CN107918873A - Item authentication plateform system and item authentication management system - Google Patents

Item authentication plateform system and item authentication management system Download PDF

Info

Publication number
CN107918873A
CN107918873A CN201711130513.4A CN201711130513A CN107918873A CN 107918873 A CN107918873 A CN 107918873A CN 201711130513 A CN201711130513 A CN 201711130513A CN 107918873 A CN107918873 A CN 107918873A
Authority
CN
China
Prior art keywords
private key
item authentication
merchandise news
commodity
fake code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201711130513.4A
Other languages
Chinese (zh)
Inventor
吕锋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Miaolian Digital Technology Co., Ltd.
Original Assignee
吕锋
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 吕锋 filed Critical 吕锋
Priority to CN201711130513.4A priority Critical patent/CN107918873A/en
Publication of CN107918873A publication Critical patent/CN107918873A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • G06Q30/0185Product, service or business identity fraud
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • H04L9/3249Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using RSA or related signature schemes, e.g. Rabin scheme

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Business, Economics & Management (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Economics (AREA)
  • Accounting & Taxation (AREA)
  • Development Economics (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Finance (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention provides a kind of item authentication plateform system and item authentication management system, it is related to item authentication technical field.Public private key pair in the present invention possesses one-to-one corresponding and asymmetrical feature., can and can only be by corresponding public key decryptions by the information of private key encryption.Private key is calculated by the way that public key is hardly possible.Meanwhile the public key in the embodiment of the present invention is stored in item authentication platform, private key stores on the subscriber terminal, both are stored separately, and item authentication platform can not obtain private key, while user terminal can not obtain public key.The possibility that public key and private key are acquired simultaneously is minimum, the possibility cracked at the same time also hardly possible presence.Since item authentication platform does not preserve the private key of user, only possessing public key still cannot generate correct anti-fake code, the anti-fake code that can not be palmed off.Without manually being verified, verification efficiency higher.

