & Taxation (AREA)
- Signal Processing (AREA)
- Economics (AREA)
- Finance (AREA)
- Marketing (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Storage Device Security (AREA)
Abstract
The present invention relates to a kind of false proof trace to the source mark and method, including manufacturer to apply for encryption key to the false proof service provider that traces to the source;Unique identification information is generated for each product of oneself, calculating then, which is encrypted, using encryption key generates false proof ciphertext;By the use of the encryption key as anti-fake code coding on packing box;Again false proof ciphertext coding on product in packing box;The false proof key traced to the source service provider while generate decryption, and encrypt keeping person's inquiry to be consumed;Consumer applies for the key of decryption to the false proof service provider that traces to the source, and decrypts the false proof ciphertext, obtains the unique identification information of product.The present invention makes full use of smart mobile phone, mobile Internet and block chain technology, double anti-forge is carried out by the anti-fake code on commodity and its outer packing, corresponding relation based on original packaging is encrypted, it is easy to quickly check falsfication, and comprehensive merchandise related information is obtained, it is finally reached the target of the production and the circulation that prevent fake and forged class commodity.
Description
Technical field
The present invention relates to commodity trace to the source and anti-counterfeiting technology, more particularly to a kind of false proof trace to the source mark and method, specifically
Say, the present invention relates to provide encryption key, the offline security product characteristic information of manufacturer, final consumption by the false proof service provider that traces to the source
Person, which decrypts, to be compared, and is traced to the source and false proof mark and method with realizing.
Background technology
In dispatching from the factory with sales process for commodity, anti-counterfeiting design, especially high-quality and famous-brand product or food are be unable to do without, is disappeared
Expense person requires reliably to trace to the source and false proof guarantee.In the Internet of things era, consumer's also further requirement is especially eaten to commodity
The relevant informations such as the production and transport of product possess right to know.In the prior art in the anti-counterfeit package design of commodity, not only in product
There are trade mark, various words and antifalsification label in outer box, also tend to be designed with various marks in itself in product.Such as in the market is sold
The egg sold, being carried except there is the information such as manufacturer, product brand on packing box, on each egg includes trade mark and production
The coding of trade name.Because the egg under organic free-ranging mode is compared with common cage egg, profile is similar but with higher
Price, counterfeit protection measures of the prior art are difficult to prevent illegal retailer from falsely using Anti-fake external package and commodity coding, with common cage
Poultry egg pretends to be organic free-ranging egg of high added value, adulterates, mixes the spurious with the genuine.
The coding on the shell of commodity before existing commodity sign method is mainly dispatched from the factory.The content of coding can be figure
With word addend combinatorics on words.Manufacturer attempts to improve counterfeit difficulty by the particularity of coding combination, and terminal is consumed
Person is mainly compared by naked eyes to discern the false from the genuine.Ye You companies release cell phone application, utilize the spray on camera items scanning shell
Code character is closed, and the true and false of security code is judged by smart mobile phone APP image recognition technology.
Such as:East Sea herding egg production cooperative society of Xiao Tang townshiies of Xiangshan County of Zhejiang Province uses food-grade prepared Chinese ink in the chicken of product
Trade mark, the name of an article and product batch number are uniformly stamped on egg, is tracked management to product quality while realizing false proof.
Shenzhen is shaken the commodity code-spraying equipment of wild commodity smart machine limited company exploitation, and trade mark can be sprayed on egg
Pattern and for distinguishing the source of egg and the character recognition code of date of manufacture.It is well known that the commodity that consumer is concerned about
Relevant information is difficult all to identify on commodity and its packing box.
Existing commodity sign method, by increasing counterfeit difficulty and counterfeit cost, it is difficult to thoroughly prevent counterfeit and personation
Behavior, compromise the interests of consumer and brand article manufacturer.So we need new preferably trace to the source and method for anti-counterfeit.
The content of the invention
False proof trace to the source mark and method proposed by the present invention, make full use of smart mobile phone, mobile Internet and block chain skill
Art, double anti-forge is carried out by the labeling on commodity and its outer packing and/or coding character, to knowing another characteristic letter for commodity
Cease and its between particular envelope coding, the corresponding relation based on original packaging is encrypted (i.e. can not again more after commodity mounted box
Transducer package box).The checking work of the present invention consumer of and can simplification simultaneously, is easy to quickly check falsfication, and obtain comprehensive business
Product relevant information, it is finally reached the target of the production and the circulation that prevent fake and forged class commodity.
The false proof mark of tracing to the source of one kind disclosed by the invention, including commodity can be attached to and/or be attached to the commodity
False proof ciphertext and anti-fake code on packing box;The false proof ciphertext is that calculating is encrypted as key by the anti-fake code
Gained afterwards;The false proof ciphertext includes the characteristic information of the commodity;When the false proof ciphertext is decrypted, you can judge the commodity
The true and false and/or obtain the information of tracing to the source of the commodity.
The described false proof ciphertext includes the characteristic information of the commodity, including following one or more than one kinds of group
Close:The natural bion feature of the commodity, the color of the commodity, resemblance, the random labelling artificially assigned, with the business
The real scene shooting picture or video that condition closes.
Described anti-fake code is rivest, shamir, adelman as the algorithm that calculating is encrypted in key, described false proof volume
A part for code or the anti-fake code is public key, and corresponding private key can only pass through acquisition request by consumer.
Described false proof ciphertext and anti-fake code and mutual corresponding relation, it is offline after being also encrypted to preserve.
A kind of false proof source tracing method disclosed by the invention, comprises the following steps:
Manufacturer applies for the key i.e. public key of more than one encryption to the false proof service provider that traces to the source;The false proof service of tracing to the source
The key that business generates more than one corresponding decryption simultaneously is private key, and encrypts keeping person's inquiry to be consumed;
The manufacturer generates unique identification information for each product of oneself, is then public affairs using an encryption key
Key generates false proof ciphertext after the unique identification information being encrypted calculating;Each product in same packing box is using same
Individual encryption key is public key to generate false proof ciphertext;
The manufacturer by the use of the encryption key be public key as a part for anti-fake code or anti-fake code and
By the anti-fake code coding on packing box;The false proof ciphertext coding on the corresponding product in the packing box or is adhered to
In the inside of the packing box and indicate the corresponding relation with the product of the package interior;
Consumer applies for the key i.e. private key of decryption to the false proof service provider that traces to the source, and uses the close of the decryption
Key is private key to decrypt the false proof ciphertext, the unique identification information of the acquisition each product.
In an embodiment of the present invention, also comprise the following steps:Manufacturer registers at the false proof service provider that traces to the source, and obtains
Obtain manufacturer's coding;And/or code-spraying equipment is registered by the false proof service provider that traces to the source, distribution code-spraying equipment coding.
Or also comprise the following steps in an embodiment of the present invention:The manufacturer is to the false proof service provider that traces to the source
There is provided one or more than one kinds of in the following information for the key i.e. batch products of public key for having used the encryption
Combination:Quantity, specification, technical parameter and the time of making the product of product;Then the false proof service provider that traces to the source is close by the encryption of granting
Key is that the related endowed information of public key is issued in block chain for inquiry;The decryption corresponding with the anti-fake code of activation simultaneously is close
The application of key and private key.
