CN109544182B - Product anti-counterfeiting verification method and system - Google Patents

Product anti-counterfeiting verification method and system Download PDF

Info

Publication number
CN109544182B
CN109544182B CN201811383080.8A CN201811383080A CN109544182B CN 109544182 B CN109544182 B CN 109544182B CN 201811383080 A CN201811383080 A CN 201811383080A CN 109544182 B CN109544182 B CN 109544182B
Authority
CN
China
Prior art keywords
product
electronic tag
verification
data
preset
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811383080.8A
Other languages
Chinese (zh)
Other versions
CN109544182A (en
Inventor
孟凡富
王建新
吴祥富
白绍江
靳佩佩
马歆裕
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201811383080.8A priority Critical patent/CN109544182B/en
Publication of CN109544182A publication Critical patent/CN109544182A/en
Application granted granted Critical
Publication of CN109544182B publication Critical patent/CN109544182B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management

Landscapes

  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Engineering & Computer Science (AREA)
  • General Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Finance (AREA)
  • General Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • Development Economics (AREA)
  • Marketing (AREA)
  • Economics (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Computer Security & Cryptography (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses a product anti-counterfeiting verification method and a product anti-counterfeiting verification system. By using the product anti-counterfeiting verification method and the product anti-counterfeiting verification system, the electronic tag firstly signs the product initial data preset in the tag by using a private key, and then transmits the signature data, the product initial data, the electronic tag public key certificate and the client identification data to a preset alliance chain node of a preset alliance chain platform through a client verification tool; after verifying the signature of the initial data of the product by the alliance link node, judging whether the initial data of the product is legal or not, and feeding back a verification result data packet; and the client verification tool verifies the signature data in the verification result data packet by using a preset public key and then outputs a verification result. The product anti-counterfeiting verification method and the product anti-counterfeiting verification system verify the authenticity of the initial data of the product by using the alliance link points, so that the reliability of verification basic data can be ensured; and the authentication of the electronic tag and the alliance link node can be realized by utilizing the key verification, so that the reliability of the anti-counterfeiting verification of the product is ensured.