Description

Item authentication plateform system and item authentication management system
Technical field
The present invention relates to item authentication technical field, recognizes in particular to a kind of item authentication plateform system and commodity Demonstrate,prove management system.
Background technology
Commodity are easy to occur generally passing through phone or net by counterfeit situation, existing fake certification in the process of circulation Network manual verification verifies the security code on commodity.Security code is easily counterfeited and copies, and such passes through phone Or the verification process of network manual verification is cumbersome.
The content of the invention
In view of this, the present invention provides a kind of item authentication plateform system and item authentication management system, it is possible to achieve Safer easily item authentication.
Technical solution provided by the invention is as follows:
A kind of item authentication plateform system, including:
Applying digital certificate subsystem, it is corresponding with the user public and private for the authentication information provided according to user, generation Key pair, the public key in the public private key pair are stored in item authentication platform, and the private key in the public private key pair is stored in the use On the corresponding user terminal in family;
Anti-fake code generates subsystem, for the merchandise news provided according to the user, is led to according to the public private key pair Cross encryption and generate anti-fake code corresponding with the merchandise news;
Anti-fake code verifies subsystem, for the coding information according to acquisition, is determined with described according to the public private key pair Anti-fake code corresponding with the merchandise news is compared, and determines whether the coding information is consistent with the anti-fake code, and Verification result is sent to other exterior terminals.
Further, the merchandise news that the anti-fake code generation subsystem is provided according to the user, according to the public affairs Private key includes the method that anti-fake code corresponding with the merchandise news is generated by encrypting:
Establish the communication connection with the user terminal;
The merchandise news that the user terminal provides is received, the merchandise news includes product type, name of product, dispatches from the factory At least one of date, keeping life and product quantity multiple parameters;
Random number corresponding with each commodity is generated according to the merchandise news;
Commodity summary corresponding with each commodity is generated according to the merchandise news combining encryption algorithm;
Private key in the public private key pair is encrypted to obtain use corresponding with the commodity to commodity summary Family digital signature;
Private key in the public private key pair signs the number, merchandise news, random number are encrypted, and obtains To anti-fake code corresponding with the merchandise news.
Further, the Encryption Algorithm is hash algorithm.
Further, according to the coding information of acquisition, determined and the merchandise news pair according to the public private key pair with described The anti-fake code answered is compared, and determines that the coding information method whether consistent with the anti-fake code includes:
Establish the communication connection with exterior terminal;
Obtain the coding information that the exterior terminal obtains;
Obtain the public key in the public private key pair of user corresponding with the coding information;
The coding information is decrypted using the public key, obtains number label corresponding with the coding information Name and merchandise news;
The merchandise news combination decipherment algorithm obtained according to decryption generates corresponding commodity summary;
Number signature is decrypted using the public key, obtains merchandise news and the tool with merchant signature The commodity for having merchant signature are made a summary;
Judge the commodity summary with merchant signature commodity corresponding with combining decipherment algorithm generation make a summary whether one Cause;
If consistent, it is real goods to show the corresponding commodity of the coding information;
If inconsistent, it is counterfeit goods to show the corresponding commodity of the coding information.
Further, the anti-fake code verification subsystem is additionally operable to will determine that the commodity summary with merchant signature With with reference to decipherment algorithm generation corresponding commodity summary, whether consistent judging result is sent to the exterior terminal.
Further, the anti-fake code verification subsystem is additionally operable to use the public key to the coding information by described It is decrypted, obtains number signature corresponding with the coding information and merchandise news is sent to the exterior terminal.
Further, the decipherment algorithm is hash algorithm.
Further, the anti-fake code is Quick Response Code.
Further, which further includes early warning subsystem, which is used for described anti- When pseudo-coding verification subsystem determines the coding information and the inconsistent anti-fake code, warning information is generated, and send extremely User corresponding with the anti-fake code.
Present invention also offers a kind of item authentication management system, including above-mentioned item authentication plateform system, Yi Jiyu The supervisory systems of item authentication plateform system communication connection, the supervisory systems are used for anti-fake code subsystem generation The verification result that anti-fake code and anti-fake code verification subsystem determine is stored.
Public private key pair possesses one-to-one corresponding and asymmetrical feature.By the information of private key encryption, can and can only be corresponded to Public key decryptions.Private key is calculated by the way that public key is hardly possible.Meanwhile the public key in the embodiment of the present invention is stored in commodity and recognizes Platform is demonstrate,proved, private key stores on the subscriber terminal, both are stored separately, and item authentication platform can not obtain private key, while user is whole End can not obtain public key.The possibility that public key and private key are acquired simultaneously is minimum, and the possibility cracked at the same time also hardly may be used Can exist.Since item authentication platform does not preserve the private key of user, and the generation of anti-fake code is necessarily required to private key and could add It is close.Even if item authentication platform receives attack so that public key is compromised, but since item authentication platform does not preserve the private of user Key, only possessing public key still cannot generate correct anti-fake code, the anti-fake code that can not be palmed off.Without manually being tested Card, verification efficiency higher.