Described consumer to it is described it is false proof trace to the source service provider application decryption key i.e. private key when, first send the bag
Anti-fake code in mounted box gives the false proof service provider that traces to the source;And the false proof service provider that traces to the source successfully is providing the close of decryption
After key is private key, then destroy corresponding to private key;Or by the Status Change of the commodity corresponding to the packing box it is " consumption ".
Also comprise the following steps in an embodiment of the present invention:Anyone of commodity circulation links can be by the anti-fake code
The barcode scanning time, positional information is published in block chain;The information that consumer and dealer can be inquired about in block chain.
The false proof source tracing method of the present invention, product packing box are minimum commodity circulation unit, be recorded its dispatch from the factory,
In circulation and the state occupied to consumer.
False proof trace to the source mark and the method for the present invention, antifalsification label (such as Quick Response Code) and packing box in commodity outer packing
In each commodity feature identification information between there is the corresponding relation that can not change, and this feature information is encrypted, Du
The fraud of intermediate links absolutely, the quality of commodity is ensure that, reduce food safety risk.The feature recognition letter of each specific commodity
Breath (being typically natural bion feature or the random labelling artificially assigned) by preserving offline after encryption, nothing
Method is obtained privately by third party, and by mobile terminal devices such as smart mobile phones, consumer readily identifies the true and false of commodity, and obtains
The comprehensively relevant information of production and intermediate links is obtained, and there can only be a ultimate consumer to obtain decryption with private key to solve
Ciphertext is read, so as to the feature identification information of the quick obtaining commodity, is finally reached the production for preventing fake and forged class commodity and stream
Logical target.The solicited message that consumer uploads is collected by the false proof service provider that traces to the source, and can recognize commodity circulation and consumption whereby
Relevant information.
Brief description of the drawings
Fig. 1 is the workflow diagram of the false proof service provider that traces to the source in one embodiment of the invention.
Fig. 2 is the false proof flow chart of tracing to the source of the manufacturer of one embodiment of the invention.
Fig. 3 is that the consumer of one embodiment of the invention traces to the source flow chart.
Fig. 4 is the false proof flow chart of tracing to the source of the application program of one embodiment of the invention.
Fig. 5 is the code-spraying equipment workflow diagram of one embodiment of the invention.
Fig. 6 is dealer's workflow diagram of one embodiment of the invention.
Fig. 7 is the block chain workflow diagram of one embodiment of the invention.
Embodiment
The present invention will be further described in detail with specific embodiment below in conjunction with the accompanying drawings.
The false proof service provider that traces to the source is authenticated and registered to code-spraying equipment and commodity production business, and is respectively that they divide
With unique coding, such as code-spraying equipment A, commodity production business B.By taking the processing of egg product purged and packed as an example, by egg product manufacturer's
Own information system compiles a feature identification information to each egg.This feature identification information can be by above-mentioned A, B and date of manufacture
The composition such as information plus random number, flowing water value and check field, realizes one yard of an egg for each commodity (i.e.:Each commodity has
Unique identification information concentrates the feature identification information of the product, abbreviation X).
Unique identification information X can include the check field of itself a variety of verification scheme.Including but not limited to:
1st, the color verification of coding character.Shower nozzle can set a variety of coding colors, such as green, black and blueness.Often
Kind color sets a color coding, and writes in X field;
2nd, a check bit is added in X last position.For example, if some digits divided by 7 since the date, obtain
Remainder as check bit, be added in X last position, etc.;
3rd, commodity packaging system is weighed to each commodity automatically, takes first three digit (such as 43.21 of the commodity weight
Gram, value 432) as in weight check field write-in X;
4th, the random three-figure plain code numeral of spray one on commodity, and be recorded in X.
In commodity packaging, apply for that the Quick Response Code on the packing box identifies ID (having uniqueness) to the false proof service provider that traces to the source
Afterwards, by the use of Quick Response Code ID values as public key, the feature identification information X of the commodity loaded to each plan in the packing box is carried out
Encryption, obtains character string Y.Then character string Y is handled through code-spraying equipment, is automatically converted into bar code pattern, be sprayed on correspondingly
Commodity on.The false proof service provider that traces to the source can also automatically generate a private key while each packing box Quick Response Code ID is generated.
The latter is stored on the privately owned server of the false proof service provider that traces to the source.
After commodity packaging factory applies for Quick Response Code ID successes to the false proof service provider that traces to the source, the endowed information of each all can conduct
One record can write in block chain (record including but not limited to following field:Commodity factory title, merchandise news, the application time,
Packing specification, endowed ID), and the endowed information can not be changed, unsuppressible-suppression and forgery.
Ultimate consumer can be first scanned in outer box after commodity are bought with intelligent terminal (such as smart mobile phone)
Quick Response Code, then the endowed information by searching on block chain determine the authenticity and legitimacy (reason of the Quick Response Code:Trace to the source block
The endowed time of each Quick Response Code, and the time being activated after dispatching from the factory are have recorded on chain.When ultimate consumer successfully obtains
After corresponding private key, the Quick Response Code state is changed to " failure " automatically), then parse manufacturer information and it is endowed when
Between information.Then, consumer can be and privately owned using the false proof service provider that traces to the source with the bar code on the egg of any one in scan box
Character string Y contained by bar code is decrypted private key in database, so as to obtain X.Then the commodity packaging to being included in X again
Factory's information, date of manufacture information are compared with the information obtained from block chain, to judge whether both coincide.
Further, character string X includes encoding mechanism check logic set in advance.Sprayed simultaneously when being scanned such as mobile phone
Code image recognition, and verify the color code used in coding.If matching is errorless, for genuine piece.If wrong to not upper or parsing
By mistake, then it is judged as fake products.The false proof service provider that traces to the source to the intelligent terminal of ultimate consumer when private key is provided
Proof of identity can be carried out, it is ensured that private key only can be provided successfully once.After consumer successfully completes once false proof verification, the packaging
The state of commodity corresponding to box will be changed to " consumption ".Corresponding private key also can be from the privately owned clothes of the false proof service provider that traces to the source
It is engaged in destroying in device, so as to realize " burn-after-reading " of commodity counterfeit prevention information.
A kind of embodiment of false proof mark of tracing to the source, including be attached to commodity and/or be attached on the packing box of the commodity
False proof ciphertext and anti-fake code;The false proof ciphertext be by anti-fake code as key be encrypted calculating after gained;It is false proof close
Text includes the characteristic information of the commodity;When false proof ciphertext is decrypted, the characteristic information of the product, then the spy with the commodity are obtained
Sign compares, you can judges the true and false of the commodity and/or obtains the information of tracing to the source of the commodity.
Here anti-fake code is rivest, shamir, adelman as the algorithm that calculating is encrypted in key, described false proof volume
A part for code or the anti-fake code is public key, and corresponding private key could be obtained by customer requests.
The false proof ciphertext includes the characteristic information of the commodity, is the natural bion feature of the commodity, or
It is color, the resemblance information of the commodity, or the random labelling artificially assigned, or the real scene shooting picture of the commodity,
Or video.
The false proof ciphertext and anti-fake code and mutual corresponding relation of manufacturer's establishment, by encryption safely, offline guarantor
Deposit.