Description

Product anti-counterfeiting verification method and system
Technical Field
The invention relates to the field of product anti-counterfeiting verification, in particular to an anti-counterfeiting verification method and system by combining a block chain and an electronic tag.
Background
Prevention of counterfeit or counterfeit (anti-counterfeiting) of products by appropriate means or means is an important means of modern product management and supply chain management. The anti-counterfeiting technology plays a key role in restraining counterfeit manufacturing, improving product credibility, ensuring enterprise benefits and maintaining market fairness.
Currently, the mainstream product anti-counterfeiting technology is mainly divided into physical anti-counterfeiting technology and two-dimension code anti-counterfeiting technology. The following is a brief introduction to these two anti-counterfeiting techniques and a simple analysis of the existing problems (vulnerabilities):
1. physical anti-counterfeiting
The physical anti-counterfeiting is characterized in that physical characteristics existing on the anti-counterfeiting label or physical characteristics specially arranged on the anti-counterfeiting label are used as anti-counterfeiting marks. When the anti-counterfeiting verification is carried out, the anti-counterfeiting mark on the anti-counterfeiting label is compared with a predetermined reference mark; if the anti-counterfeiting mark is consistent or matched with the reference mark, judging that the product attached with the anti-counterfeiting label is a genuine product; if the product is not counterfeit, the product attached with the anti-counterfeit label is judged to be counterfeit.
The uniqueness of the anti-counterfeiting mark can be realized by specially setting the physical characteristics of the anti-counterfeiting mark; by processing the physical characteristics of the anti-counterfeiting mark, the copying difficulty of the anti-counterfeiting mark can be increased, and the reliability of physical anti-counterfeiting is further realized.
At present, there are laser anti-counterfeiting, chemical ink anti-counterfeiting, texture anti-counterfeiting, invisible image anti-counterfeiting and other ways according to the different ways and methods for forming the anti-counterfeiting mark.
2. Two-dimensional code anti-counterfeiting method
The two-dimension code anti-counterfeiting technology is characterized in that a two-dimension code is arranged on an anti-counterfeiting label, and the two-dimension code contains data related to a product. During verification, the two-dimensional code is identified by scanning the anti-counterfeiting label attached to the product, so that the related data of the product can be obtained; then, transmitting the acquired data to a preset enterprise verification system; the enterprise verification system compares the received data with the stored product reference data, and distinguishes whether the product attached with the anti-counterfeiting label is a genuine product or a fake product according to the consistency or conformity of the comparison result.
Although the existing anti-counterfeiting technology can achieve the purpose of distinguishing genuine products or counterfeit products to a certain extent, with the development of the micro technology and the copying technology, the risk of copying exists.
With physical anti-counterfeiting methods, the possibility that physical features as anti-counterfeiting marks are copied is increasing. Counterfeiters can duplicate the anti-counterfeit labels with the same physical characteristics by known techniques and form counterfeit labels with the same physical characteristics. The counterfeit label is attached (pasted or attached in other ways) on the counterfeit, and the purpose of distinguishing the genuine goose from the wild goose cannot be achieved by the existing verification way.
The two-dimensional code is a way of storing data according to a fixed encoding rule. The counterfeiter can obtain a counterfeit label completely consistent with the two-dimensional code of the genuine product on the counterfeit-proof label of the genuine product by means of photographing, copying or regenerating the two-dimensional code after reading data. When such counterfeit labels are scanned and identified by the code scanning identification equipment, the counterfeit labels are also identified as genuine products, and the purpose of distinguishing the genuine products from wild goose products cannot be achieved.
Therefore, how to improve the reliability of anti-counterfeiting remains a technical problem to be solved by those skilled in the art.
Disclosure of Invention
The invention provides an innovative product anti-counterfeiting verification method and system aiming at the pain point of the current anti-counterfeiting technology, namely a product anti-counterfeiting verification system and method based on a block chain, an electronic tag and a cryptography algorithm, and the product anti-counterfeiting verification method and system have higher reliability.
In the product anti-counterfeiting verification method provided by the invention, a product to be verified is provided with an electronic tag, the electronic tag is preset with product initial data and key data, and the product initial data comprises an electronic tag identification number and an enterprise identification number; the key data comprises an electronic tag private key and an electronic tag public key certificate; the electronic tag identification number and the enterprise identification number are both unique; the electronic tag public key certificate is obtained by signing a preset electronic tag public key by a preset enterprise private key, and the preset electronic tag public key and the electronic tag private key form an asymmetric key pair;
the product anti-counterfeiting verification method comprises the following steps:
s210, the electronic tag signs the initial data of the product by using a preset electronic tag private key to obtain signature data; the initial data of the product comprises an electronic tag identification number and an enterprise identification number; then transmitting the product verification data packet to a client verification tool; the product verification data packet comprises product initial data, signature data and an electronic tag public key certificate;
s220, after receiving the product verification data packet, the client verification tool transmits the product verification data packet and the client identification data to a predetermined alliance link node of a predetermined alliance link platform; the client identification data comprises a client identification number and a client verification serial number;
s230, searching by the preset alliance link node according to the initial data of the product to obtain a preset enterprise public key certificate; verifying a preset enterprise public key certificate by using a preset alliance chain platform public key to obtain an enterprise public key; then, the enterprise public key is used for verifying the electronic tag public key certificate to obtain an electronic tag public key; verifying the signature data in the product verification data packet by using the electronic tag public key; if the verification is passed, go to step S240;
s240, the preset alliance link points judge whether the initial data of the product is legal or not according to a preset strategy by using a preset enterprise reference information database; if yes, forming a verification result and entering step S250;
s250, the coalition link node signs the verification result and the received client identification data by using a preset private key to obtain signature data; storing the formed signature data and the corresponding verification result into a verification result data packet, and feeding back the verification result data packet;
and S260, the client verification tool verifies the signature data of the verification result data packet by using a preset public key and outputs a verification result. Whether the enterprise end verification result is consistent and whether the client end identification data is legal can be determined through verifying the signature data, the authenticity of data fed back from the alliance link platform is guaranteed, and the verification result is guaranteed; wherein the verifying comprises verifying whether the client identification data is legitimate.
By utilizing the product anti-counterfeiting verification method and the alliance chain (block chain) technology, as the enterprise reference information database preset by the alliance chain nodes is not falsifiable, the authenticity of the initial data of the product is verified by utilizing the alliance chain nodes, so that the reliability of verification basic data can be ensured; and the authentication of the alliance link node by the authentication equipment (client authentication tool) can be realized by utilizing the key authentication, so that the authentication failure caused by the participation of an illegal authentication platform is avoided, and the reliability of the anti-counterfeiting authentication of the product is further ensured.
In a further technical solution, the step S250 specifically includes the following steps:
s251, the alliance link node signs the verification result and the received client identification data by using a preset private key, and stores formed signature data into the verification result data packet;
s252, judging whether the coalition link points forming the signature data in the verification result data packet meet the preset requirements; if not, go to step S253; if so, the process proceeds to step S254:
s253, the predetermined alliance link node sends the product verification data packet, the client identification data, and the verification result data packet to another predetermined alliance link node, and the another predetermined alliance link node performs steps S230, S240, S251, and S252;
and S254, feeding back the verification result data packet to the client verification tool.
According to the technical scheme, whether the initial data of the product is legal is judged, whether the alliance chain node for verifying and signing the data meets the preset requirement is judged, if the alliance chain node for verifying and signing does not meet the preset requirement, the other alliance chain node verifies and signs until the preset requirement is met, so that the characteristic of distributed storage of the benchmark information database of the alliance chain platform enterprise can be fully utilized, and the anti-counterfeiting verification reliability can be improved.
In a further optional technical solution, in the step S252, it is determined whether a federation link node forming signature data in the verification result data packet meets a predetermined requirement, specifically, one of the following:
(1) and judging whether the number of the alliance chain nodes forming the signature data in the verification result data packet reaches a preset number. Therefore, the plurality of alliance link points carry out verification signature, and the reliability of anti-counterfeiting verification can be ensured.