To enable the above objects, features and advantages of the present invention to become apparent, preferred embodiment cited below particularly, and coordinate Appended attached drawing, is described in detail below.
Brief description of the drawings
In order to illustrate the technical solution of the embodiments of the present invention more clearly, below will be to needed in the embodiment attached Figure is briefly described, it will be appreciated that the following drawings illustrate only certain embodiments of the present invention, therefore be not construed as pair The restriction of scope, for those of ordinary skill in the art, without creative efforts, can also be according to this A little attached drawings obtain other relevant attached drawings.
Fig. 1 is a kind of schematic diagram of item authentication plateform system provided in an embodiment of the present invention.
Fig. 2 is that anti-fake code generation subsystem is corresponding in a kind of item authentication plateform system provided in an embodiment of the present invention Method flow schematic diagram.
Fig. 3 is that anti-fake code verifies that subsystem is corresponding in a kind of item authentication plateform system provided in an embodiment of the present invention Method flow schematic diagram.
Fig. 4 is the schematic diagram of another item authentication plateform system provided in an embodiment of the present invention.
Icon:10- item authentication plateform systems;101- applying digital certificate subsystems;102- anti-fake codes generate subsystem System;103- anti-fake codes verify subsystem;104- early warning subsystems.
Embodiment
Below in conjunction with attached drawing in the embodiment of the present invention, the technical solution in the embodiment of the present invention is carried out clear, complete Ground describes, it is clear that described embodiment is only part of the embodiment of the present invention, instead of all the embodiments.Usually exist The component of the embodiment of the present invention described and illustrated in attached drawing can be arranged and designed with a variety of configurations herein.Cause This, the detailed description of the embodiment of the present invention to providing in the accompanying drawings is not intended to limit claimed invention below Scope, but it is merely representative of the selected embodiment of the present invention.Based on the embodiment of the present invention, those skilled in the art are not doing Go out all other embodiments obtained on the premise of creative work, belong to the scope of protection of the invention.
It should be noted that:Similar label and letter represents similar terms in following attached drawing, therefore, once a certain Xiang Yi It is defined, then it further need not be defined and explained in subsequent attached drawing in a attached drawing.Meanwhile the present invention's In description, term " first ", " second " etc. are only used for distinguishing description, and it is not intended that instruction or hint relative importance.
An embodiment of the present invention provides a kind of item authentication plateform system 10, as shown in Figure 1, including applying digital certificate System 101, anti-fake code generation subsystem 102 and anti-fake code verification subsystem 103.
Applying digital certificate subsystem 101 is used for the authentication information provided according to user, generates public affairs corresponding with the user Private key pair, the public key in the public private key pair are stored in item authentication platform, and the private key in the public private key pair is stored in described On the corresponding user terminal of user.
Difference can be directed to for generating corresponding public private key pair by establishing applying digital certificate subsystem 101, The authentication information that user needs to provide can include the business license information of businessman's offer, various enterprise qualification certificate informations etc. Deng account corresponding with the user can be established by these authentication informations.Applying digital certificate subsystem 101 can be according to pre- The key schedule first configured generates corresponding public private key pair for the successful user of each certification.Public private key pair include public key and Corresponding private key, public key are stored on item authentication platform, and the item authentication platform in the embodiment of the present invention can be deployment System on the server.On the subscriber terminal, it is each that user terminal can be that user uses to the storage of corresponding with public key private key Kind terminal, such as mobile terminal, desktop computer terminal.User can be carried out private by the client installed on the subscriber terminal The management of key.Same user can be corresponding with different enterprises, can be that every enterprise notes on item authentication platform accordingly Volume one account of certification, applying digital certificate subsystem 101 can be that each account generates corresponding public private key pair.Digital certificate Shen Please subsystem 101 can pre-establish one and include the database of a large amount of public private key pairs, to ensure that each account is allocated public and private Key is to being all unique.
Anti-fake code generation subsystem 102 is used for the merchandise news provided according to the user, according to the public private key pair Anti-fake code corresponding with the merchandise news is generated by encrypting.
After user generates corresponding account by the registration of applying digital certificate subsystem 101, during commodity production Subsystem 102 can be generated by anti-fake code and generate corresponding anti-fake code.Since the species of commodity is more and same The commodity of class can be that different commodity generate different false proof volumes due to reasons such as production batch difference, date of manufacture differences Code.User can be by anti-fake code is printed upon to the packaging of commodity or is pasted onto on commodity form, in commodity circulation process In, facilitate take pictures surface sweeping of other consumers to the anti-fake code.