A kind of embodiment of false proof source tracing method, comprises the following steps:Manufacturer is some to false proof service provider's application of tracing to the source
The key of encryption is public key;Business men is again unique identification information corresponding to each product generation of oneself, then using one
Individual encryption key is to generate false proof ciphertext after public key the identification information is encrypted calculating;Product in same packing box is adopted
False proof ciphertext is generated with same encryption key is public key;Recycle the encryption key i.e. public key as anti-fake code or
A part for anti-fake code and by the anti-fake code coding on packing box;Again the false proof ciphertext coding in the packaging
On corresponding product in box or it is attached to the inside of the packing box and indicates the corresponding relation with the product of the package interior;
Consumer decrypts the false proof ciphertext, obtained described every to the key i.e. private key of false proof service provider's application decryption of tracing to the source
The unique identification information of one product.
When manufacturer to it is described it is false proof trace to the source service provider provide such as batch products quantity, specification and technical parameter,
And after the data of time of making the product etc. production and technical elements, the false proof corresponding anti-fake code of service provider's activation of tracing to the source is available for looking into
Ask, activate the decruption key i.e. private key of preservation for application.Manufacturer can be oneself with the private key of oneself to the false proof service of tracing to the source
The data that business provides are encrypted and digital signature.
When the false proof service provider that traces to the source is judged as the request first that legitimate consumer sends, then believed according to described anti-fake code
Breath returns to private key corresponding to the AES, when the false proof service provider that traces to the source confirms that the private key has successfully been provided, then destroy corresponding to
Private key;Or by the Status Change of the commodity corresponding to the packing box it is " consumption ".To ensure that each private key only can be by success
Granting and using once.Can be the new anti-fake code of the commodity application and false proof close if meeting with consumer and returning goods
Text, it is necessary to retract factory again and carry out secondary operation, cleaning coding, repack;There are the commodity or nondurable goods of shelf-life, move back
Directly commodity are destroyed after goods.
Manufacturer can also register at the false proof service provider that traces to the source, and obtain manufacturer's coding;And/or code-spraying equipment quilt
False proof service provider's registration of tracing to the source, distribution code-spraying equipment coding.
The false proof service provider that traces to the source is after having provided encryption key i.e. public key and having activated for inquiry, by related endowed information
Issue is in block chain;Any of commodity circulation links per capita can send out barcode scanning time, positional information and packing box anti-fake code
Cloth is into block chain;The false proof service provider that traces to the source (commodity production business or block chain), using the product packing box as minimum
Commodity circulation unit, record it and dispatch from the factory, in circulation and the state occupied to consumer.It is " endowed ", " respectively
Dispatch from the factory " and " consumption ".If the public key is obtained in block chain by counterfeiter, and for encrypting fake products, because not knowing
The specific AES in road, the ciphertext after encryption can not be untied with corresponding private key.
In the above-described embodiments, corresponding relation of the manufacturer based on original packaging is encrypted (i.e. can not after commodity mounted box
Packing box is changed again).The feature identification information (usual) of each specific commodity, can not be by third party by being preserved offline after encryption
Obtain privately, be finally reached the target of the production and the circulation that prevent fake and forged class commodity.Tracing to the source, it is each to have recorded on block chain
The endowed time of individual anti-fake code (public key), and the time being activated after dispatching from the factory.Corresponding to being successfully obtained as ultimate consumer
After private key, the anti-fake code state is changed to " failure " automatically.
The false proof service provider that traces to the source can carry out identity school when private key is provided to the intelligent terminal of ultimate consumer
Test, it is ensured that private key only can be provided successfully once.After consumer successfully completes once false proof verification, the business corresponding to the packing box
The state of product will be changed to " consumption ".Corresponding private key can also be destroyed from the privately owned server of the false proof service provider that traces to the source
Fall, so as to realize " burn-after-reading " of commodity counterfeit prevention information.
Unique features information corresponding to each so-called product, a three-figure plain code can be sprayed at random on commodity above
Numeral.Can also and will voluntarily it be compared by consumer after the external appearance characteristic information parsing of the commodity.Commodity are using packing box as minimum stream
Logical unit, it is " endowed ", " having dispatched from the factory " respectively and " has disappeared from dispatching from the factory to circulation, then to consumer, its condition of merchandise
Take ".With reference to the self registering timing node of different scanning persons and positional information, constitute the whole false proof retrospect traced to the source according to
According to.Ensureing product features identification information encryption, offline preservation safely.
In another embodiment of the present invention, code-spraying equipment manufacturer and commodity production business are carried out by Professional Certification mechanism
After certification and registration, distribute one respectively and be uniquely encoded to A and B.Commodity production business gives each commodity by built-in system
Compile a serial number.The rule of serial number can be that date of manufacture (YYYYMMDD) plus 8 bit stream water sequence numbers ultimately form a string
Total length is the character string of 32, consisting of ABC (reference length is 16) and 8 date codes add 8 serial numbers.
Wherein, the starting symbol of last 8 serial numbers is randomly generated.In addition, in 8 date codes and 8 serial numbers and then increasing
Add a check bit verified to this 16 bit value.Check logic is the remainder conduct that after this 16 digit divided by 7, will be obtained
Check number.
In commodity packaging, apply for that the Quick Response Code on the packing box identifies from commodity packaging factory to the false proof service provider that traces to the source
After (there is uniqueness), by the use of Quick Response Code ID values as public key, the feature identification information X of each commodity is encrypted,
Obtain character string Y.Then character string Y is handled through code-spraying equipment, is automatically converted into bar code pattern, is sprayed on corresponding commodity
On.
After commodity packaging factory applies for Quick Response Code success to the false proof service provider that traces to the source, the endowed information of each all can write area
(field of record includes in block chain:Commodity factory coding, application time, packing specification, endowed ID), and the information can not be more
Change, unsuppressible-suppression and forgery.
Ultimate consumer can be first scanned in outer box after commodity are bought with intelligent terminal (such as smart mobile phone)
Quick Response Code, then the endowed information by searching on block chain determine the authenticity of the Quick Response Code, then parse commodity factory information
With endowed temporal information.Then, consumer can scan the bar code on the commodity in any one box, and utilize false proof clothes of tracing to the source
Character string Y contained by bar code is decrypted private key in business business's built-in system, so as to obtain X.Then the business to being included in X again
Product packing factory information, date of manufacture information are compared with the information obtained from block chain, to judge whether both coincide.Then
Verify whether check bit is correct again.Can also and will voluntarily it be compared by consumer after the external appearance characteristic information parsing of the commodity.If
Above- mentioned information matches errorless, then is genuine piece.If to not upper or parsing mistake, it is judged as fake products.
The invention provides a kind of endowed feature recognition with each piece of commodity in the packing box of commodity outer packing Quick Response Code
Built between coding method between information, and both numbers can not forge, tripartite can not steal, consumer is easy to again
The false proof source tracing method of rapid verification.
This false proof source tracing method is by using block chain technology to factory corresponding to the Quick Response Code mark on producer's packing box
Business and endowed time are recorded, and can not be forged using block chained record information, the characteristic such as unsuppressible-suppression ensures the endowed information
It is genuine and believable, realize one yard of a box;
Production firm voluntarily carries out uniqueness coding (unique identification coding) by certain coding rule to each commodity, from
And realize one yard of a commodity;
During commodity packaging, rule of combination that different commodity are fitted into some specific packing box be it is random, still
The commodity and the direct corresponding relation of packing box are unique, and third party can not steal or speculate;
Ink jet numbering machine automatically encodes the unique identification of each commodity and carried out when coding is carried out to each specific commodity
Encryption (use rivest, shamir, adelman, preferably ECC, i.e. elliptic curve encryption algorithm), with bar code or other plain modes
It is sprayed on commodity shell.