(2) And judging whether the federation chain nodes forming the signature data in the verification result data packet comprise predetermined federation chain nodes or not. Therefore, the signature verification of the alliance chain node can be terminated after the verification result and the client identification data are verified and signed by presetting the specific alliance chain node pair by utilizing the finite centralization characteristic of the alliance chain and utilizing the authority difference of the alliance chain node, and the anti-counterfeiting verification efficiency can be improved while the anti-counterfeiting verification reliability is ensured.
In a further technical scheme, the product initial data and the enterprise benchmark information database both comprise enterprise identification numbers; the enterprise identification number has uniqueness;
in step S240, the determining, by the predetermined federation link point, whether the initial data of the product is legal according to a predetermined policy by using a preset enterprise reference information database specifically includes:
s2401, inquiring a corresponding enterprise identification number in the enterprise reference information database; if yes, judging that the enterprise identification number is legal, and entering the step S2302;
s2402, judging whether the electronic tag identification number is legal or not according to a preset strategy by using a preset enterprise reference information database; if so, judging that the initial data of the product is legal.
In the technical scheme, the validity of the enterprise identification number and the electronic tag identification number is verified successively, whether the enterprise identification number is legal or not is verified, if the enterprise identification number is illegal, the electronic tag identification number is not verified, the information of a product to be verified, which does not belong to the alliance chain platform, is verified, so that the data transmission quantity in the verification process is reduced, and more specific verification information can be fed back to verify more information of requesters.
In a further technical scheme, the enterprise benchmark information database further comprises a preset attribute of the electronic tag identification number stored corresponding to the enterprise identification number;
in step S2402, the preset enterprise benchmark information database is used to determine whether the electronic tag identification number is legal according to a predetermined policy, specifically, a predetermined attribute of the electronic tag identification number stored in the enterprise benchmark information database is determined based on the enterprise identification number, and it is determined whether the electronic tag identification number meets the predetermined attribute, if so, it is determined that the electronic tag identification number is legal.
By judging whether the electronic tag identification number meets the preset attribute, data redundancy can be reduced, and the data processing efficiency of the alliance chain platform is improved.
In a further optional technical scheme, the electronic tag identification number is a product number, and the predetermined attribute of the electronic tag identification number is an electronic tag number range parameter;
in step S2402, it is determined whether the electronic tag identification number satisfies the predetermined attribute, specifically, whether the product number satisfies the electronic tag number range parameter is determined.
The invention provides a product anti-counterfeiting verification system, which comprises:
the electronic tag is attached to a product to be verified, initial product data and key data are preset, and the initial product data comprise an electronic tag identification number and an enterprise identification number; the key data comprises an electronic tag private key and an electronic tag public key certificate; the electronic tag identification number and the enterprise identification number have uniqueness; the electronic tag public key certificate is obtained by signing a preset electronic tag public key by a preset enterprise private key, and the preset electronic tag public key and the electronic tag private key form an asymmetric key pair;
the client verification tool is provided with a processor, an output module and a communication module; the processor is suitable for acquiring the product verification data packet from the electronic tag through the communication module; the product verification data packet comprises product initial data, signature data and an electronic tag public key certificate, wherein the signature data is obtained by signing the product initial data by using an electronic tag private key; the system is also suitable for transmitting a product verification data packet and client identification data stored by the system to a preset alliance link node of a preset alliance link platform through the communication module; the client identification data comprises a client identification number and a client verification serial number; the authentication method is also suitable for verifying signature data in the verification result data packet by using a preset public key after the verification result data packet is obtained from a preset alliance link node of the alliance link platform through the communication module, and outputting a verification result through the output module;
the alliance chain platform comprises a plurality of alliance chain nodes which are connected in a communication mode; at least part of the alliance link nodes are preset with a storage module and a signature verification program; an enterprise reference information database is preset in the storage module; the verification signature program is adapted to be executed by a processor to: verifying a preset enterprise public key certificate by using a preset alliance chain platform public key to obtain an enterprise public key; then, the enterprise public key is used for verifying the electronic tag public key certificate to obtain an electronic tag public key; verifying the signature data in the product verification data packet by using the electronic tag public key; if the verification is passed, judging whether the initial data of the product is legal or not according to a preset strategy by using a preset enterprise reference information database; and if the initial data of the product is judged to be legal, signing the verification result and the client identification data by using a preset private key, storing the formed signature data into the verification result data packet, and feeding back the verification result data packet.
Signing the verification result and the received client identification data by using a preset private key, storing formed signature data into a verification result data packet, and feeding back the verification result data packet, wherein the verification signature program is suitable for a processor to execute the following specific instructions:
signing the verification result and the received client identification data by using a preset private key, and storing formed signature data into the verification result data packet; judging whether the alliance chain node signed on the initial data of the product meets a preset requirement or not; if yes, feeding back the verification result data packet to the client verification tool; and if not, sending the product verification data packet, the client identification data and the verification result data packet to another preset alliance link node.
In a further technical scheme, the product initial data and the enterprise benchmark information database both comprise enterprise identification numbers; the enterprise identification number has uniqueness;
the signature verification program is executed by a processor, whether the initial data of the product is legal or not is judged according to a preset strategy, and specifically, a corresponding enterprise identification number is inquired in the enterprise reference information database; if the enterprise identification number is found to be legal, judging that the enterprise identification number is legal; then, a preset enterprise reference information database is utilized to judge whether the electronic tag identification number is legal or not according to a preset strategy; and if the electronic tag identification number is judged to be legal, judging that the initial data of the product is legal.
In a further technical scheme, the electronic tag identification number is a product number; an electronic tag identification number range parameter is stored in the enterprise reference information database corresponding to the enterprise identification number;
and the signature verification program is executed by the processor to judge whether the electronic tag identification number is legal, specifically, whether the electronic tag identification number meets the electronic tag identification number range parameter.
By utilizing the product anti-counterfeiting verification method, the authenticity of the electronic tag is ensured in a multiple mode, and if a counterfeiter counterfeits a production enterprise or the identification number of the electronic tag, counterfeit goods can be distinguished through the judgment of the legality of the enterprise identification number and the judgment of the legality of the identification number of the electronic tag; if the real electronic tag is attached to the counterfeit, the product to be verified can be warned that the product is possibly the counterfeit through the verification historical data in the verification result. Therefore, the anti-counterfeiting verification method of the product can improve the anti-counterfeiting reliability.
Drawings
Fig. 1 is a schematic flow chart of a product anti-counterfeiting verification method according to an embodiment of the present invention.
Fig. 2 is a flowchart of a method for providing a product anti-counterfeiting verification method according to a second embodiment of the present invention.
Fig. 3 is a logic block diagram of a product anti-counterfeiting verification system according to an embodiment of the present invention.
Detailed Description
The present invention will be described in further detail with reference to the accompanying drawings, but the present invention is not limited to the specific embodiments.
In this document, the "uniqueness" is uniqueness in a corresponding authentication system or in an authentication method process.
Referring to fig. 1, a schematic flow chart of a product anti-counterfeiting verification method according to an embodiment of the present invention is shown.
In order to implement the anti-counterfeiting verification method for the product, an electronic tag can be arranged on the product to be verified. The electronic tag may be attached to the product to be authenticated in a suitable manner, such as to the product itself to be authenticated, to the packaging of the product to be authenticated, or to other accompanying items of the product to be authenticated.