Detailed, the merchandise news that such as anti-fake code generation subsystem 102 is provided according to the user, such as Fig. 2 institutes Show, the method for generating anti-fake code corresponding with the merchandise news by encrypting according to the public private key pair comprises the following steps:
Step S101, establishes the communication connection with the user terminal;
Step S102, receives the merchandise news that the user terminal provides, and the merchandise news includes product type, product At least one of title, the date of production, keeping life and product quantity multiple parameters;
Step S103, random number corresponding with each commodity is generated according to the merchandise news;
Step S104, generates commodity corresponding with each commodity according to the merchandise news combining encryption algorithm and makes a summary;
Step S105, the private key in the public private key pair are encrypted to obtain and the commodity to commodity summary Corresponding number signature;
Step S106, the private key in the public private key pair signs the number, merchandise news, random number into Row encryption, obtains anti-fake code corresponding with the merchandise news.
Merchandise news can be uploaded on item authentication platform by user using user terminal, it is to be understood that be uploaded During it needs to be determined that the account information of user, it is determined that the account information of user i.e. can determine that it is corresponding with the user public and private The public key of key centering.The merchandise news that user is uploaded can include product type, name of product, the date of production, production At least one of the product term of validity and product quantity multiple parameters.The merchandise news of different commodity requirements is different, and the present invention is implemented Example does not limit the concrete composition of merchandise news.
Item authentication platform can be that the generation of each commodity is corresponding random after the merchandise news of user's upload is received Number.And commodity summary can be generated with combining encryption algorithm, further according to the public key commodity summary in the corresponding public private key pair of user It is encrypted, obtains number signature.Finally further according to the private key stored in user terminal, to above-mentioned number signature, Merchandise news, random number are encrypted, and the information obtained after encryption can be converted to false proof volume by transcoding algorithm Code.User can get the anti-fake code by user terminal, to be used after an action of the bowels during commodity circulation.
Anti-fake code verifies subsystem 103, and described true according to the public private key pair for the coding information according to acquisition Fixed anti-fake code corresponding with the merchandise news is compared, and determines whether the coding information is consistent with the anti-fake code, And verification result is sent to other-end.
The coding that the generation of subsystem 102 is generated according to anti-fake code can be glued by bar code, Quick Response Code or other forms It is attached on corresponding commodity, during commodity circulation, when consumer needs to verify the true and false of the commodity, can makes The coding being pasted onto on commodity is scanned with mobile terminal or other-end, obtains the coding information that coding includes.Lead to again Cross network and the coding information that scanning obtains is sent to item authentication plateform system 10.Anti-fake code verification subsystem 103 can Differentiated with docking received coding information, whether the coding information corresponding goods for determining to receive are certified products.
Detailed, as shown in figure 3, according to the coding information of acquisition, determined and the business according to the public private key pair with described The corresponding anti-fake code of product information is compared, and determines that the coding information method whether consistent with the anti-fake code includes Following steps:
Step S201, establishes the communication connection with exterior terminal;
Step S202, obtains the coding information that the exterior terminal obtains;
Step S203, obtains the public key in the public private key pair of user corresponding with the coding information;
Step S204, is decrypted the coding information using the public key, obtains corresponding with the coding information Number is signed and merchandise news;
Step S205, the merchandise news combination decipherment algorithm obtained according to decryption generate corresponding commodity and make a summary;
Step S206, is decrypted number signature using the public key, obtains the business with merchant signature Product information and the commodity summary with merchant signature;
Step S207, judges that the commodity summary with merchant signature is plucked with reference to the corresponding commodity of decipherment algorithm generation It is whether consistent;
Step S208, if unanimously, it is real goods to show the corresponding commodity of the coding information;
Step S209, if inconsistent, it is counterfeit goods to show the corresponding commodity of the coding information.
, can be by anti-fake code and corresponding commodity after the user of item authentication platform has obtained anti-fake code by system Association.During commodity circulation, other consumers need to verify the commodity with the commodity that determine to buy whether be During certified products, corresponding anti-fake code on commodity can be shot by smart mobile phone, tablet or other-end.By using exterior whole Hold and scan anti-fake code, on the displayed page that item authentication platform can be jumped directly to, and scan obtained coding information This item authentication platform can be directly transmitted.The identification information of user, anti-fake code verification subsystem can be included in commodity code System 103 can determine according to the identification information of user, public key corresponding with the user.Put down since public key is stored in item authentication Platform, anti-fake code verification subsystem 103 can obtain corresponding public key, and coding information can be solved using the public key It is close, obtain number signature corresponding with the coding information and merchandise news.And the commodity obtained according to decryption are believed Breath combines decipherment algorithm and generates corresponding commodity summary.Reuse the public key number signature is decrypted, obtain Make a summary to the merchandise news with merchant signature and the commodity with merchant signature.