As a result of public key of the part or all of field in the Quick Response Code ID of the packing box as encryption, so as to remember
The corresponding relation between the commodity and packing box loaded is recorded;The intelligent terminal of consumer is using private key to the bar shaped on commodity
Code information is decrypted, after obtaining the unique identifier of commodity, then to the tax in the information and packing box in the unique identifier
Code information is compared and logic verify, so as to judge the true and false of the commodity.
The basis of the uniqueness of identification code of the present invention on commodity packaging case is ensured and the uniqueness of each commodity code
On, by using asymmetric encryption, the cleverly part using public key information as the coding (Quick Response Code) of packing box, and it is private
Key information holds in close confidence in the process of circulation, so as to ensure that outer packing identification code and the encrypted generation of commodity code in packing box
Article code (bar code) between corresponding relation, can not be grasped by third party, it is also difficult to forged by third party.By this skill
Art, while ensureing the encryption of product features identification information safety, preserving offline, can also it allow ultimate consumer can be very easily
Verified, reduce the identification cost of consumer;Service provider and recognized by introducing false proof trace to the source with the third party of public credibility
Card mechanism carries out the false proof service of tracing to the source and authentication service to commodity production enterprise, then coordinates third party testing agency to commercial quality
Spot-check, improve the public credibility of commercial quality;Commodity production business can set the date of manufacture and shelf-life of every box commodity.
Quick Response Code on consumer scans' packing box can determine whether the box commodity whether within the shelf-life, and the remaining shelf-life is also more
Long;Coding on packing box need not be printed as Quick Response Code in kind by false proof service provider that traces to the source etc. or other types of antifalsification label enters
Row is in kind to be delivered, and is pasted onto without by security code label on packing material, but label coding electricity is voluntarily downloaded by processing enterprise
In packaging link voluntarily coding after sub-information, human resources are saved, have eliminated labeling cost.
It is the workflow diagram of the false proof service provider that traces to the source in one embodiment of the invention as shown in Figure 1, including:It is false proof to trace to the source
Service provider should apply issuing code-spraying equipment registration code A;It should apply issuing manufacturer's registration code B.And according to third party's detection machine
The quality testing record (or oneself detection) of structure, answers manufacturer to apply for that generation is uniquely corresponding to the high-quality of quality testing report
Prove code C.The false proof service provider that traces to the source answers the request of manufacturer to generate some keys for encrypting, decrypting, wherein encryption key
By by coding on the packing box of product, one yard of a box.Endowed information and high-quality proof code C issues are assigned in block chain again
Code information includes manufacturer ID, endowed time, packing box specification and packing box ID.It is false proof to trace to the source in circulation and process of consumption
Service provider receives the encryption key of consumer's upload, i.e., the coding on packing box, decrypted corresponding to according to the request of consumer
Key is sent to consumer;Requestor's relevant information of this inquiry is recorded simultaneously, and historical query number and place is also anti-
Feed a part of the consumer as information of tracing to the source.False proof trace to the source service provider's analysis of history inquiry times and place, find doubtful
Early warning is sent during counterfeit behavior, and after counterfeit product is identified, has the false proof service provider that traces to the source to take measures, such as in block
Warning message, or even legal means are issued in chain.
It is the false proof flow chart of tracing to the source of the manufacturer of one embodiment of the invention as shown in Figure 2, including:Manufacturer obtains first
Obtain the coding from the false proof service provider that traces to the source:Having code-spraying equipment coding A, (each code-spraying equipment need to register the color kind of print cartridge
One of class, the foundation as built-in check) and manufacturer's coding B.Secondly, manufacturer be certain batch products Bid-winning rate detect or
Person provides testing result application high-quality proof code C.Batch products quantity, specification and the technical parameter are also provided in case consumer and
Dealer inquires about.It is each simultaneously to false proof key of service provider's application corresponding to encryption, the decryption of product packaging quantity of tracing to the source
Individual product packaging corresponds to a pair of encryption keys and decruption key.Manufacturer is feature corresponding to each product generation of oneself
Code-spraying equipment coding A, manufacturer coding B and high-quality proof code C can be included in identification information X, this feature identification information X, also
The characteristic informations such as picture or the video of product can be included, meter is then encrypted to identification information X using encryption key
Encrypted cipher text Y is generated after calculation;Again encryption key coding on packing box;Encrypted cipher text Y codings on product;Packing box with
Product is delivered after uniquely corresponding to packaging in box.Barcode scanning changes condition of merchandise.
It is that the consumer of one embodiment of the invention traces to the source flow chart as shown in Figure 3, including:Consumer passes through coding first
Encryption key on packing box links and obtains corresponding endowed information and high-quality proof code C in block chain, is therefrom given birth to
The information such as the data of business men and product correlation.The false proof service provider that traces to the source is linked by encryption key of the coding on packing box again,
Decruption key corresponding to acquisition, and local information is uploaded to the false proof service provider that traces to the source.By decruption key to coding on product
Encrypted cipher text Y be decrypted, obtain the product information contained in encrypted cipher text Y, be compared with the feature of product, with block
The information obtained in chain is compared, so as to judge the true and false.
It is the false proof flow chart of tracing to the source of the application program of one embodiment of the invention as shown in Figure 4, this application program can
With the application program being mounted in the APP or special equipment in smart mobile phone or tablet personal computer.Traced back into false proof
After the function of source, including:The coding (encryption key) on packing box is read in prompting, the code of the reading is verified, if passed through
The relevant information that verification is then searched in block chain;Correspond to the related information of the batch products, including bag in display block chain
The endowed information of mounted box, associated production business information, the type counterfeit goodses information warning and high-quality proof code C;To false proof clothes of tracing to the source
The private key for business's application correlation of being engaged in.The coding that prompting is read on product is encrypted cipher text Y;Use the private from the false proof service provider that traces to the source
Encrypted cipher text Y is decrypted key, the Product Feature Information that display decryption obtains;Then with the information and packing box in block chain
In product be compared, be either prompted to consumer estimate compare or provide options for consumer estimate commodity provide
Answer, so as to obtain corresponding false proof information and the conclusion of tracing to the source.
It is the code-spraying equipment workflow diagram of one embodiment of the invention as shown in Figure 5, including:Code-spraying equipment is close encrypting
Key is automatically converted into Quick Response Code coding on packing box.Code-spraying equipment also adds unique identification information corresponding to each product
Ciphertext Y is automatically converted into Quick Response Code coding on product.Bar code or Quick Response Code can also be not converted into directly to spray coding
On the packing box and product of code.The corresponding relation of product in packing box and packing box is unique, not modifiable.Encrypt close
Literary Y or its coding can also coding at the inside of packing box or other positions.
It is dealer's workflow diagram of one embodiment of the invention as shown in Figure 6, after dealer stocks up, scans product bag
The Quick Response Code loaded onto, the endowed information in block chain is obtained, channel information compares with stocking up, and judges the true and false, and packing box is compiled
Code, barcode scanning time, (dealer is assigned with proving the private key of oneself identity to position information addition block chain, by block
Multiple common recognition nodes verification on chain can be used as new circulation record after and be received by block chain).Each dealer is equal
Can the voluntarily storage of record product, restocking and sales information.