The electronic tag is preset with product initial data and key data, wherein the product initial data comprises an electronic tag identification number and an enterprise identification number; the key data comprises an electronic tag private key and an electronic tag public key certificate; and the electronic tag identification number and the product can have a one-to-one correspondence. In one embodiment, the electronic tag identification number may be a production number of the product. Of course, the initial data of the product may also include other information related to the product, such as product name, product number, expiration date, product status information, etc., according to actual needs. The key data comprises an electronic tag private key and an electronic tag public key certificate; the electronic tag public key certificate is obtained by signing a preset electronic tag public key by a preset enterprise private key in advance and is implanted into an electronic tag, and the preset electronic tag public key and the electronic tag private key form an asymmetric key pair.
Certainly, in order to ensure the safety of the initial data of the product in the electronic tag and prevent the product from being arbitrarily tampered, the electronic tag can be set as read-only data; of course, for the convenience of updating the initial data of the product, a readable and writable mode can be set; corresponding technical measures can be set according to a known mode, and the legitimacy of the writing and updating authorities is guaranteed.
As shown in fig. 1, based on the electronic tag, the method for verifying the anti-counterfeiting of the product according to the embodiment of the present invention may include the following steps:
s210, the electronic tag signs the initial data of the product by using a preset electronic tag private key to obtain signature data; the initial data of the product comprises an electronic tag identification number and an enterprise identification number; then transmitting the product verification data packet to a client verification tool; the product verification data packet comprises product initial data, signature data and an electronic tag public key certificate.
The electronic tag signs the initial data of the product by using a preset private key to obtain signature data, and the signature data, the initial data of the product and a public key certificate of the electronic tag are packaged to form a product verification data packet for a data receiver to verify the authenticity of the data; the product verification data packet is then transmitted to a client verification tool for further processing by the client verification tool. Of course, the electronic tag may transmit other data to the client verification tool, or the product verification data packet may contain other data of the product according to actual needs.
S220, after receiving the product verification data packet, the client verification tool transmits the product verification data packet and the client identification data to a predetermined alliance link node of a predetermined alliance link platform; the client identification data comprises a client identification number and a client verification serial number.
The client authentication tool may obtain the product authentication data packet, and may read the product initial data in the electronic tag by using a known method, for example, may read the product initial data by using a non-contact method, such as an NFC (Near Field Communication) or RFID (Radio Frequency Identification) method.
The client authentication tool can be a special device, a general device installed with suitable software or programs, and can also be a mobile phone installed with suitable APP.
S230, verifying a preset enterprise public key certificate by using a preset alliance chain platform public key by using a preset alliance chain link point to obtain an enterprise public key; then, the enterprise public key is used for verifying the electronic tag public key certificate to obtain an electronic tag public key; verifying the signature data in the product verification data packet by using the electronic tag public key; if the verification is passed, the process proceeds to step S240.
In this embodiment, an enterprise of a product to be verified may register at a corresponding portal of the federation chain platform, and upload corresponding enterprise information and corresponding data. After the verification is carried out through a preset mechanism of the alliance chain platform, the corresponding enterprises can upload the data corresponding to the enterprise identification numbers and the electronic tag identification numbers, and the corresponding data are synchronized in the corresponding alliance chain nodes according to a preset consensus mechanism in the alliance chain nodes according to the known block chain technology, so that an enterprise reference information database is formed. Corresponding enterprises can be preset with corresponding public keys, and the preset alliance chain platform public key can be used for signing the enterprise public key to obtain an enterprise public key certificate. The enterprise public key certificate may be stored in the enterprise reference information database corresponding to the enterprise identification number for recall. Enterprise benchmark information databases (complete enterprise data or enterprise data summaries) of a plurality of enterprises are stored in an area form and form a block data chain to provide a data basis for further data processing of corresponding federation link nodes.
The specific alliance link point for receiving data can be determined according to a predetermined strategy or manner, for example, the specific alliance link point can be received by a main node of a current consensus period of an alliance link platform, and data can be transmitted to a predetermined alliance link node according to a predetermined sequence; the alliance link node for receiving data can be selected according to the attributes (equipment type, position and APP number) of the uploading equipment; and appropriate devices can be arranged in the alliance chain platform, and appropriate alliance chain nodes are selected for alliance chain node states according to a preset strategy to receive data. It can be understood that, based on a preset mechanism of the alliance chain platform, in any consensus period, the alliance chain node serving as the principal node of the alliance chain platform has randomness, so that the alliance chain node receiving data also has randomness; this randomness may also guarantee the reliability of the verify signature operation.
In this embodiment, a federation chain node a is taken as an example for explanation. It should be noted that, in the implementation process of a product anti-counterfeiting verification method, data processing may be performed by one alliance link node, or may be performed by different alliance link nodes, which is not described in this section in a distinguishing manner.
In order to ensure the authenticity of the uploaded product verification data packet, the alliance chain node A verifies the signature data by using the calculated public key; of course, the public key forms an asymmetric key pair with the private key of the signature. Namely, the alliance link node A can verify a preset enterprise public key certificate by using a preset alliance link platform public key to obtain an enterprise public key; then, the enterprise public key is used for verifying the electronic tag public key certificate to obtain an electronic tag public key; and verifying the signature data in the product verification data packet by using the electronic tag public key.
If the verification fails, the corresponding equipment or the client is illegal, and an illegal prompt can be fed back; the illegal prompt can be output at a proper node of the alliance link platform, or correspondingly processed (such as blacklisting), or fed back to equipment or a client for uploading initial data of a product, and output to warn a verification requester.
If the verification is passed, the device or the client for uploading the initial data of the product is legal, and the next verification step is carried out.
The federation chain platform public key (including the corresponding private key) may be a public key unified by the platform and stored in each federation chain node, or may be a public key corresponding to different federation chain nodes. When the public key of the alliance chain platform is the public key corresponding to different alliance chain nodes, the public key of each alliance chain node can be stored in each alliance chain node, an index is distributed to the public key of each alliance chain node, and the enterprise identification number corresponds to the index; therefore, after receiving the corresponding data, the corresponding federation link platform public key can be inquired and determined according to the enterprise identification number, and the enterprise public key certificate is verified by using the public key to obtain the enterprise public key.
S240, the preset alliance link points judge whether the initial data of the product is legal or not according to a preset strategy by using a preset enterprise reference information database; if so, the process proceeds to step S250.
Namely, judging the validity of the initial data of the uploaded product by using data (an enterprise reference information database) stored in the link points of the alliance; if the product is illegal, an illegal prompt can be fed back to warn the verifier that the product to be verified may belong to a counterfeit or have a problem. For example, federation chain node A may preset a corresponding unit, software, or instruction set to identify product initial data and determine whether the product initial data is legitimate according to a predetermined policy.
In the step, the alliance link node A identifies initial data of the product, and judges whether the received initial data of the product is legal or not according to a preset strategy on the basis of preset block link data, namely a preset enterprise benchmark information database.
The specific predetermined strategy can be selected according to actual needs, for example, the received product initial data can be compared with the product benchmark data of the enterprise benchmark information database, and if the product initial data has corresponding relation or consistency, the product initial data can be judged to be legal; whether the initial data of the product has a specific format and specific data may also be determined, and whether the specific data, length, format of the predetermined field meet predetermined conditions or not may also be determined, which is not described herein again.
If the initial data of the product is judged to be illegal, the product to be verified can be determined to be a fake product, and an illegal prompt can be fed back to warn a verification requester.