Determining whether the corresponding commodity of coding information that exterior terminal scans are real goods, and anti-fake code is verified Subsystem 103 may determine that the commodity summary with merchant signature commodity summary corresponding with combining decipherment algorithm generation is It is no consistent;If consistent, it is real goods to show the corresponding commodity of the coding information;If inconsistent, show that the coding information corresponds to Commodity be counterfeit goods.
After the truth of the corresponding commodity of coding information of exterior terminal transmission is determined, verification result can be existed It is shown on exterior terminal, to realize the prompting to consumer.The merchandise news included in correct coding information can be with Sent by communicating to connect to the exterior terminal of consumer scans' anti-fake code, consumer can be understood by obtained information The information such as the manufacturers of the commodity, date of manufacture, supply chains process, it is certified products to determine the commodity.
In a kind of embodiment, as shown in figure 4, the item authentication plateform system 10 can also include early warning subsystem System 104, the early warning subsystem 104 are used to determine that the coding information is prevented with described in anti-fake code verification subsystem 103 When pseudo-coding is inconsistent, warning information is generated, and send to user corresponding with the anti-fake code.Can be with by early warning system The prompting to user is realized, so that user has found counterfeit situation in time.
Encryption Algorithm and decipherment algorithm in the embodiment of the present invention can use hash algorithm, or the algorithm of other forms, The application does not restrict it.
In embodiments of the present invention, public private key pair possesses one-to-one corresponding and asymmetrical feature.Pass through the letter of private key encryption Breath, can and can only be by corresponding public key decryptions.Private key is calculated by the way that public key is hardly possible.Meanwhile in the embodiment of the present invention Public key be stored in item authentication platform, private key stores on the subscriber terminal, both are stored separately, and item authentication platform can not obtain Private key is obtained, while user terminal can not obtain public key.The possibility that public key and private key are acquired simultaneously is minimum, is cracked at the same time Possibility also hardly possible presence.Since item authentication platform does not preserve the private key of user, and the generation of anti-fake code must Private key must be needed to encrypt.Even if item authentication platform receives attack so that public key is compromised, but due to item authentication platform The private key of user is not preserved, only possessing public key still cannot generate correct anti-fake code, the false proof volume that can not be palmed off Code.
In addition, the corresponding number signature of user, the user's number are included in the anti-fake code of item authentication platform generation Word signature is unique to be directed toward the user so that the corresponding real user of commodity cannot be tampered, and user can not return commodity Category relation is denied.
In addition, consumer can be scanned anti-fake code using equipment such as existing mobile terminals, and tested For card as a result, verification process is very convenient, obtained information is accurately true, can trust.
In several embodiments provided herein, it should be understood that disclosed apparatus and method, can also pass through Other modes are realized.Device embodiment described above is only schematical, for example, flow chart and block diagram in attached drawing Show the devices of multiple embodiments according to the present invention, method and computer program product architectural framework in the cards, Function and operation.At this point, each square frame in flow chart or block diagram can represent the one of a module, program segment or code Part, a part for the module, program segment or code include one or more and are used for realization holding for defined logic function Row instruction.It should also be noted that at some as in the implementation replaced, the function that is marked in square frame can also with different from The order marked in attached drawing occurs.For example, two continuous square frames can essentially perform substantially in parallel, they are sometimes It can perform in the opposite order, this is depending on involved function.It is it is also noted that every in block diagram and/or flow chart The combination of a square frame and block diagram and/or the square frame in flow chart, can use function or the dedicated base of action as defined in performing Realize, or can be realized with the combination of specialized hardware and computer instruction in the system of hardware.
In addition, each function module in each embodiment of the present invention can integrate to form an independent portion Point or modules individualism, can also two or more modules be integrated to form an independent part.
The foregoing is only a preferred embodiment of the present invention, is not intended to limit the invention, for the skill of this area For art personnel, the invention may be variously modified and varied.Within the spirit and principles of the invention, that is made any repaiies Change, equivalent substitution, improvement etc., should all be included in the protection scope of the present invention.It should be noted that:Similar label and letter exists Similar terms is represented in following attached drawing, therefore, once being defined in a certain Xiang Yi attached drawing, is then not required in subsequent attached drawing It is further defined and is explained.
The above description is merely a specific embodiment, but protection scope of the present invention is not limited thereto, any Those familiar with the art the invention discloses technical scope in, change or replacement can be readily occurred in, should all be contained Cover within protection scope of the present invention.Therefore, protection scope of the present invention answers the scope of the claims of being subject to.