It is the block chain workflow diagram of one embodiment of the invention as shown in Figure 7, including:Block chain receives false proof trace to the source
The endowed information of service provider's issue, including manufacturer ID, endowed time, packing box specification, packing box ID, the related batch products
Detection information, high-quality proof code C etc.;After verifying manufacturer's identity, the time of making the product of endowed commodity is recorded.Searched for according to request
Corresponding record in block chain, the endowed information of correlation is returned to requestor, and the circulation status information of such commodity, containing going through
The identity information of time of secondary barcode scanning, positional information and barcode scanning people.
Claims (10)
1. a kind of false proof mark of tracing to the source, it is characterised in that including that can be attached to commodity and/or be attached to the packaging of the commodity
False proof ciphertext and anti-fake code on box;The false proof ciphertext be by the anti-fake code as key be encrypted calculating after institute
;The false proof ciphertext includes the characteristic information of the commodity;When the false proof ciphertext is decrypted, you can judge the true of the commodity
Information of tracing to the source that is pseudo- and/or obtaining the commodity.
2. false proof mark of tracing to the source as claimed in claim 1, it is characterised in that the described false proof ciphertext includes the commodity
Characteristic information, including following one or more than one kinds of combination:The natural bion feature of the commodity, the commodity
Color, resemblance, the random labelling artificially assigned, the real scene shooting picture related to the commodity or video.
3. false proof mark of tracing to the source as claimed in claim 1, it is characterised in that described anti-fake code is encrypted as key
The algorithm of calculating is rivest, shamir, adelman, and a part for described anti-fake code or the anti-fake code is public key, corresponding private
Key can only pass through acquisition request by consumer.
4. false proof mark of tracing to the source as claimed in claim 1, it is characterised in that described false proof ciphertext and anti-fake code and
Mutual corresponding relation, it is offline after being also encrypted to preserve.
5. a kind of false proof source tracing method, it is characterised in that comprise the following steps:
Manufacturer applies for the key i.e. public key of more than one encryption to the false proof service provider that traces to the source;The false proof service provider that traces to the source is same
The key of more than one decryption is private key corresponding to Shi Shengcheng, and encrypts keeping person's inquiry to be consumed;
The manufacturer generates unique identification information for each product of oneself, is then public key pair using an encryption key
The unique identification information generates false proof ciphertext after calculating is encrypted;Each product in same packing box is added using same
Key is public key to generate false proof ciphertext;
The manufacturer, which by the use of the encryption key is public key, is used as a part for anti-fake code or anti-fake code and should
Anti-fake code coding is on packing box;The false proof ciphertext coding on the corresponding product in the packing box or is attached to institute
State the inside of packing box and indicate the corresponding relation with the product of the package interior;
Consumer applies for the key i.e. private key of decryption to the false proof service provider that traces to the source, and is using the key of the decryption
Private key decrypts the false proof ciphertext, obtains the unique identification information of each product.
6. false proof source tracing method as claimed in claim 5, it is characterised in that also comprise the following steps:Manufacturer traces back false proof
Registered at the service provider of source, obtain manufacturer's coding;And/or code-spraying equipment is registered by the false proof service provider that traces to the source, distribution
Code-spraying equipment encodes.
7. false proof source tracing method as claimed in claim 5, it is characterised in that also comprise the following steps:The manufacturer is to institute
State it is false proof trace to the source service provider provide used the encryption the key i.e. batch products of public key following information in one
Kind or more than one combination:Quantity, specification, technical parameter and the time of making the product of product;The then false proof service of tracing to the source
Business issues the related endowed information that the encryption key of granting is public key in block chain for inquiry;Simultaneously activation with it is described false proof
Decruption key corresponding to coding is the application of private key.
8. false proof source tracing method as claimed in claim 7, it is characterised in that described consumer is to the false proof service of tracing to the source
When the key of business's application decryption is private key, the anti-fake code on the packing box is first sent to the false proof service provider that traces to the source;
It is described it is false proof trace to the source service provider successfully provide decryption key i.e. private key after, then destroy corresponding to private key;Or this is wrapped
The Status Change of commodity corresponding to mounted box is " consumption ".
9. false proof source tracing method as claimed in claim 7, it is characterised in that also comprise the following steps:Commodity circulation links
The barcode scanning time of the anti-fake code, positional information can be published in block chain by anyone;Consumer and dealer can look into
Ask the information in block chain.
10. false proof source tracing method as claimed in claim 7, it is characterised in that a described product packing box is minimum
Commodity circulation unit, it is recorded it and dispatches from the factory, in circulation and the state occupied to consumer.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710582450.XA CN107341676A (en) | 2017-07-17 | 2017-07-17 | False proof mark and the method for tracing to the source |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710582450.XA CN107341676A (en) | 2017-07-17 | 2017-07-17 | False proof mark and the method for tracing to the source |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107341676A true CN107341676A (en) | 2017-11-10 |
Family
ID=60219852
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710582450.XA Pending CN107341676A (en) | 2017-07-17 | 2017-07-17 | False proof mark and the method for tracing to the source |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107341676A (en) |