If the initial data of the product is judged to be legal, the electronic tag can be determined to be a genuine electronic tag, otherwise, the electronic tag is a counterfeit electronic tag, a verification result is formed according to a preset rule, and the next operation is performed in step S250.
S250, the coalition link node signs the verification result and the received client identification data by using a preset private key to obtain signature data; and storing the formed signature data and the corresponding verification result into a verification result data packet, and feeding back the verification result data packet.
At this time, the private key predetermined by the alliance link node can be used for signing the verification result and the client identification data to form signature data, the formed signature data is stored in the verification result data packet, and then the verification result data packet at this time is fed back to the device or the client which uploads the data; the method comprises the steps of carrying out Hash operation on a verification result and client identification data to obtain a Hash value, and then signing the Hash value by using a preset private key to obtain signature data.
S260, the client verification tool verifies the signature data of the verification result data packet by using a preset public key; and if the verification is passed, outputting a verification result. The verification includes verifying whether the client identification data is legitimate.
The public key used may form an asymmetric key pair with the private key used in step S250. By verifying the signature, the authenticity of the data fed back from the alliance chain platform can be ensured, the verification result is ensured, and data hijacking or tampering is avoided.
If the verification fails, the fed back verification data is not true, or the source is not true, or the data is incomplete, and illegal prompts can be fed back.
Corresponding to the way in which the signature data is formed, the specific verification process may be as follows:
(1) the client verification tool recovers the signature data in the verification result data packet by using the prestored alliance link node public key to obtain the hash value of the data;
(2) and the client verification tool carries out Hash operation on the client identification data and the verification result of the alliance chain in the verification result data packet to obtain a Hash value, the Hash value is compared with the Hash value recovered from the signature data, if the Hash value is the same as the Hash value, the verification is passed, and if not, the verification fails.
Through the verification, whether the client identification data is legal or not can be verified.
By utilizing the product anti-counterfeiting verification method, the alliance chain (region chain) technology is utilized, the region chain data on the alliance chain nodes, namely the irreparable property of the enterprise reference information database, is utilized, and the authenticity of the initial data of the product is verified by utilizing the proper alliance chain nodes, so that the reliability of the verification basic data can be ensured; and the authentication of the client verification tool on the alliance chain platform can be realized by using the asymmetric key verification, so that the verification failure caused by the invasion of an illegal verification platform is avoided, and the reliability of the anti-counterfeiting verification of the product is ensured.
Please refer to fig. 2, which is a flowchart illustrating a method for verifying product counterfeit prevention according to a second embodiment of the present invention.
In this embodiment, the product initial data and the enterprise benchmark information database both include enterprise identification numbers; the enterprise identification number has uniqueness. Compared with the first embodiment, the product anti-counterfeiting verification method provided by the second embodiment is different in that:
the step S240 may specifically be operated according to the following steps:
s2401, inquiring a corresponding enterprise identification number in the enterprise reference information database; if the enterprise identification number is found to be legal, the process may proceed to step S2402.
S2402, judging whether the electronic tag identification number is legal or not according to a preset strategy by using a preset enterprise reference information database; if so, judging that the initial data of the product is legal.
The specific strategy for judging whether the electronic tag identification number is legal can be determined according to the requirement; for example, the electronic tag identification number of the received product initial data may be compared with product benchmark data of a storage enterprise benchmark information database, and if the electronic tag identification number has a corresponding relationship or consistency, it may be determined that the electronic tag identification number is legal; whether the electronic tag identification number has a specific format and specific data or not can also be judged, whether the specific data, the length and the format of the predetermined field meet predetermined conditions or not can also be judged, and the details are not repeated herein.
In this embodiment, the enterprise reference information database further includes a predetermined attribute of the electronic tag identification number stored corresponding to the enterprise identification number. In step S2402, using preset product reference data, and according to a predetermined policy, determining whether the electronic tag identification number is legal, specifically: determining a preset attribute of the electronic tag identification number correspondingly stored in the enterprise reference information database based on the enterprise identification number, and judging whether the electronic tag identification number meets the preset attribute; if yes, judging that the electronic tag identification number is legal. Of course, if the predetermined attribute is not satisfied, the electronic tag identification number may be counterfeit, and the corresponding authentication product may be counterfeit.
The electronic tag identification number can be a product number, and the predetermined attribute of the electronic tag identification number is an electronic tag number range parameter; in this way, in step S2402, it is determined whether the electronic tag identification number in the product initial data meets the predetermined attribute, specifically, it is determined whether the product number meets the electronic tag number range parameter, that is, whether the product number is within the electronic tag number range. The uploaded tag number range parameter is 13456-. If the electronic tag number in the initial data of the product is within the range, the electronic tag identification number can be judged to be legal; otherwise, it is illegal.
In this embodiment, step S250 may specifically include the following steps:
and S251, the alliance link node signs the verification result and the received client identification data by using a preset private key, and stores the formed signature data into the verification result data packet.
S252, judging whether the alliance link node forming the signature data in the verification result data packet meets the preset requirement; if not, go to step S253; if so, the process proceeds to step S254.
Judging whether the federation link node which verifies and signs the verification result and the client identification data meets the preset requirement, wherein the judgment specifically comprises the following steps: and judging whether the federation chain nodes which verify the verification result and the client identification data and form signature data comprise preset federation chain nodes or not. Therefore, by utilizing the difference of the authority of the alliance link nodes in the alliance link platform, after the signature of the verification result and the client identification data is verified by the preset specific alliance link node pair, the verification of the signature of the alliance link nodes is terminated, and the anti-counterfeiting verification efficiency can be improved while the anti-counterfeiting verification reliability is ensured.
In this embodiment, it is determined whether the number of federation chain nodes signed with the verification result and the client identification data reaches a predetermined number. Specifically, pointer data N is embedded in the message data including the verification result packet, and N is equal to N +1 through each verification signature of one federation chain node; and the predetermined number is preset to M (M is not less than 2). Judging whether N is more than or equal to M when judging whether the number of the alliance chain nodes which verify and sign the verification result and the client identification data reaches a preset number; when N is greater than or equal to M, determining that the federation link points signed for the verification result and the client identification data reach a predetermined number, and executing step S254; and when N is smaller than M, determining that the federation link points signed for the verification result and the client identification data do not reach the predetermined number, and entering step S253.
It can be understood that, in determining whether the federation link node signed with the verification result and the client identification data meets the predetermined requirement, the predetermined policy and the specific conditions met may be selected by those skilled in the art according to actual needs.
S253, the predetermined alliance link node sends the product verification data packet, the client identification data, and the verification result data packet to another predetermined alliance link node, and the another predetermined alliance link node performs steps S230, S240, S251, and S252;
and S254, feeding back the verification result data packet to the client verification tool.
It can be understood that, after receiving the verification result data packet (including the signature of the private key of the federation chain node a) sent from the federation chain node a, the federation chain node B may verify the verification result data packet by using a preset public key; the public key at federation chain node B forms an asymmetric key pair with a predetermined private key at federation chain node A.
And the federation chain node B further implements the steps S230, S240, S251 and S252, and performs corresponding judgment … … in step S252, repeats the above processes until the federation chain node signed with the verification result and the received client identification data meets the predetermined requirement, and proceeds to step S260.
In the embodiment, whether the source and the integrity of the initial data of the product are legal or not is judged by verifying the enterprise identification number, and whether the identification number of the electronic tag is legal or not is judged, so that the verification efficiency can be improved on one hand, and a basis can be provided for feeding back more specific information on the other hand through layered verification.