Claims (10)

  1. A kind of 1. item authentication plateform system, it is characterised in that including:
    Applying digital certificate subsystem, for the authentication information provided according to user, generates public private key pair corresponding with the user, Public key in the public private key pair is stored in item authentication platform, and the private key in the public private key pair is stored in the user and corresponds to User terminal on;
    Anti-fake code generates subsystem, for the merchandise news provided according to the user, according to the public private key pair by adding It is dense into anti-fake code corresponding with the merchandise news;
    Anti-fake code verifies subsystem, for the coding information according to acquisition, is determined with described according to the public private key pair with being somebody's turn to do The corresponding anti-fake code of merchandise news is compared, and determines whether the coding information is consistent with the anti-fake code, and will test Card result is sent to other exterior terminals.
  2. 2. item authentication plateform system according to claim 1, it is characterised in that the anti-fake code generates subsystem root The merchandise news provided according to the user, false proof volume corresponding with the merchandise news is generated according to the public private key pair by encrypting The method of code includes:
    Establish the communication connection with the user terminal;
    The merchandise news that the user terminal provides is received, the merchandise news includes product type, name of product, dispatches from the factory day At least one of phase, keeping life and product quantity multiple parameters;
    Random number corresponding with each commodity is generated according to the merchandise news;
    Commodity summary corresponding with each commodity is generated according to the merchandise news combining encryption algorithm;
    Private key in the public private key pair is encrypted to obtain number of users corresponding with the commodity to commodity summary Word is signed;
    Private key in the public private key pair signs the number, merchandise news, random number are encrypted, obtain with The corresponding anti-fake code of the merchandise news.
  3. 3. item authentication plateform system according to claim 2, it is characterised in that the Encryption Algorithm is hash algorithm.
  4. 4. item authentication plateform system according to claim 1, it is characterised in that according to the coding information of acquisition, with institute State and determine that anti-fake code corresponding with the merchandise news is compared according to the public private key pair, determine the coding information and institute Stating the whether consistent method of anti-fake code includes:
    Establish the communication connection with exterior terminal;
    Obtain the coding information that the exterior terminal obtains;
    Obtain the public key in the public private key pair of user corresponding with the coding information;
    The coding information is decrypted using the public key, obtain corresponding with coding information number signature and Merchandise news;
    The merchandise news combination decipherment algorithm obtained according to decryption generates corresponding commodity summary;
    Number signature is decrypted using the public key, obtains merchandise news with merchant signature and with business The commodity summary of family's signature;
    Judge whether the commodity summary with merchant signature commodity summary corresponding with combining decipherment algorithm generation is consistent;
    If consistent, it is real goods to show the corresponding commodity of the coding information;
    If inconsistent, it is counterfeit goods to show the corresponding commodity of the coding information.
  5. 5. item authentication plateform system according to claim 4, it is characterised in that the anti-fake code verification subsystem is also For will determine that whether the commodity summary with merchant signature commodity summary corresponding with combining decipherment algorithm generation is consistent Judging result send to the exterior terminal.
  6. 6. item authentication plateform system according to claim 4, it is characterised in that the anti-fake code verification subsystem is also For the coding information to be decrypted using the public key by described, number corresponding with the coding information is obtained Signature and merchandise news are sent to the exterior terminal.
  7. 7. item authentication plateform system according to claim 4, it is characterised in that the decipherment algorithm is hash algorithm.
  8. 8. the item authentication plateform system according to claim 1 to 7 any one, it is characterised in that the anti-fake code For Quick Response Code.
  9. 9. item authentication plateform system according to claim 1, it is characterised in that the item authentication plateform system further includes Early warning subsystem, the early warning subsystem be used for the anti-fake code verification subsystem determine the coding information with it is described false proof When encoding inconsistent, warning information is generated, and send to user corresponding with the anti-fake code.
  10. 10. a kind of item authentication management system, it is characterised in that including the item authentication described in claim 1 to 9 any one Plateform system, and the supervisory systems with item authentication plateform system communication connection, the supervisory systems are used for described false proof The verification result that the anti-fake code and anti-fake code verification subsystem of code-subsystem generation determine is stored.
CN201711130513.4A 2017-11-15 2017-11-15 Item authentication plateform system and item authentication management system Pending CN107918873A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711130513.4A CN107918873A (en) 2017-11-15 2017-11-15 Item authentication plateform system and item authentication management system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711130513.4A CN107918873A (en) 2017-11-15 2017-11-15 Item authentication plateform system and item authentication management system

Publications (1)

Publication Number Publication Date
CN107918873A true CN107918873A (en) 2018-04-17

Family

ID=61896511

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711130513.4A Pending CN107918873A (en) 2017-11-15 2017-11-15 Item authentication plateform system and item authentication management system

Country Status (1)

Country Link
CN (1) CN107918873A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108681768A (en) * 2018-08-27 2018-10-19 黄幼毅 Commodity code method and system
CN110503499A (en) * 2018-05-17 2019-11-26 上海富脉实业有限公司 It is a kind of for confirming the method and system of product information
WO2020051910A1 (en) * 2018-09-14 2020-03-19 Cobo Global Limited Secure hardware cryptographic key storage device with detachable battery and anti-tamper security functionality
CN111415173A (en) * 2020-03-16 2020-07-14 可可奇货(深圳)科技有限公司 Method for encrypting and verifying commodity integrity
CN112785308A (en) * 2021-02-02 2021-05-11 中钞印制技术研究院有限公司 Anti-counterfeiting method, anti-counterfeiting system and securities

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101354753A (en) * 2008-09-10 2009-01-28 张其善 Method for making product label, method and system for verifying product genuine-fake
CN102004986A (en) * 2010-10-26 2011-04-06 梁庆生 Product anti-counterfeiting method based on digital signature and public key system and verifying method
CN102496113A (en) * 2011-11-18 2012-06-13 祝启忠 Method and system for realizing commodity authentication service
CN102932148A (en) * 2012-10-25 2013-02-13 成都市易恒信科技有限公司 System and method for preventing safety two-dimensional code counterfeiting on basis of combination of public key (CPK) authentication

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101354753A (en) * 2008-09-10 2009-01-28 张其善 Method for making product label, method and system for verifying product genuine-fake
CN102004986A (en) * 2010-10-26 2011-04-06 梁庆生 Product anti-counterfeiting method based on digital signature and public key system and verifying method
CN102496113A (en) * 2011-11-18 2012-06-13 祝启忠 Method and system for realizing commodity authentication service
CN102932148A (en) * 2012-10-25 2013-02-13 成都市易恒信科技有限公司 System and method for preventing safety two-dimensional code counterfeiting on basis of combination of public key (CPK) authentication

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110503499A (en) * 2018-05-17 2019-11-26 上海富脉实业有限公司 It is a kind of for confirming the method and system of product information
CN110503499B (en) * 2018-05-17 2022-12-06 上海富脉实业有限公司 Method and system for confirming product information
CN108681768A (en) * 2018-08-27 2018-10-19 黄幼毅 Commodity code method and system
WO2020051910A1 (en) * 2018-09-14 2020-03-19 Cobo Global Limited Secure hardware cryptographic key storage device with detachable battery and anti-tamper security functionality
CN111415173A (en) * 2020-03-16 2020-07-14 可可奇货(深圳)科技有限公司 Method for encrypting and verifying commodity integrity
CN111415173B (en) * 2020-03-16 2023-05-02 可可奇货(深圳)科技有限公司 Commodity integrity encryption and verification method
CN112785308A (en) * 2021-02-02 2021-05-11 中钞印制技术研究院有限公司 Anti-counterfeiting method, anti-counterfeiting system and securities

Similar Documents

Publication Publication Date Title
CN107918873A (en) Item authentication plateform system and item authentication management system
CN102394887B (en) OAuth protocol-based safety certificate method of open platform and system thereof
CN110276588B (en) Electronic signature authentication method and device and computer readable storage medium
CN107798531B (en) Electronic payment method and system
CN108537046A (en) A kind of online contract signature system and method based on block chain technology
CN104156862A (en) Wechat-platform-based two-dimensional code anti-fake and anti-channel conflict inquiry system and method
CN106709963B (en) The method and apparatus of the authentication image true and false
CN1848723A (en) Method and apparatus for providing mutual authentication between a sending unit and a recipient
US9600690B2 (en) Secure access for sensitive digital information
CN109670803A (en) Method, apparatus, medium and the electronic equipment tested before online trading
CN104252677A (en) Two-dimension code anti-counterfeiting technology and two-dimension code anti-counterfeiting system-based platform system
CN110309663B (en) Privacy authentication method and system based on block chain
CN105678365A (en) Two-dimensional code e-ticket generation method and system, two-dimensional code e-ticket verification method and verification terminal
CN104299146A (en) Product anti-counterfeiting inquiry system
CN107453874A (en) Digital sealing and its generation method, service request and offer method and electronic equipment
CN108805476A (en) Electronics signs for method and apparatus
CN105591745A (en) Method and system for performing identity authentication on user using third-party application
CN104424579A (en) Security traceability management system
CN104050431A (en) Self-signing method and self-signing device for RFID chips
CN105025480B (en) The method and system of subscriber card digital signature authentication
CN106127441A (en) A kind of network system preventing personal information from leaking and implementation method
US20160261609A1 (en) System and a method for intelligent verification management
KR20210059518A (en) Contents generating device for certificating genuine product and system for integrated certification of using the same
CN107229879A (en) Electronics confirmation request automatic generation method and system based on safe Quick Response Code
CN107453871A (en) Password generated method, password authentication method, method of payment and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20190215

Address after: Room 340, 1st floor, No. 350 Xianxia Road, Changning District, Shanghai, 200336

Applicant after: Shanghai Miaolian Digital Technology Co., Ltd.

Address before: 200020 No. 47, Nanchang Road, Shanghai, Luwan District

Applicant before: Lv Feng

RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20180417