Cited By (48)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108055125A (en) * | 2017-11-23 | 2018-05-18 | 阿里巴巴集团控股有限公司 | A kind of encryption and decryption method and device of product information |
CN108596636A (en) * | 2018-04-20 | 2018-09-28 | 中国联合网络通信集团有限公司 | Method for anti-counterfeit, device and terminal device |
CN108629603A (en) * | 2018-05-07 | 2018-10-09 | 烟台大学 | A kind of antiforge method for commodities based on Quick Response Code |
CN108694594A (en) * | 2018-05-29 | 2018-10-23 | 阿里巴巴集团控股有限公司 | Commodity source tracing method and device, electronic equipment based on block chain |
CN108734480A (en) * | 2018-05-22 | 2018-11-02 | 四川海纳仁东科技有限公司 | Red wine scarcity method of proof based on block chain |
CN108830617A (en) * | 2018-06-12 | 2018-11-16 | 黑启栋 | Super code anti-counterfeiting method and system based on block chain |
CN108839977A (en) * | 2018-06-08 | 2018-11-20 | 湖南万容普联再生资源有限公司 | A kind of system of Waste sorting recycle, method and device |
CN108876401A (en) * | 2018-05-29 | 2018-11-23 | 阿里巴巴集团控股有限公司 | Commodity Claims Resolution method and device, electronic equipment based on block chain |
CN108985785A (en) * | 2018-04-03 | 2018-12-11 | 东莞市天眼网络科技有限公司 | A method of Comodity anti-fake system and examination commodity true and false based on block chain |
CN109102305A (en) * | 2018-08-06 | 2018-12-28 | 程昔恩 | A kind of article anti-counterfeit and source tracing method realized using block chain and its intelligent contract |
CN109214829A (en) * | 2018-08-02 | 2019-01-15 | 佛山鑫达智汇科技有限公司 | Food safety source tracing method and device |
CN109308621A (en) * | 2018-05-27 | 2019-02-05 | 成都零光量子科技有限公司 | A kind of safe and efficient product false proof and recognition methods |
CN109347632A (en) * | 2018-10-23 | 2019-02-15 | 北京金山安全软件有限公司 | Block chain ID generation and use method, device, electronic equipment and storage medium |
CN109345256A (en) * | 2018-09-14 | 2019-02-15 | 北京清大智信科技有限公司 | A kind of false proof device of the credible transaction of collectibles, method and system |
CN109816401A (en) * | 2019-01-17 | 2019-05-28 | 柳州康云互联科技有限公司 | A kind of product traceability and anti-counterfeiting system and method based on two dimensional code |
CN109886685A (en) * | 2019-02-28 | 2019-06-14 | 易齐盈(重庆)电子商务有限公司 | A kind of commodity tracing system and method based on block chain |
CN109951427A (en) * | 2017-12-21 | 2019-06-28 | 航天信息股份有限公司 | A kind of product traceability method and system, cloud are traced to the source platform |
CN109978727A (en) * | 2019-03-28 | 2019-07-05 | 上海荷福人工智能科技(集团)有限公司 | A kind of AI intelligent building operation platform |
CN110020798A (en) * | 2019-03-28 | 2019-07-16 | 上海荷福人工智能科技(集团)有限公司 | A kind of approaches to IM of tracing to the source of the project progress based on artificial intelligence |
CN110097378A (en) * | 2019-04-24 | 2019-08-06 | 杭州宇链科技有限公司 | A kind of commodity transaction record and circulation motivational techniques based on block chain technology |
CN110222053A (en) * | 2019-05-21 | 2019-09-10 | 深圳壹账通智能科技有限公司 | A kind of acquisition methods and relevant device of the data of tracing to the source based on block chain |
CN110232574A (en) * | 2019-05-07 | 2019-09-13 | 中国平安财产保险股份有限公司 | Product Validation method, apparatus, equipment and storage medium based on block chain |
CN110472116A (en) * | 2018-04-28 | 2019-11-19 | 腾讯科技(深圳)有限公司 | Alliance's block chain business network and its federation node, product data storage method |
CN110472973A (en) * | 2018-05-09 | 2019-11-19 | 成都众宜天成科技有限公司 | Fruit monitoring administration method based on block chain |
CN110503438A (en) * | 2019-07-10 | 2019-11-26 | 王伟林 | A kind of production anti-fake traceability system and method based on block chain |
CN110535819A (en) * | 2018-10-22 | 2019-12-03 | 朱胜 | A kind of application method of asymmetric encryption techniques on block chain is anti-fake |
CN110599205A (en) * | 2019-09-19 | 2019-12-20 | 腾讯科技(深圳)有限公司 | Product anti-counterfeiting method, device, storage medium and computer equipment |
CN110633922A (en) * | 2018-05-31 | 2019-12-31 | 北京京东尚科信息技术有限公司 | Information verification method and system |
CN110659332A (en) * | 2019-10-12 | 2020-01-07 | 链农(深圳)信息科技有限公司 | Video recording system and method based on block chain |
CN110728524A (en) * | 2018-07-16 | 2020-01-24 | 北京鸥鹏物联技术服务有限公司 | Article tracing method, electronic device and readable storage medium |
CN110766421A (en) * | 2019-10-21 | 2020-02-07 | 深圳市炳德区块链技术有限公司 | Commodity anti-counterfeiting method and device based on block chain |
CN110852764A (en) * | 2019-11-14 | 2020-02-28 | 微企智联科技(广州)有限公司 | Anti-counterfeiting traceable product identification device and method based on block chain technology |
CN110889477A (en) * | 2018-08-15 | 2020-03-17 | 齐爱民 | Commodity anti-counterfeiting code generation method based on block chain |
CN111259418A (en) * | 2018-09-05 | 2020-06-09 | 贝富(广州)新技术有限公司 | Anti-counterfeiting method, system and storage medium based on block chain |
CN111400779A (en) * | 2020-01-07 | 2020-07-10 | 李蕴光 | High-dimensional data encryption method and system |
US10719884B2 (en) | 2018-03-30 | 2020-07-21 | Alibaba Group Holding Limited | Blockchain-based service execution method and apparatus, and electronic device |
CN111445268A (en) * | 2020-03-29 | 2020-07-24 | 武汉积墨包装印刷有限公司 | Printing ink tracing method based on block chain and 5G communication |
CN111539502A (en) * | 2020-03-25 | 2020-08-14 | 中国平安财产保险股份有限公司 | Anti-counterfeiting two-dimensional code generation method and device, server and storage medium |
CN111598591A (en) * | 2020-05-25 | 2020-08-28 | 汉中本密科技有限公司 | Product anti-counterfeiting method and system |
CN111639729A (en) * | 2020-05-28 | 2020-09-08 | 深圳威尔智能系统有限公司 | Anti-counterfeiting tracing method based on RFID and block chain |
CN111833071A (en) * | 2019-03-26 | 2020-10-27 | 财团法人亚洲大学 | Method for establishing and inquiring production and marketing histories for quality assurance of agricultural products |
CN112365271A (en) * | 2020-11-04 | 2021-02-12 | 广东未来信息有限公司 | Liquefied petroleum gas cylinder traceability system and method based on block chain, information data processing terminal and computer readable storage medium |
CN112862047A (en) * | 2021-02-06 | 2021-05-28 | 陈永林 | Double-authorization intelligent anti-counterfeit label generation method |
CN112990944A (en) * | 2021-03-22 | 2021-06-18 | 北京电信规划设计院有限公司 | External package anti-counterfeiting method adopting digital codes and Internet of things double labels |
CN113077268A (en) * | 2021-04-02 | 2021-07-06 | 西南石油大学 | Agricultural product information traceability system and method based on NFC and block chain |
CN113140256A (en) * | 2020-01-20 | 2021-07-20 | 深圳华大智造科技有限公司 | Substance DNA tracing method |
CN114140132A (en) * | 2021-11-24 | 2022-03-04 | 芯电智联(北京)科技有限公司 | Anti-counterfeiting traceability system |