And if the federation chain node for verifying and signing the data does not meet the preset requirement, transmitting the data through a federation chain platform, and verifying and signing by another federation chain node until the preset requirement is met. Therefore, the characteristic of distributed storage of the reference information database of the enterprise of the alliance chain platform can be fully utilized, and the reliability of anti-counterfeiting verification can be improved. In the case that the verification result data packet includes signature data of a plurality of federation chain nodes, the client verification tool may preset a plurality of federation chain public keys, and in step S260, may verify the plurality of signature data and may verify consistency of a plurality of verification results.
On the basis of providing the product anti-counterfeiting verification method, the embodiment of the invention also provides a product anti-counterfeiting verification system. It should be noted that the product anti-counterfeiting verification method provided by the present invention is not limited to use of the product anti-counterfeiting verification system provided by the present invention, and may also be implemented by using other corresponding systems.
Referring to fig. 3, a logic block diagram of a product anti-counterfeiting verification system according to an embodiment of the present invention is shown.
The product anti-counterfeiting verification system comprises an electronic tag, a client verification tool and a alliance chain platform.
The electronic tag is attached to a product to be verified and can have a one-to-one relationship with the product to be verified. The electronic tag is preset with product initial data and key data, wherein the product initial data comprises an electronic tag identification number and an enterprise identification number; the key data comprises an electronic tag private key and an electronic tag public key certificate; the electronic tag identification number and the enterprise identification number are unique. The electronic tag public key certificate is obtained by signing a preset electronic tag public key by a preset enterprise private key, and the preset electronic tag public key and the electronic tag private key form an asymmetric key pair.
The client verification tool is provided with a processor, an output module and a communication module. Wherein the processor is adapted to obtain the product verification data packet from the electronic tag through the communication module; the product verification data packet comprises product initial data, signature data and an electronic tag public key certificate, wherein the signature data is obtained by signing the product initial data by using an electronic tag private key. The processor is also suitable for transmitting the product verification data packet and the client identification data stored by the processor to a preset alliance link node of a preset alliance link platform through the communication module; the client identification data includes a client identification number and a client verification serial number, i.e., the operation of step S220 is performed.
The processor is further adapted to verify the signature data in the verification result data packet by using a predetermined public key after acquiring the verification result data packet from a predetermined federation chain node of the federation chain platform through the communication module, and output the verification result through the output module, that is, the step S260 may be executed.
The client authentication tool can be a special device, a general device installed with suitable software or programs, and can also be a mobile phone installed with suitable APP. When the product anti-counterfeiting verification operation is performed, the client verification tool mainly executes steps S220 and S260 in the product anti-counterfeiting verification method, and the specific working process is not described again.
The electronic tag and the client verification tool should be matched with each other for data interaction. Such as electronic tags may include RFID tags; the RFID tag may include a circuit unit, which presets the product initial data, and an antenna unit. The communication module of the client verification tool can comprise a reading circuit unit and a reading antenna unit; when the reading antenna unit is coupled with the antenna unit of the RFID label, the client verification tool can obtain the initial data of the product.
The alliance chain platform can comprise a plurality of alliance chain nodes which are connected in a communication mode.
At least part of the alliance link nodes are preset with a storage module and a signature verification program. The storage module presets an enterprise reference information database. The storage module may store an enterprise benchmark information database corresponding to a plurality of enterprises. The enterprise reference information database may include data corresponding to the enterprise identification number and the electronic tag identification number, and may further include a step of obtaining an enterprise public key certificate by signing the enterprise public key with a preset federation chain platform public key for calling. Enterprise benchmark information databases (complete enterprise data or enterprise data summaries) of a plurality of enterprises are stored in an area form and form a block data chain to provide a data basis for further data processing of corresponding federation link nodes.
The verification signature program is adapted to be executed by a processor to:
verifying a preset enterprise public key certificate by using a preset alliance chain platform public key to obtain an enterprise public key; then, the enterprise public key is used for verifying the electronic tag public key certificate to obtain an electronic tag public key; verifying the signature data in the product verification data packet by using the electronic tag public key; if the verification is passed, judging whether the initial data of the product is legal or not according to a preset strategy by using a preset enterprise reference information database, then forming a verification result (including a result of legal verification or illegal verification), signing the verification result and the client identification data by using a preset private key, storing the formed signature data into a verification result data packet, and feeding back the verification result data packet to a client verification tool.
From the above description, it can be understood that the verification signature procedure can be preset at any federation chain node. When the product anti-counterfeiting verification operation is performed, the predetermined alliance link node mainly executes the steps S230 to S230 in the product anti-counterfeiting verification method, and the specific working process is not described again.
Corresponding to the two embodiments of the product anti-counterfeiting method, in the product anti-counterfeiting verification system provided by the invention, when a preset private key is used to sign the verification result and the client identification data at a link node of an alliance, formed signature data is stored in the verification result data packet, and the verification result data packet is fed back, the verification signature program is suitable for a processor to execute the following specific instructions:
signing the verification result and the client identification data by using a preset private key, and storing formed signature data into the verification result data packet; judging whether the alliance link node of the signature data in the verification result data packet meets a preset requirement or not; if yes, feeding back the verification result data packet to the client verification tool; and if not, sending the product verification data packet, the client identification data and the verification result data packet to another preset alliance link node. When the product anti-counterfeiting verification operation is performed, the verification signature program mainly executes steps S230, S240, S251 and S252, and the specific working process is not described again.
In a further embodiment, the product initial data and the enterprise benchmark information database may each include an enterprise identification number; the enterprise identification number has uniqueness. Of course, the enterprise benchmark information database may include a plurality of enterprise identification numbers. At this time, the signature verification program is executed by a processor, whether the initial data of the product is legal or not is judged according to a preset strategy, and specifically, a corresponding enterprise identification number is inquired in the enterprise reference information database; if the enterprise identification number is found to be legal, judging that the enterprise identification number is legal; then, a preset enterprise reference information database is utilized to judge whether the electronic tag identification number is legal or not according to a preset strategy; and if the electronic tag identification number is judged to be legal, judging that the initial data of the product is legal.
In the embodiment of the product anti-counterfeiting verification system provided by the embodiment of the invention, the electronic tag identification number can be a product number. In the enterprise benchmark information database, the predetermined attribute of the electronic tag identification number may be an electronic tag identification number range parameter.
Correspondingly, when the signature verification program is executed by the processor and whether the electronic tag identification number in the product initial data meets the predetermined attribute is judged, specifically, whether the product number meets the range parameter of the electronic tag identification number may be judged.
The product anti-counterfeiting verification system is used for judging, and illegal prompts can be fed back under the condition that the judgment results are opposite; the illegitimate prompts may be output via a client-side verification tool.
The specific process of using the product anti-counterfeiting verification system provided by the invention to perform product anti-counterfeiting verification can refer to the description of the product anti-counterfeiting verification method process, and is not repeated here.
The foregoing is illustrative of the present invention in further detail with reference to examples thereof, and the practice of the invention is not to be construed as limited thereto. For those skilled in the art to which the invention pertains, several simple deductions or substitutions can be made without departing from the spirit of the invention, and all shall be considered as belonging to the protection scope of the invention.

Claims (10)

1. The product anti-counterfeiting verification method is characterized in that a product to be verified is provided with an electronic tag, the electronic tag is preset with product initial data and key data, and the product initial data comprises an electronic tag identification number and an enterprise identification number; the key data comprises an electronic tag private key and an electronic tag public key certificate; the electronic tag identification number and the enterprise identification number are both unique; the electronic tag public key certificate is obtained by signing a preset electronic tag public key by a preset enterprise private key, and the preset electronic tag public key and the electronic tag private key form an asymmetric key pair;
the product anti-counterfeiting verification method comprises the following steps:
s210, the electronic tag signs the initial data of the product by using a preset electronic tag private key to obtain signature data; then transmitting the product verification data packet to a client verification tool; the product verification data packet comprises product initial data, signature data and an electronic tag public key certificate;
s220, after receiving the product verification data packet, the client verification tool transmits the product verification data packet and the client identification data to a predetermined alliance link node of a predetermined alliance link platform; the client identification data comprises a client identification number and a client verification serial number;
s230, verifying a preset enterprise public key certificate by using a preset alliance chain platform public key by using a preset alliance chain link point to obtain an enterprise public key; then, the enterprise public key is used for verifying the electronic tag public key certificate to obtain an electronic tag public key; verifying the signature data in the product verification data packet by using the electronic tag public key; if the verification is passed, go to step S240;
s240, the preset alliance link points judge whether the initial data of the product is legal or not according to a preset strategy by using a preset enterprise reference information database; if yes, forming a verification result and entering step S250;
s250, the coalition link node signs the verification result and the received client identification data by using a preset private key to obtain signature data; storing the formed signature data and the corresponding verification result into a verification result data packet, and feeding back the verification result data packet;
s260, the client verification tool verifies the signature data of the verification result data packet by using a preset public key and outputs a verification result; wherein the verifying comprises verifying whether the client identification data is legitimate.
2. The product anti-counterfeiting authentication method according to claim 1,
the step S250 specifically further includes the following steps:
s251, the alliance link node signs the verification result and the received client identification data by using a preset private key, and stores formed signature data into the verification result data packet;
s252, judging whether the coalition link points forming the signature data in the verification result data packet meet the preset requirements; if not, go to step S253; if yes, go to step S254;
s253, the predetermined alliance link node sends the product verification data packet, the client identification data, and the verification result data packet to another predetermined alliance link node, and the another predetermined alliance link node performs steps S230, S240, S251, and S252;
and S254, feeding back the verification result data packet to the client verification tool.
3. The product anti-counterfeiting authentication method according to claim 2,
in step S252, it is determined whether the federation link node forming signature data in the verification result data packet meets a predetermined requirement, specifically one of the following:
(1) judging whether the number of alliance chain nodes forming signature data in the verification result data packet reaches a preset number;
(2) and judging whether the federation chain nodes forming the signature data in the verification result data packet comprise predetermined federation chain nodes or not.
4. The product anti-counterfeiting authentication method according to any one of claims 1 to 3,
the product initial data and the enterprise reference information database both comprise enterprise identification numbers; the enterprise identification number has uniqueness;
in step S240, the determining, by the predetermined federation link point, whether the initial data of the product is legal according to a predetermined policy by using a preset enterprise reference information database specifically includes:
s2401, inquiring a corresponding enterprise identification number in the enterprise reference information database; if the enterprise identification number is found to be legal, judging that the enterprise identification number is legal;
s2402, judging whether the electronic tag identification number is legal or not according to a preset strategy by using a preset enterprise reference information database; if so, judging that the initial data of the product is legal.
5. The product anti-counterfeiting authentication method according to claim 4,
the enterprise benchmark information database also comprises a preset attribute of the electronic tag identification number stored corresponding to the enterprise identification number;
in step S2402, the preset enterprise benchmark information database is used to determine whether the electronic tag identification number is legal according to a predetermined policy, specifically, a predetermined attribute of the electronic tag identification number stored in the enterprise benchmark information database is determined based on the enterprise identification number, and it is determined whether the electronic tag identification number meets the predetermined attribute, if so, it is determined that the electronic tag identification number is legal.
6. The product anti-counterfeiting authentication method according to claim 5,
the electronic tag identification number is a product number, and the predetermined attribute of the electronic tag identification number is an electronic tag number range parameter;
in step S2402, it is determined whether the electronic tag identification number satisfies the predetermined attribute, specifically, whether the product number satisfies the electronic tag number range parameter is determined.
7. A product authentication system, comprising:
the electronic tag is attached to a product to be verified, initial product data and key data are preset, and the initial product data comprise an electronic tag identification number and an enterprise identification number; the key data comprises an electronic tag private key and an electronic tag public key certificate; the electronic tag identification number and the enterprise identification number are both unique; the electronic tag public key certificate is obtained by signing a preset electronic tag public key by a preset enterprise private key, and the preset electronic tag public key and the electronic tag private key form an asymmetric key pair;
the client verification tool is provided with a processor, an output module and a communication module; the processor is suitable for acquiring the product verification data packet from the electronic tag through the communication module; the product verification data packet comprises product initial data, signature data and an electronic tag public key certificate, wherein the signature data is obtained by signing the product initial data by using an electronic tag private key; the system is also suitable for transmitting a product verification data packet and client identification data stored by the system to a preset alliance link node of a preset alliance link platform through the communication module; the client identification data comprises a client identification number and a client verification serial number; the authentication method is also suitable for verifying signature data in the verification result data packet by using a preset public key after the verification result data packet is obtained from a preset alliance link node of the alliance link platform through the communication module, and outputting a verification result through the output module;
the alliance chain platform comprises a plurality of alliance chain nodes which are connected in a communication mode; at least part of the alliance link nodes are preset with a storage module and a signature verification program; an enterprise reference information database is preset in the storage module; the verification signature program is adapted to be executed by a processor to: verifying a preset enterprise public key certificate by using a preset alliance chain platform public key to obtain an enterprise public key; then, the enterprise public key is used for verifying the electronic tag public key certificate to obtain an electronic tag public key; verifying the signature data in the product verification data packet by using the electronic tag public key; if the verification is passed, judging whether the initial data of the product is legal or not according to a preset strategy by using a preset enterprise reference information database; and if the initial data of the product is judged to be legal, forming a verification result, signing the verification result and the client identification data by using a preset private key, storing the formed signature data into a verification result data packet, and feeding back the verification result data packet.
8. The product anti-counterfeiting validation system according to claim 7,
the verification signature program is suitable for being executed by a processor by the following specific instructions:
signing the verification result and the client identification data by using a preset private key, and storing formed signature data into the verification result data packet; judging whether the alliance link points forming the signature data in the verification result data packet meet the preset requirement or not; if yes, feeding back the verification result data packet to the client verification tool; and if not, sending the product verification data packet, the client identification data and the verification result data packet to another preset alliance link node.
9. The product anti-counterfeiting validation system according to claim 7 or 8,
the product initial data and the enterprise reference information database both comprise enterprise identification numbers; the enterprise identification number has uniqueness;
the signature verification program is executed by a processor, whether the initial data of the product is legal or not is judged according to a preset strategy, and specifically, a corresponding enterprise identification number is inquired in the enterprise reference information database; if the enterprise identification number is found to be legal, judging that the enterprise identification number is legal; then, a preset enterprise reference information database is utilized to judge whether the electronic tag identification number is legal or not according to a preset strategy; and if the electronic tag identification number is judged to be legal, judging that the initial data of the product is legal.
10. The product anti-counterfeiting validation system according to claim 9,
the electronic tag identification number is a product number; an electronic tag number range parameter is stored in the enterprise reference information database corresponding to the enterprise identification number;
and executing the signature verification program by a processor, and judging whether the electronic tag identification number is legal or not, specifically, judging whether the product number meets the electronic tag number range parameter or not.
CN201811383080.8A 2018-11-20 2018-11-20 Product anti-counterfeiting verification method and system Active CN109544182B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811383080.8A CN109544182B (en) 2018-11-20 2018-11-20 Product anti-counterfeiting verification method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811383080.8A CN109544182B (en) 2018-11-20 2018-11-20 Product anti-counterfeiting verification method and system