CN115329919A (en) * | 2022-10-08 | 2022-11-11 | 北京微点科学技术有限公司 | Random additional point anti-counterfeiting method and device based on micro-point code |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103729770A (en) * | 2013-12-26 | 2014-04-16 | 重庆文理学院 | Novel anti-fake traceability system and method |
CN104091272A (en) * | 2014-07-09 | 2014-10-08 | 北京信长城技术研究院 | Identifying and tracing system with unique identity and method |
CN105976192A (en) * | 2016-05-10 | 2016-09-28 | 深圳市云天星光数字技术有限公司 | Anti-fake method and system employing multi-layer marking codes in mutual combination |
CN106022187A (en) * | 2016-05-13 | 2016-10-12 | 成都陌云科技有限公司 | High-efficient O2O implementation method |
CN106557933A (en) * | 2016-10-28 | 2017-04-05 | 国芯科技(北京)有限公司 | Product false proof source tracing method and product false proof traceability system |
CN106570710A (en) * | 2016-10-27 | 2017-04-19 | 纸飞机(北京)科技有限公司 | Commodity anti-counterfeiting method and device |
-
2017
- 2017-07-17 CN CN201710582450.XA patent/CN107341676A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103729770A (en) * | 2013-12-26 | 2014-04-16 | 重庆文理学院 | Novel anti-fake traceability system and method |
CN104091272A (en) * | 2014-07-09 | 2014-10-08 | 北京信长城技术研究院 | Identifying and tracing system with unique identity and method |
CN105976192A (en) * | 2016-05-10 | 2016-09-28 | 深圳市云天星光数字技术有限公司 | Anti-fake method and system employing multi-layer marking codes in mutual combination |
CN106022187A (en) * | 2016-05-13 | 2016-10-12 | 成都陌云科技有限公司 | High-efficient O2O implementation method |
CN106570710A (en) * | 2016-10-27 | 2017-04-19 | 纸飞机(北京)科技有限公司 | Commodity anti-counterfeiting method and device |
CN106557933A (en) * | 2016-10-28 | 2017-04-05 | 国芯科技(北京)有限公司 | Product false proof source tracing method and product false proof traceability system |
Cited By (74)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108055125A (en) * | 2017-11-23 | 2018-05-18 | 阿里巴巴集团控股有限公司 | A kind of encryption and decryption method and device of product information |
CN108055125B (en) * | 2017-11-23 | 2020-06-30 | 阿里巴巴集团控股有限公司 | Method and device for encrypting and decrypting product information |
WO2019100872A1 (en) * | 2017-11-23 | 2019-05-31 | 阿里巴巴集团控股有限公司 | Method and apparatus for encrypting and decrypting product information |
CN111865586B (en) * | 2017-11-23 | 2023-01-10 | 创新先进技术有限公司 | Method and device for encrypting product information |
US10778427B2 (en) | 2017-11-23 | 2020-09-15 | Alibaba Group Holding Limited | Method and apparatus for encrypting and decrypting product information |
CN111865586A (en) * | 2017-11-23 | 2020-10-30 | 创新先进技术有限公司 | Method and device for encrypting product information |
TWI712916B (en) * | 2017-11-23 | 2020-12-11 | 開曼群島商創新先進技術有限公司 | Encryption and decryption method and device for product information and its electronic equipment and computer readable storage medium |
CN109951427B (en) * | 2017-12-21 | 2021-04-16 | 航天信息股份有限公司 | Product tracing method and system and cloud tracing platform |
CN109951427A (en) * | 2017-12-21 | 2019-06-28 | 航天信息股份有限公司 | A kind of product traceability method and system, cloud are traced to the source platform |
US11049188B2 (en) | 2018-03-30 | 2021-06-29 | Advanced New Technologies Co., Ltd. | Blockchain-based service execution method and apparatus, and electronic device |
US11113769B2 (en) | 2018-03-30 | 2021-09-07 | Advanced New Technologies Co., Ltd. | Blockchain-based service execution method and apparatus, and electronic device |
US10719884B2 (en) | 2018-03-30 | 2020-07-21 | Alibaba Group Holding Limited | Blockchain-based service execution method and apparatus, and electronic device |
CN108985785A (en) * | 2018-04-03 | 2018-12-11 | 东莞市天眼网络科技有限公司 | A method of Comodity anti-fake system and examination commodity true and false based on block chain |
CN108596636A (en) * | 2018-04-20 | 2018-09-28 | 中国联合网络通信集团有限公司 | Method for anti-counterfeit, device and terminal device |
CN110472116A (en) * | 2018-04-28 | 2019-11-19 | 腾讯科技(深圳)有限公司 | Alliance's block chain business network and its federation node, product data storage method |
CN108629603B (en) * | 2018-05-07 | 2021-09-21 | 烟台大学 | Commodity anti-counterfeiting method based on two-dimensional code |
CN108629603A (en) * | 2018-05-07 | 2018-10-09 | 烟台大学 | A kind of antiforge method for commodities based on Quick Response Code |
CN110472973A (en) * | 2018-05-09 | 2019-11-19 | 成都众宜天成科技有限公司 | Fruit monitoring administration method based on block chain |
CN108734480A (en) * | 2018-05-22 | 2018-11-02 | 四川海纳仁东科技有限公司 | Red wine scarcity method of proof based on block chain |
CN109308621A (en) * | 2018-05-27 | 2019-02-05 | 成都零光量子科技有限公司 | A kind of safe and efficient product false proof and recognition methods |
US11023981B2 (en) | 2018-05-29 | 2021-06-01 | Advanced New Technologies Co., Ltd. | Blockchain-based commodity claim method and apparatus, and electronic device |
AU2019204054C1 (en) * | 2018-05-29 | 2021-05-27 | Advanced New Technologies Co., Ltd. | Blockchain-based commodity claim method and apparatus, and electronic device |
CN108694594A (en) * | 2018-05-29 | 2018-10-23 | 阿里巴巴集团控股有限公司 | Commodity source tracing method and device, electronic equipment based on block chain |
TWI706347B (en) * | 2018-05-29 | 2020-10-01 | 香港商阿里巴巴集團服務有限公司 | Block chain-based commodity claim settlement method and device, and electronic equipment |
CN108876401B (en) * | 2018-05-29 | 2022-03-01 | 创新先进技术有限公司 | Commodity claim settlement method and device based on block chain and electronic equipment |
AU2019204063B2 (en) * | 2018-05-29 | 2020-11-26 | Advanced New Technologies Co., Ltd. | Blockchain-based merchandise tracing methods and apparatus |
US10922757B2 (en) | 2018-05-29 | 2021-02-16 | Advanced New Technologies Co., Ltd. | Blockchain-based commodity claim method and apparatus, and electronic device |
AU2019204054B2 (en) * | 2018-05-29 | 2020-09-10 | Advanced New Technologies Co., Ltd. | Blockchain-based commodity claim method and apparatus, and electronic device |
AU2019204063C1 (en) * | 2018-05-29 | 2021-05-13 | Advanced New Technologies Co., Ltd. | Blockchain-based merchandise tracing methods and apparatus |
CN108876401A (en) * | 2018-05-29 | 2018-11-23 | 阿里巴巴集团控股有限公司 | Commodity Claims Resolution method and device, electronic equipment based on block chain |
CN110633922B (en) * | 2018-05-31 | 2023-11-07 | 北京京东尚科信息技术有限公司 | Information verification method and system |
CN110633922A (en) * | 2018-05-31 | 2019-12-31 | 北京京东尚科信息技术有限公司 | Information verification method and system |
CN108839977A (en) * | 2018-06-08 | 2018-11-20 | 湖南万容普联再生资源有限公司 | A kind of system of Waste sorting recycle, method and device |
CN108830617A (en) * | 2018-06-12 | 2018-11-16 | 黑启栋 | Super code anti-counterfeiting method and system based on block chain |
CN110728524A (en) * | 2018-07-16 | 2020-01-24 | 北京鸥鹏物联技术服务有限公司 | Article tracing method, electronic device and readable storage medium |
CN109214829A (en) * | 2018-08-02 | 2019-01-15 | 佛山鑫达智汇科技有限公司 | Food safety source tracing method and device |
CN109214829B (en) * | 2018-08-02 | 2021-09-17 | 河北同福健康产业有限公司 | Food safety tracing method and device |
CN109102305A (en) * | 2018-08-06 | 2018-12-28 | 程昔恩 | A kind of article anti-counterfeit and source tracing method realized using block chain and its intelligent contract |
CN109102305B (en) * | 2018-08-06 | 2022-03-29 | 程昔恩 | Article anti-counterfeiting and tracing method realized by block chain and intelligent contract thereof |
CN110889477A (en) * | 2018-08-15 | 2020-03-17 | 齐爱民 | Commodity anti-counterfeiting code generation method based on block chain |
CN111259418A (en) * | 2018-09-05 | 2020-06-09 | 贝富(广州)新技术有限公司 | Anti-counterfeiting method, system and storage medium based on block chain |
CN109345256A (en) * | 2018-09-14 | 2019-02-15 | 北京清大智信科技有限公司 | A kind of false proof device of the credible transaction of collectibles, method and system |
CN110535819A (en) * | 2018-10-22 | 2019-12-03 | 朱胜 | A kind of application method of asymmetric encryption techniques on block chain is anti-fake |
CN109347632A (en) * | 2018-10-23 | 2019-02-15 | 北京金山安全软件有限公司 | Block chain ID generation and use method, device, electronic equipment and storage medium |
CN109816401A (en) * | 2019-01-17 | 2019-05-28 | 柳州康云互联科技有限公司 | A kind of product traceability and anti-counterfeiting system and method based on two dimensional code |
CN109886685A (en) * | 2019-02-28 | 2019-06-14 | 易齐盈(重庆)电子商务有限公司 | A kind of commodity tracing system and method based on block chain |
CN111833071A (en) * | 2019-03-26 | 2020-10-27 | 财团法人亚洲大学 | Method for establishing and inquiring production and marketing histories for quality assurance of agricultural products |
CN110020798A (en) * | 2019-03-28 | 2019-07-16 | 上海荷福人工智能科技(集团)有限公司 | A kind of approaches to IM of tracing to the source of the project progress based on artificial intelligence |
CN109978727A (en) * | 2019-03-28 | 2019-07-05 | 上海荷福人工智能科技(集团)有限公司 | A kind of AI intelligent building operation platform |
CN110097378A (en) * | 2019-04-24 | 2019-08-06 | 杭州宇链科技有限公司 | A kind of commodity transaction record and circulation motivational techniques based on block chain technology |
CN110232574A (en) * | 2019-05-07 | 2019-09-13 | 中国平安财产保险股份有限公司 | Product Validation method, apparatus, equipment and storage medium based on block chain |
CN110222053A (en) * | 2019-05-21 | 2019-09-10 | 深圳壹账通智能科技有限公司 | A kind of acquisition methods and relevant device of the data of tracing to the source based on block chain |
CN110503438A (en) * | 2019-07-10 | 2019-11-26 | 王伟林 | A kind of production anti-fake traceability system and method based on block chain |
CN110599205A (en) * | 2019-09-19 | 2019-12-20 | 腾讯科技(深圳)有限公司 | Product anti-counterfeiting method, device, storage medium and computer equipment |
CN110659332A (en) * | 2019-10-12 | 2020-01-07 | 链农(深圳)信息科技有限公司 | Video recording system and method based on block chain |
CN110766421A (en) * | 2019-10-21 | 2020-02-07 | 深圳市炳德区块链技术有限公司 | Commodity anti-counterfeiting method and device based on block chain |
CN110852764A (en) * | 2019-11-14 | 2020-02-28 | 微企智联科技(广州)有限公司 | Anti-counterfeiting traceable product identification device and method based on block chain technology |
CN111400779A (en) * | 2020-01-07 | 2020-07-10 | 李蕴光 | High-dimensional data encryption method and system |
CN113140256A (en) * | 2020-01-20 | 2021-07-20 | 深圳华大智造科技有限公司 | Substance DNA tracing method |
CN111539502A (en) * | 2020-03-25 | 2020-08-14 | 中国平安财产保险股份有限公司 | Anti-counterfeiting two-dimensional code generation method and device, server and storage medium |
CN111445268A (en) * | 2020-03-29 | 2020-07-24 | 武汉积墨包装印刷有限公司 | Printing ink tracing method based on block chain and 5G communication |
CN111598591A (en) * | 2020-05-25 | 2020-08-28 | 汉中本密科技有限公司 | Product anti-counterfeiting method and system |
CN111639729A (en) * | 2020-05-28 | 2020-09-08 | 深圳威尔智能系统有限公司 | Anti-counterfeiting tracing method based on RFID and block chain |
CN111639729B (en) * | 2020-05-28 | 2023-10-27 | 深圳威尔智能系统有限公司 | RFID and blockchain-based anti-counterfeiting tracing method |
CN112365271A (en) * | 2020-11-04 | 2021-02-12 | 广东未来信息有限公司 | Liquefied petroleum gas cylinder traceability system and method based on block chain, information data processing terminal and computer readable storage medium |
CN112862047B (en) * | 2021-02-06 | 2023-09-15 | 陈永林 | Dual-authorization intelligent anti-counterfeit label generation method |
CN112862047A (en) * | 2021-02-06 | 2021-05-28 | 陈永林 | Double-authorization intelligent anti-counterfeit label generation method |
CN112990944B (en) * | 2021-03-22 | 2024-03-22 | 北京电信规划设计院有限公司 | External packing anti-counterfeiting method adopting digital codes and internet of things double labels |
CN112990944A (en) * | 2021-03-22 | 2021-06-18 | 北京电信规划设计院有限公司 | External package anti-counterfeiting method adopting digital codes and Internet of things double labels |
CN113077268B (en) * | 2021-04-02 | 2022-09-09 | 西南石油大学 | Agricultural product information traceability system and method based on NFC and block chain |
CN113077268A (en) * | 2021-04-02 | 2021-07-06 | 西南石油大学 | Agricultural product information traceability system and method based on NFC and block chain |
CN114140132A (en) * | 2021-11-24 | 2022-03-04 | 芯电智联(北京)科技有限公司 | Anti-counterfeiting traceability system |
CN115329919B (en) * | 2022-10-08 | 2023-05-12 | 北京微点科学技术有限公司 | Random additional point anti-counterfeiting method and device based on micro point code |
CN115329919A (en) * | 2022-10-08 | 2022-11-11 | 北京微点科学技术有限公司 | Random additional point anti-counterfeiting method and device based on micro-point code |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107341676A (en) | False proof mark and the method for tracing to the source | |
US7614546B2 (en) | Method and system for deterring product counterfeiting, diversion and piracy | |
US8421593B2 (en) | Apparatus, systems and methods for authentication of objects having multiple components | |
EP0996928B1 (en) | Verification of authenticity of goods by use of random numbers | |
US7996319B2 (en) | Authentication and tracking system | |
CN104854642B (en) | For the method and apparatus using physical features mark manufacture article | |
US8615470B2 (en) | Authentication and tracking system | |
US9010654B2 (en) | Monitoring moving articles | |
US20080011841A1 (en) | System and Method of Detecting Product Code Duplication and Product Diversion | |
US20140122353A1 (en) | Methods and systems for making, tracking and authentication of products | |
CN104574119B (en) | A kind of method that commodity Jianzhen traces to the source | |
CN106971311A (en) | A kind of false proof traceability system of logistics Means of Agricultural Production and method | |
US20130024387A1 (en) | Systems and Methods for Tracking Assigned Code Strings | |
US20130317996A1 (en) | Systems and Methods for Tracking Status of Random Unique Code Strings and Generation of Random Unique Code Strings |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20171110 |
|
RJ01 | Rejection of invention patent application after publication |