Publications (2)

Publication Number Publication Date
CN109544182A CN109544182A (en) 2019-03-29
CN109544182B true CN109544182B (en) 2021-05-14

Family

ID=65849168

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811383080.8A Active CN109544182B (en) 2018-11-20 2018-11-20 Product anti-counterfeiting verification method and system

Country Status (1)

Country Link
CN (1) CN109544182B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112488532A (en) * 2020-12-01 2021-03-12 东营南科电气有限责任公司 Power equipment data monitoring method and device and server

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101945104A (en) * 2010-08-31 2011-01-12 百视通网络电视技术发展有限责任公司 Terminal anti-fake device, authentication device and anti-fake and authentication method thereof
CN102196436A (en) * 2010-03-11 2011-09-21 华为技术有限公司 Security authentication method, device and system
CN105024824A (en) * 2014-11-05 2015-11-04 祝国龙 Method for generating and verifying credible label based on asymmetrical encryption algorithm and system
CN106529969A (en) * 2016-10-08 2017-03-22 惠州Tcl移动通信有限公司 Method and system for carrying out fake checking and tracing by using NFC (near field communication)
CN106570710A (en) * 2016-10-27 2017-04-19 纸飞机(北京)科技有限公司 Commodity anti-counterfeiting method and device
CN106878318A (en) * 2017-03-03 2017-06-20 钱德君 A kind of block chain real time polling cloud system
CN107657553A (en) * 2017-09-21 2018-02-02 浙江惠码科技有限公司 A kind of electronic contract generation method based on alliance's chain, information anti-fake method of tracing to the source
CN107730254A (en) * 2016-08-12 2018-02-23 深圳市嗨马支付信息有限公司 Currency affaris safety trade system and currency method for secure transactions
CN108009830A (en) * 2017-12-14 2018-05-08 上海密尔克卫化工储存有限公司 Products in circulation tracking and system based on block chain
CN108055135A (en) * 2017-12-13 2018-05-18 杭州全视软件有限公司 A kind of method of intelligent terminal authentication management
CN108694594A (en) * 2018-05-29 2018-10-23 阿里巴巴集团控股有限公司 Commodity source tracing method and device, electronic equipment based on block chain
CN108830616A (en) * 2018-06-08 2018-11-16 浙江捷尚人工智能研究发展有限公司 Antifake method for products, electronic equipment, storage medium and system based on block chain

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9973342B2 (en) * 2016-06-16 2018-05-15 International Business Machines Corporation Authentication via group signatures

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102196436A (en) * 2010-03-11 2011-09-21 华为技术有限公司 Security authentication method, device and system
CN101945104A (en) * 2010-08-31 2011-01-12 百视通网络电视技术发展有限责任公司 Terminal anti-fake device, authentication device and anti-fake and authentication method thereof
CN105024824A (en) * 2014-11-05 2015-11-04 祝国龙 Method for generating and verifying credible label based on asymmetrical encryption algorithm and system
CN107730254A (en) * 2016-08-12 2018-02-23 深圳市嗨马支付信息有限公司 Currency affaris safety trade system and currency method for secure transactions
CN106529969A (en) * 2016-10-08 2017-03-22 惠州Tcl移动通信有限公司 Method and system for carrying out fake checking and tracing by using NFC (near field communication)
CN106570710A (en) * 2016-10-27 2017-04-19 纸飞机(北京)科技有限公司 Commodity anti-counterfeiting method and device
CN106878318A (en) * 2017-03-03 2017-06-20 钱德君 A kind of block chain real time polling cloud system
CN107657553A (en) * 2017-09-21 2018-02-02 浙江惠码科技有限公司 A kind of electronic contract generation method based on alliance's chain, information anti-fake method of tracing to the source
CN108055135A (en) * 2017-12-13 2018-05-18 杭州全视软件有限公司 A kind of method of intelligent terminal authentication management
CN108009830A (en) * 2017-12-14 2018-05-08 上海密尔克卫化工储存有限公司 Products in circulation tracking and system based on block chain
CN108694594A (en) * 2018-05-29 2018-10-23 阿里巴巴集团控股有限公司 Commodity source tracing method and device, electronic equipment based on block chain
CN108830616A (en) * 2018-06-08 2018-11-16 浙江捷尚人工智能研究发展有限公司 Antifake method for products, electronic equipment, storage medium and system based on block chain

Non-Patent Citations (5)

* Cited by examiner, † Cited by third party
Title
A Novel Blockchain-Based Product Ownership Management System (POMS) for Anti-Counterfeits in the Post Supply Chain;Kentaroh Toyoda等;《IEEE Access》;20170628;第5卷;第17465-17477页 *
Block-Supply Chain: A New Anti-Counterfeiting Supply Chain Using NFC and Blockchain;Naif Alzahrani 等;《CryBlock"18: Proceedings of the 1st Workshop on Cryptocurrencies and Blockchains for Distributed Systems》;20180615;第30-35页 *
使用双区块链的防伪溯源系统;刘家稷 等;《信息安全学报》;20180531;第3卷(第3期);第17-29页 *
基于区块链技术的防伪系统的设计与实现;安瑞 等;《密码学报》;20170430;第4卷(第2期);第199-208页 *
安全RFID和区块链技术在瓶装酒防伪溯源中的应用研究;杨云勇 等;《集成电路应用》;20180331;第35卷(第3期);第66-69页 *

Also Published As

Publication number Publication date
CN109544182A (en) 2019-03-29

Similar Documents

Publication Publication Date Title
CN109257342B (en) Block chain cross-chain authentication method, system, server and readable storage medium
US8334757B2 (en) Controlling data access to and from an RFID device
CN109360008B (en) Product anti-counterfeiting authentication updating method and system
WO2017016318A1 (en) Credible label generation and verification method and system based on asymmetric cryptographic algorithm
CN1707999B (en) Distributed management of a certificate revocation list
CN109522988B (en) Method and system for updating product anti-counterfeiting electronic label information
CN101539980B (en) Method for accessing a data station to an electronic device
CN111949672B (en) Block chain storage method for supporting incremental update of Internet-of-things data
CN109981682A (en) Data verification method, the apparatus and system of internet of things equipment
EP3432179B1 (en) Security tag and electronic system usable with molded case circuit breakers
US11368315B2 (en) Systems and methods of device ownership self-verification
US9679117B2 (en) System and method for obtaining an authorization key to use a product
CN112069550B (en) Electronic contract evidence-storing system based on intelligent contract mode
CN111259026B (en) Block chain-based anti-counterfeiting method, system and storage medium
CN111815321A (en) Transaction proposal processing method, device, system, storage medium and electronic device
WO2013075547A1 (en) Product anti-forgery method and system, and product identity information generation method and device
CN105530099A (en) Anti-fake verification method, device and system and anti-fake certificate based on IBC (Identity-Base Cryptography)
CN109583555B (en) Product anti-counterfeiting electronic tag authentication method and system
CN109544182B (en) Product anti-counterfeiting verification method and system
CN109508560A (en) Electronic tag offline authentication system and method
CN113672991A (en) Public electronic contract contracting method based on block chain technology
CN109543791B (en) Product anti-counterfeiting verification method and system
CN109509007A (en) Product false proof electronic tag and electronic tag authentication method and system
CN104883260B (en) Certificate information processing and verification method, processing terminal and authentication server
CN109523277B (en) Product anti-counterfeiting electronic tag authentication method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant