CN110310130A - A kind of method for anti-counterfeit and system - Google Patents

A kind of method for anti-counterfeit and system Download PDF

Info

Publication number
CN110310130A
CN110310130A CN201910533762.0A CN201910533762A CN110310130A CN 110310130 A CN110310130 A CN 110310130A CN 201910533762 A CN201910533762 A CN 201910533762A CN 110310130 A CN110310130 A CN 110310130A
Authority
CN
China
Prior art keywords
security code
code
owner
intelligent terminal
mobile intelligent
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910533762.0A
Other languages
Chinese (zh)
Other versions
CN110310130B (en
Inventor
张学忠
巫景华
陈喜生
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201910533762.0A priority Critical patent/CN110310130B/en
Publication of CN110310130A publication Critical patent/CN110310130A/en
Application granted granted Critical
Publication of CN110310130B publication Critical patent/CN110310130B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • G06Q30/0185Product, service or business identity fraud

Landscapes

  • Business, Economics & Management (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Accounting & Taxation (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Finance (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention relates to information anti-fake fields, more specifically, it is related to a kind of method for anti-counterfeit and system, the present invention will be by the way that security code to be written in alliance's block chain, the characteristic that can not be distorted using alliance's chain data, it is ensured that the quantity of the security code created in anti-counterfeiting system, value and its true and false examination person information will not be tampered, change for the first time.The unique identification for not storing user in anti-counterfeiting system directly simultaneously, forges, distorts the owner information of any level, will lead to the failure of verification process, so as to the behavior found in time and early warning giver is tampered, changes.

Description

A kind of method for anti-counterfeit and system
Technical field
The present invention relates to information anti-fake fields, more particularly, to a kind of method for anti-counterfeit and system.
Background technique
Currently, fake and inferior commodities flood market, the interests of consumer are seriously compromised, enterprise brings to commodity production Huge economic loss has very big social harm.Anti-counterfeiting technology develops to today, well known anti-fake side Method, technology and product are innumerable, and method for anti-counterfeit is broadly divided into four major class, are respectively: vision determines, consulting determines, equipment is sentenced Calmly, block chain is anti-fake.
(1) vision determines, i.e., the mode visually distinguishing true from false.Currently available technology has laser hologram, texture, radium-shine, purple Outer fluorescence, day phototropic, heat-sensitive variable colour, pressure-sensitive discoloration, wet sensitive colour changing, accurate version line, miniature printing, thermochromic liquid crystal, super wiping Deformation is wiped, picture and text is disposably crushed, opens type duplicature applique, irreversible memory-type temperature-sensitive, reversible feel heat-sensitive variable colour, paper Miniature stealth of water wave, cholesteryl liquid crystal, graphic code etc..If identifying content and method letter using the anti-fake product of this technology It is single, then it is easy to imitated, antifalse effect is not achieved;If identifying that content and method are excessively cumbersome, certain identification experience is needed, It is unfavorable for promoting the use of, while this technology is due to only leaning on macroscopic visual to determine the true and false of label, it is inaccurate, not rigorous.
(2) consulting determines, i.e., in such a way that phone, short message, internet etc. inquire and distinguish true from false.Using this skill If the anti-fake product of art does not limit inquiry times, inquiry code can be replicated easily, and antifalse effect is poor;If being limited to one The primary inquiry mode of code, then in the presence of the deficiency that can not be verified, can only disposably verify before purchase.This technology is due to only anti-simultaneously The correctness of inquiry code itself is presented, or is only capable of informing and is queried number, if the judgement of certified products usually allows buyer voluntarily to sentence Disconnected, query result is difficult to convince people, and the possibility for existing and cracking, bribes purchase number to copy, not enough rigorously, confidence level not Height exists simultaneously the case where illegally increasing security code newly and illegal the case where changing security code number of inspections, state.
(3) equipment determines, i.e., the mode being distinguish true from false using special equipment is shown true and false information on special equipment. As holographic magnetic card, magnetic ink, smart credit card, bar code, two dimensional code, metallic barcode, IC card, RFID card, laser card, biochemistry, Atomic nucleus double card, electronic recognition, nuclear track technique etc..Pass through special equipment itself when examination or sends data to network server Encryption and decryption and examination are carried out, ping procedure is transparent to user, and simple, convenient, product can be checked repeatedly after before sales, With certain practicability and anti-counterfeit capability.The electronic anti-counterfeit tag of some of anti-fake products is also built-in with random code generator Or sequence number generator, realize that every verifying is primary, verifying end/server all generates a new random code or serial number, to product mark Know;Some anti-fake products additionally provide the independent authentication or two-way authentication function of label and dedicated identification device;Some anti-fake productions Product are also based on PKI/CA mode, encrypt to product information, identifying code, sequence number/serial number, implement multistage encryption and decryption, number Signature etc..Although such technology increases imitated difficulty to some extent, due to that need to determine the true and false by special equipment, At high cost, versatility is not strong, more it is essential that verifying means are single, verifies the pseudo- of imitated identification equipment without other assistants Results card means, although some method for anti-counterfeit propose label, identification equipment bi-directional verification, but if imitated identification equipment is only The pseudo- reading of label information and the pseudo- connection examination of server are carried out, then the information of emulation presentation " being verified, certified products " mentions Show, then crack the method for anti-counterfeit such as bi-directional verification easily, to realize the purpose of deception consumer, anti-counterfeit capability surface is powerful, real It is then very fragile.
(4) method for anti-counterfeit based on block chain is waited until by storage product information, product trading information, security code key On block chain, characteristic can not be distorted using the data of block chain, realizes product false proof.Although the anti-fake scheme reality based on block chain The case where preventing anti-counterfeit server end from increasing anti-fake number of codes privately or distorting anti-fake code value, state, but because block chain are showed Realize that data can not distort of mechanism itself, it is slower to the speed of write-in, the reading of data block on block chain, for product quantity The product that disappear fastly that radix is big, the transaction frequency is high, end transaction intermediate links are many and diverse, the method for anti-counterfeit based on block chain are complicated for operation (such as the operation such as registration or binding for requiring All Activity link user), product circulation and checking feature are low, are not suitable for Disappear the anti-fake scenes of product fastly.
The patent of the relevant technologies retrieved at present include the following:
It is a kind of based on mobile intelligent terminal anti-fake source tracing method and system (granted patent number: 201410819097.9), Method is the following steps are included: S1. mobile intelligent terminal reads security code and by security code and the corresponding mark of mobile intelligent terminal Number it is sent to fake certification server;Whether the security code that S2. judgement of fake certification server receives is legal, then holds if legal Otherwise row step S3 returns to security code information unauthorized;S3. fake certification server passes through the terminal iidentification number received and judges The terminal whether be security code current ownership person or with can number of inspections power person on probation, be if then returning to Product Validation Otherwise the information of certified products returns to the information that terminal does not have security code examination permission.The program is looked by establishing product false proof code Permission tree and product total state ping procedure information chain are tested, security code and examination mobile intelligent terminal are bound, allow to produce Product it is pre-sales, carry out multiple true and false examination after sale, while ensuring that product false proof code is authenticated by binding mobile intelligent terminal The credibility and uniqueness of journey.But the program exists following insufficient: (1) operating process is cumbersome, it is necessary to assure product real world Middle intermediate links information chain it is complete.It is embodied in: 1) when product association upper security code enter sales section, all agents Need to carry out being put in storage out and false proof database is recorded of each product step by step;2) when product is sold, sales force must be first Know that the mobile intelligent terminal unique identifying number of buyer could complete sales process;3) when product is gifted, giver must be first Know that the mobile intelligent terminal unique identifying number of acceptor could complete the process of gifting.And for the product that disappear fastly, the base of product quantity Number is huge, and sale intermediate link is various, and the sale of especially sale end is various informative, there is the possibility for circulation of repeatedly gifting Property, know step by step and record the mobile intelligent terminal unique identifying number of each link product owner can operation difficulty it is big.(2) lead to It crosses no platform authorization (such as hacker attack, SQL injection) and increases the behavior of security code, modification newly in fake certification server Has the behavior of the behavior of anti-fake code value or state, the current owner for distorting product false proof code, this method itself is not known Not, it takes precautions against, pre-alerting ability of auditing.
Tracing to the source method for anti-counterfeit (application number CN201811410492.6) based on ownership on a kind of block chain, this method benefit Commodity data is stored with ether mill block chain, realizes relevant operation logic using intelligent contract, each commodity possess tracing back for oneself Source security code (commodity ID) carries out transaction record using commodity ownership.Specifically, this method is first by management organization in ether Intelligent contract is disposed on the block platform chain of mill, by the information and Transaction Information of related contract storage commodity, the ownership of commodity It is bound by current owner's field of merchandise news, the operation about the transformation of commodity ownership is all recorded in contract every time, and The true and false is determined according to ownership, is traced to the source according to commodity ID.But the program exists following insufficient: (1) every time about commodity institute The have the right operation of transformation is all recorded in contract, the block counts for leading to block chain frequent operation, needing to store record in block chain It is big according to amount, easily there is performance bottleneck.(2) ownership of commodity is bound by commodity current owner's field, needs to know and infuse The owner information of volume each of goods batch link, it is cumbersome, can operation difficulty it is big, with the product that disappear fastly in real world Transaction, circulation process be not inconsistent, the product that are not suitable for disappearing fastly are anti-fake.
Currently, the shortcomings that prior art includes the following: it is the mode based on a product one yard that product false proof, which is traced to the source, because tracing back The needs in source will record the circulation status and related link information of each single-item (one yard) of each product, belong to high concurrent, number The application scenarios high according to change frequency, concurrency is big;If fruit product belongs to the product that disappear fastly, then its data volume is even more magnanimity grade data. And block chain is based on distributed node data model storage, is only tampered more than the node data of the whole network 51%, is just able to achieve The purpose of data tampering realizes what data on chain can not distort to increase the difficulty of data tampering to a certain extent Purpose.Block chain is not suitable for high concurrent, the frequent application scenarios of data change because multiple nodes to be written simultaneously, therefore, Each movement write-in block chain of each product of anti-fake traceability system is unpractical.
And in the prior art, the binding product owner carries out the authenticity of products verification method based on owner's permission or has It is following insufficient:
(1) it illegally increases security code newly, illegally distort the behavior for having anti-fake code value and do not audit, take precautions against and warning function;
(2) behavior for illegally distorting the initial true and false examination user of product false proof code is not audited, is taken precautions against and warning function;
(3) behavior for the giver for illegally distorting product false proof code is not audited, is taken precautions against and warning function;
(4) require product from outbound to sale, it is necessary to record the owner information of each intermediate links, and must pre- prophet The unique identification information of the lower link owner in road, it is cumbersome, it is unsuitable for the anti-fake of product that disappear fastly.
Summary of the invention
The behavior for illegally increasing, distorting security code newly is carried out auditing with early warning and be grasped in order to solve to lack in the prior art Make cumbersome deficiency, the present invention provides a kind of method for anti-counterfeit and systems.
In order to solve the above technical problems, technical scheme is as follows:
A kind of method for anti-counterfeit, comprising the following steps:
Step S1: building anti-counterfeiting system, the system includes information database, includes anti-in the information database Pseudo-code information table and product circulation log sheet, the record attribute of security code information table include product number, security code, security code State, the root grade owner, the leaf grade owner and date-time, the security code state include sell, sell, gifting in, It gifts four kinds of states;The record attribute of product circulation log sheet includes security code, the leaf grade owner, the parent owner, date Time;The root grade owner, the leaf grade owner initial value be all 0;
Step S2: creation security code, security code information table generates N number of unique security code of value, and N number of security code is written In alliance's block chain;
Step S3: the security code of generation is subjected to physical interconnection with product in the form of antifalsification label, and by security code information Security code in table establishes corresponding logic association with product;
Step S4: after product is sold, when carrying out authenticity of products verifying, consumer is read anti-fake by mobile intelligent terminal Security code in label is sent to anti-counterfeiting system together with the unique identifying number of the mobile intelligent terminal;
Step S5: using security code as code key, security code is encrypted using symmetric encipherment algorithm, the result that will be obtained It is denoted as retrieval security code;
Step S6: it is equal to the note of retrieval security code in retrieval security code information table with the presence or absence of record attribute " security code " Record, if it does not exist, then returning to query result is invalid information into mobile intelligent terminal, and fake certification process terminates;If depositing Executing step S7;
Step S7: whether the record attribute " security code state " for judging search result record is " sale ", if so, executing step Rapid S8, if it is not, executing step S9;
Step S8: being updated the record in security code information table, and record attribute " security code state " is changed to Record attribute " date-time " is changed to current date-time by " selling ", is made with the unique identifying number of mobile intelligent terminal For code key, security code is encrypted using symmetric encipherment algorithm, by encrypted ciphertext update to record attribute, " root grade is all In person ", and return query result be certified products information into mobile intelligent terminal;
Step S9: using the unique identifying number of mobile intelligent terminal as code key, using symmetric encipherment algorithm to security code into Row encryption, is denoted as owner's ciphertext for encrypted ciphertext;
Step S10: whether the record attribute " security code state " for judging search result record is " selling ", if so, holding Row step S11, if it is not, thening follow the steps S12;
Step S11: judging whether the value of record attribute " the root grade owner " is equal to the value of owner's ciphertext, if differed, Then returning to query result is to have no right the information of verifying to mobile intelligent terminal, and fake certification process terminates;If equal, return Query result is the information of certified products to mobile intelligent terminal;Fake certification process terminates;
Step S12: judge search result record record attribute " security code state " whether be " in gifting ", if so, S13 is thened follow the steps, it is no to then follow the steps S15;
Step S13: judge record attribute " the root grade owner " value or record attribute " the leaf grade owner " value whether etc. In the value of owner's ciphertext, if equal, return query result be product gift in information to mobile intelligent terminal: execution Step S14;
Step S14: whether consumer's selection " is provided by mobile intelligent terminal and is gifted authorization code ", if so, executing step Rapid S22, if it is not, then terminating this fake certification process;
Step S15: whether the record attribute " security code state " for judging search result record is " gifting ", if it is, Step S16 is executed, otherwise returns to information that query result is Product Status exception to mobile intelligent terminal, fake certification process knot Beam;
Step S16: judging whether the value of record attribute " the leaf grade owner " is equal to the value of owner's ciphertext, if differing, Returning to query result is to have no right the information of verifying into mobile intelligent terminal, and fake certification process terminates;If equal, step is executed Rapid S17;
Step S17: retrieving product circulation log sheet, and search condition is that record attribute " security code " is equal to anti-fake Code is as code key, the value encrypted using symmetric encipherment algorithm to security code, and record attribute " the leaf grade owner " Equal to what is encrypted using the unique identifying number of mobile intelligent terminal as code key, using symmetric encipherment algorithm to security code Value, two search conditions be with relationship;
Step S18: judging whether there is search result, and if it does not exist, then returning to query result is that product circulation log is different To mobile intelligent terminal, fake certification process terminates normal information;Search result if it exists thens follow the steps S19;
Step S19: using the unique identifying number of mobile intelligent terminal as key, to record attribute " the parent institute retrieved The person of having " is decrypted, and parent mobile intelligent terminal unique identification number is obtained, with parent mobile intelligent terminal unique identification number As code key, security code is encrypted using symmetric encipherment algorithm, obtained result is denoted as the retrieval root grade owner;
Step S20: retrieval security code information table, search condition is equal to for the value of record attribute " security code " to be made with security code For code key, the value encrypted using symmetric encipherment algorithm to security code, and record attribute " the root grade owner " is equal to Retrieve the value of the root grade owner;If it exists, then returning to query result is the information of certified products into mobile intelligent terminal, fake certification Process terminates;If it does not exist, S21 is thened follow the steps;
Step S21: to product circulation log sheet retrieve, search condition be record attribute " security code " value be equal to Security code is as code key, the value encrypted using symmetric encipherment algorithm to security code, and " leaf grade is all for record attribute The value of person " be equal to using parent mobile intelligent terminal unique identification number as code key, using symmetric encipherment algorithm to security code into The value that row encryption obtains, jumps back to step S18;
Step S22: consumer gifts authorization code information into anti-counterfeiting system by reading in mobile intelligent terminal, this is gifted Authorization code information includes to prevent pseudo-code as code key, using symmetric encipherment algorithm to giver mobile intelligent terminal unique identification Number value encrypted;And using current security code as code key, authorization code information of gifting is decrypted;Can judgement decrypt acquisition Giver mobile intelligent terminal unique identification number, if cannot, returning to query result is that the gift in vain information of authorization code arrives Mobile intelligent terminal, fake certification process terminate;If can, then follow the steps S23;
Step S23: using obtained giver's mobile intelligent terminal unique identification as code key, using symmetric encipherment algorithm Encrypted ciphertext is carried out to security code and is given to owner's ciphertext;And judge whether leaf owner value is NULL value, if not For NULL value, S24 is thened follow the steps, it is no to then follow the steps S27;
Step S24: judging whether the value of record attribute " the leaf grade owner " is equal to the value of owner's ciphertext, if differing, Information that query result is giver's Information abnormity is returned to mobile intelligent terminal, fake certification process terminates;If equal, execute Step S25;
Step S25: updating security code information table, is to gift by security code Status Change, with current mobile intelligent terminal Unique identifying number encrypts security code as code key, using symmetric encipherment algorithm, by encrypted ciphertext more genus new to China Property " the leaf grade owner ";
Step S26: upgrading products circulation log sheet database, using security code as code key, using symmetric encipherment algorithm pair Security code is encrypted, and assigns obtained result to security code;Using the unique identifying number of mobile intelligent terminal as code key, use Symmetric encipherment algorithm encrypts security code, assigns encrypted ciphertext to the leaf grade owner;Only with mobile intelligent terminal One identification number encrypts security code as code key, using symmetric encipherment algorithm, and encrypted ciphertext imparting leaf grade is owned Person;Using security code as code key, giver mobile intelligent terminal unique identification number is encrypted using symmetric encipherment algorithm Assign encrypted ciphertext to the parent owner;And returning to query result is success of gifting, the information of certified products is whole to intelligent movable End, fake certification process terminate;
Step S27: judging whether the value of record attribute " the root grade owner " is equal to the value of owner's ciphertext, if differing, Information that query result is giver's Information abnormity is returned to mobile intelligent terminal, fake certification process terminates;If equal, into Enter to execute step S25.
Preferably, the symmetric encipherment algorithm is DES algorithm, 3DES algorithm, TDEA algorithm, Blowfish algorithm, RC5 One or more of algorithm, IDEA algorithm, aes algorithm.
Preferably, the value of the anti-counterfeiting system not explicit storage security code;Not the explicit storage root grade owner, Ye Jisuo The value of the person of having, the parent owner.
Preferably, the antifalsification label is one-dimension code label, coating one-dimension code label, two-dimension code label, coating two dimensional code One or more combinations of label, RFID label tag, NFC label.
A kind of anti-counterfeiting system, the system include information database based on method described above, the system, institute It include that security code information table and product circulation log sheet, security code information table have comprising record attribute in the information database stated Product number, security code, security code state, the root grade owner, the leaf grade owner and date-time, the security code state Including in selling, sell, gifting, four kinds of states of gifting;Product circulation log sheet includes that record attribute has security code, leaf grade all Person, the parent owner, date-time.
Preferably, the pseudo-code information table encrypts itself using symmetric encipherment algorithm using security code as key, Encrypted ciphertext is stored in record attribute " security code ";When product warehouse-out associated by security code is sold, security code State be changed to " sell ";When product is checked the true and false after selling for the first time, change security code state is " selling ", examination person The root grade owner as the product;The product owner produces in systems gift authorization code after, the Status Change of security code For " in gifting ";After acceptor receives the process of gifting, the Status Change of security code is " gifting ";Product associated by security code is sold After out, when carrying out authenticity of products verifying for the first time, the unique identification number with the mobile intelligent terminal of the verifier is key, is used Symmetric encipherment algorithm encrypts security code, and the ciphertext encrypted is stored in record attribute " the root grade owner ";It is anti-fake The date-time of verifying is stored into date-time attribute.After product is gifted, with acceptor's mobile intelligent terminal Unique identification number is key, is encrypted using symmetric encipherment algorithm to security code, the ciphertext encrypted is stored in record In attribute " the leaf grade owner ", when behavior occurs repeatedly to gift for product, the leaf grade owner stores the movement of final acceptor The unique identification number of intelligent terminal is the cipher-text information of key.
Preferably, it in product circulation log sheet, when product gifts behavior, using security code as key, adopts Itself is encrypted with symmetric encipherment algorithm, encrypted ciphertext is stored in " security code " attribute;The shifting of product giver Dynamic intelligent terminal unique identification number is key, is encrypted using symmetric encipherment algorithm to security code, ciphertext is stored in " parent In the owner " attribute;The mobile intelligent terminal unique identification number of product acceptor is key, using symmetric encipherment algorithm to anti- Pseudo-code is encrypted, and ciphertext is stored in " the leaf grade owner " attribute;Acceptor's complete to gift date-time storage of process is arrived In " date-time " attribute.
Preferably, include security code block in alliance's block chain and check block for the first time, described is anti-fake Code block is for storing security code;The block of examination for the first time is used to store the security code and examination person's letter of true and false examination for the first time Breath.
Preferably, the system periodically verifies security code, the specific steps are as follows:
The data read request of " security code data block " is issued to alliance's block chain, alliance's block chain returns to anti-counterfeiting system The unique security code of N number of value that batch is generated and is written, before last checkout action in return value verification anti-counterfeiting system Whether the quantity of the anti-fake code of tracing to the source of creation is consistent, whether value is consistent;
The read requests of the data of " security code for the first time examination person's data block " are issued to alliance's chain block chain, alliance's chain returns The antiforge system that goes back on defense has carried out the security code and its examination person's information of true and false examination for the first time, in return value verification anti-counterfeiting system The security code of progress before checkout action true and false examination for the first time and its whether the quantity of examination person consistent, value whether one It causes;
If inconsistent, anti-counterfeiting system issues the inconsistent alarm of data and relevant inconsistent information record, while utilizing connection Data on alliance's block chain in the synchronous anti-counterfeiting system of data, the restoration and reconstruction after carrying out exception;
If consistent, the change of the kainogenesis since last checkout action has been written into alliance's block chain for anti-counterfeiting system Data:
1) alliance's block chain is written in the form of " security code data block " in newly-increased security code;
2) the newly generated security code for having carried out the examination of the true and false for the first time and its examination person are with " security code examination person's data for the first time Alliance's chain is written in the form of block ".
Compared with prior art, the beneficial effect of technical solution of the present invention is:
The present invention is by the way that security code to be written in alliance's block chain, the characteristic that can not be distorted using alliance's chain data, really Protected the quantity of the security code created in anti-counterfeiting system, value and its true and false examination person information will not be tampered, change for the first time.Together When anti-counterfeiting system in directly store user unique identification, forge, distort the owner information of any level, all will lead to and test The failure of card process, so as to the behavior found in time and early warning giver is tampered, changes.
Detailed description of the invention
Fig. 1 is the flow chart that mobile intelligent terminal of the invention verifies the true and false.
Fig. 2 is the flow chart that mobile intelligent terminal of the invention verifies the true and false.
Fig. 3 is the flow chart of verification process of the invention of gifting.
Fig. 4 is the flow chart that the present invention executes movement of gifting.
Fig. 5 is the flow chart that the present invention carries out anti-fake code check.
In attached drawing, AES (x, y) indicates to encrypt y using symmetric encipherment algorithm using x as code key.
Specific embodiment
The attached figures are only used for illustrative purposes and cannot be understood as limitating the patent;
In order to better illustrate this embodiment, the certain components of attached drawing have omission, zoom in or out, and do not represent actual product Size;
To those skilled in the art, it is to be understood that certain known features and its explanation, which may be omitted, in attached drawing 's.
The following further describes the technical solution of the present invention with reference to the accompanying drawings and examples.
Embodiment 1
As shown in fig. 1~fig. 5, a kind of method for anti-counterfeit is present embodiments provided, comprising the following steps:
Step S1: building anti-counterfeiting system, the system includes information database, includes anti-in the information database Pseudo-code information table and product circulation log sheet, the record attribute of security code information table include product number, security code, security code State, the root grade owner, the leaf grade owner and date-time, the security code state include sell, sell, gifting in, It gifts four kinds of states;The record attribute of product circulation log sheet includes security code, the leaf grade owner, the parent owner, date Time;The root grade owner, the leaf grade owner initial value be all 0;
Step S2: creation security code, security code information table generates N number of unique security code of value, and N number of security code is written In alliance's block chain;
Step S3: the security code of generation is subjected to physical interconnection with product in the form of antifalsification label, and by security code information Security code in table establishes corresponding logic association with product;
Step S4: after product is sold, when carrying out authenticity of products verifying, consumer is read anti-fake by mobile intelligent terminal Security code in label is sent to anti-counterfeiting system together with the unique identifying number of the mobile intelligent terminal;
Step S5: using security code as code key, security code is encrypted using symmetric encipherment algorithm, the result that will be obtained It is denoted as retrieval security code;
Step S6: it is equal to the note of retrieval security code in retrieval security code information table with the presence or absence of record attribute " security code " Record, if it does not exist, then returning to query result is invalid information into mobile intelligent terminal, and fake certification process terminates;If depositing Executing step S7;
Step S7: whether the record attribute " security code state " for judging search result record is " sale ", if so, executing step Rapid S8, if it is not, executing step S9;
Step S8: being updated the record in security code information table, and record attribute " security code state " is changed to Record attribute " date-time " is changed to current date-time by " selling ", is made with the unique identifying number of mobile intelligent terminal For code key, security code is encrypted using symmetric encipherment algorithm, by encrypted ciphertext update to record attribute, " root grade is all In person ", and return query result be certified products information into mobile intelligent terminal;
Step S9: using the unique identifying number of mobile intelligent terminal as code key, using symmetric encipherment algorithm to security code into Row encryption, is denoted as owner's ciphertext for encrypted ciphertext;
Step S10: whether the record attribute " security code state " for judging search result record is " selling ", if so, holding Row step S11, if it is not, thening follow the steps S12;
Step S11: judging whether the value of record attribute " the root grade owner " is equal to the value of owner's ciphertext, if differed, Then returning to query result is to have no right the information of verifying to mobile intelligent terminal, and fake certification process terminates;If equal, return Query result is the information of certified products to mobile intelligent terminal;Fake certification process terminates;
Step S12: judge search result record record attribute " security code state " whether be " in gifting ", if so, S13 is thened follow the steps, it is no to then follow the steps S15;
Step S13: judge record attribute " the root grade owner " value or record attribute " the leaf grade owner " value whether etc. In the value of owner's ciphertext, if equal, return query result be product gift in information to mobile intelligent terminal: execution Step S14;
Step S14: whether consumer's selection " is provided by mobile intelligent terminal and is gifted authorization code ", if so, executing step Rapid S22, if it is not, then terminating this fake certification process;
Step S15: whether the record attribute " security code state " for judging search result record is " gifting ", if it is, Step S16 is executed, otherwise returns to information that query result is Product Status exception to mobile intelligent terminal, fake certification process knot Beam;
Step S16: judging whether the value of record attribute " the leaf grade owner " is equal to the value of owner's ciphertext, if differing, Returning to query result is to have no right the information of verifying into mobile intelligent terminal, and fake certification process terminates;If equal, step is executed Rapid S17;
Step S17: retrieving product circulation log sheet, and search condition is that record attribute " security code " is equal to anti-fake Code is as code key, the value encrypted using symmetric encipherment algorithm to security code, and record attribute " the leaf grade owner " Equal to what is encrypted using the unique identifying number of mobile intelligent terminal as code key, using symmetric encipherment algorithm to security code Value, two search conditions be with relationship;
Step S18: judging whether there is search result, and if it does not exist, then returning to query result is that product circulation log is different To mobile intelligent terminal, fake certification process terminates normal information;Search result if it exists thens follow the steps S19;
Step S19: using the unique identifying number of mobile intelligent terminal as key, to record attribute " the parent institute retrieved The person of having " is decrypted, and parent mobile intelligent terminal unique identification number is obtained, with parent mobile intelligent terminal unique identification number As code key, security code is encrypted using symmetric encipherment algorithm, obtained result is denoted as the retrieval root grade owner;
Step S20: retrieval security code information table, search condition is equal to for the value of record attribute " security code " to be made with security code For code key, the value encrypted using symmetric encipherment algorithm to security code, and record attribute " the root grade owner " is equal to Retrieve the value of the root grade owner;If it exists, then returning to query result is the information of certified products into mobile intelligent terminal, fake certification Process terminates;If it does not exist, S21 is thened follow the steps;
Step S21: to product circulation log sheet retrieve, search condition be record attribute " security code " value be equal to Security code is as code key, the value encrypted using symmetric encipherment algorithm to security code, and " leaf grade is all for record attribute The value of person " be equal to using parent mobile intelligent terminal unique identification number as code key, using symmetric encipherment algorithm to security code into The value that row encryption obtains, jumps back to step S18;
Step S22: consumer gifts authorization code information into anti-counterfeiting system by reading in mobile intelligent terminal, this is gifted Authorization code information includes to prevent pseudo-code as code key, using symmetric encipherment algorithm to giver mobile intelligent terminal unique identification Number value encrypted;And using current security code as code key, authorization code information of gifting is decrypted;Can judgement decrypt acquisition Giver mobile intelligent terminal unique identification number, if cannot, returning to query result is that the gift in vain information of authorization code arrives Mobile intelligent terminal, fake certification process terminate;If can, then follow the steps S23;
Step S23: using obtained giver's mobile intelligent terminal unique identification as code key, using symmetric encipherment algorithm Encrypted ciphertext is carried out to security code and is given to owner's ciphertext;And judge whether leaf owner value is NULL value, if not For NULL value, S24 is thened follow the steps, it is no to then follow the steps S27;
Step S24: judging whether the value of record attribute " the leaf grade owner " is equal to the value of owner's ciphertext, if differing, Information that query result is giver's Information abnormity is returned to mobile intelligent terminal, fake certification process terminates;If equal, execute Step S25;
Step S25: updating security code information table, is to gift by security code Status Change, with current mobile intelligent terminal Unique identifying number encrypts security code as code key, using symmetric encipherment algorithm, by encrypted ciphertext more genus new to China Property " the leaf grade owner ";
Step S26: upgrading products circulation log sheet database, using security code as code key, using symmetric encipherment algorithm pair Security code is encrypted, and assigns obtained result to security code;Using the unique identifying number of mobile intelligent terminal as code key, use Symmetric encipherment algorithm encrypts security code, assigns encrypted ciphertext to the leaf grade owner;Only with mobile intelligent terminal One identification number encrypts security code as code key, using symmetric encipherment algorithm, and encrypted ciphertext imparting leaf grade is owned Person;Using security code as code key, giver mobile intelligent terminal unique identification number is encrypted using symmetric encipherment algorithm Assign encrypted ciphertext to the parent owner;And returning to query result is success of gifting, the information of certified products is whole to intelligent movable End, fake certification process terminate;
Step S27: judging whether the value of record attribute " the root grade owner " is equal to the value of owner's ciphertext, if differing, Information that query result is giver's Information abnormity is returned to mobile intelligent terminal, fake certification process terminates;If equal, into Enter to execute step S25.
As a preferred embodiment, the symmetric encipherment algorithm be DES algorithm, 3DES algorithm, TDEA algorithm, Blowfish algorithm, one or more of RC5 algorithm, IDEA algorithm, aes algorithm.
As a preferred embodiment, the value of the anti-counterfeiting system not explicit storage security code;Not explicit storage root The value of the grade owner, the leaf grade owner, the parent owner.
As a preferred embodiment, the antifalsification label is one-dimension code label, coating one-dimension code label, two dimensional code mark One or more combinations of label, coating two-dimension code label, RFID label tag, NFC label.
Embodiment 2
A kind of anti-counterfeiting system is present embodiments provided, the system includes information database, the information database In include that security code information table and product circulate log sheet, security code information table includes that record attribute has product number, anti-fake Code, security code state, the root grade owner, the leaf grade owner and date-time, the security code state include sale, sell Out, in gifting, four kinds of states of gifting;Product circulation log sheet includes that record attribute has security code, the leaf grade owner, parent all Person, date-time.
The data structure in security code information table data library is as shown in the table
Product circulation log sheet database data structure is as shown in the table
Wherein, AES (x, y) indicates to encrypt y using symmetric encipherment algorithm using x as code key.
As a preferred embodiment, the pseudo-code information table is using security code as key, using symmetric encipherment algorithm Itself is encrypted, encrypted ciphertext is stored in record attribute " security code ";Product warehouse-out associated by security code into When marketing is sold, the state of security code is changed to " sell ";When product is checked the true and false after selling for the first time, change security code state is " selling ", the root grade owner of the examination person as the product;The product owner produces in systems gift authorization code after, prevent The Status Change of pseudo-code is " in gifting ";After acceptor receives the process of gifting, the Status Change of security code is " gifting ";It is anti-fake After product associated by code is sold, when carrying out authenticity of products verifying for the first time, with the uniqueness mark of the mobile intelligent terminal of the verifier Knowledge number is key, is encrypted using symmetric encipherment algorithm to security code, the ciphertext encrypted is stored in record attribute " root grade In the owner ";The date-time of fake certification is stored into date-time attribute.After product is gifted, with acceptor The unique identification number of mobile intelligent terminal is key, is encrypted, is encrypted to security code using symmetric encipherment algorithm Ciphertext is stored in record attribute " the leaf grade owner ", and when behavior occurs repeatedly to gift for product, leaf grade owner storage is final Acceptor mobile intelligent terminal unique identification number be key cipher-text information.
As a preferred embodiment, in the product circulation log sheet, when product gifts behavior, to prevent Pseudo-code is key, is encrypted using symmetric encipherment algorithm to itself, and encrypted ciphertext is stored in " security code " attribute;It produces The mobile intelligent terminal unique identification number of product giver is key, is encrypted using symmetric encipherment algorithm to security code, close Text is stored in " the parent owner " attribute;The mobile intelligent terminal unique identification number of product acceptor be key, using pair Encryption Algorithm is claimed to encrypt security code, ciphertext is stored in " the leaf grade owner " attribute;Acceptor completes process of gifting Date-time storage is into " date-time " attribute.
As a preferred embodiment, includes security code block in alliance's block chain and check area for the first time Block, the security code block is for storing security code;The block of examination for the first time is used to store the anti-of true and false examination for the first time Pseudo-code and examination person's information.
As a preferred embodiment, the system periodically verifies security code, the specific steps are as follows:
The data read request of " security code data block " is issued to alliance's block chain, alliance's block chain returns to anti-counterfeiting system The unique security code of N number of value that batch is generated and is written, before last checkout action in return value verification anti-counterfeiting system Whether the quantity of the anti-fake code of tracing to the source of creation is consistent, whether value is consistent;
The read requests of the data of " security code for the first time examination person's data block " are issued to alliance's chain block chain, alliance's chain returns The antiforge system that goes back on defense has carried out the security code and its examination person's information of true and false examination for the first time, in return value verification anti-counterfeiting system The security code of progress before checkout action true and false examination for the first time and its whether the quantity of examination person consistent, value whether one It causes;
If inconsistent, anti-counterfeiting system issues the inconsistent alarm of data and relevant inconsistent information record, while utilizing connection Data on alliance's block chain in the synchronous anti-counterfeiting system of data, the restoration and reconstruction after carrying out exception;
If consistent, the change of the kainogenesis since last checkout action has been written into alliance's block chain for anti-counterfeiting system Data:
1) alliance's block chain is written in the form of " security code data block " in newly-increased security code;
2) the newly generated security code for having carried out the examination of the true and false for the first time and its examination person are with " security code examination person's data for the first time Alliance's chain is written in the form of block ".
The same or similar label correspond to the same or similar components;
The terms describing the positional relationship in the drawings are only for illustration, should not be understood as the limitation to this patent;
Obviously, the above embodiment of the present invention be only to clearly illustrate example of the present invention, and not be pair The restriction of embodiments of the present invention.For those of ordinary skill in the art, may be used also on the basis of the above description To make other variations or changes in different ways.There is no necessity and possibility to exhaust all the enbodiments.It is all this Made any modifications, equivalent replacements, and improvements etc., should be included in the claims in the present invention within the spirit and principle of invention Protection scope within.

Claims (9)

1. a kind of method for anti-counterfeit, which comprises the following steps:
Step S1: building anti-counterfeiting system, the system includes information database, includes security code in the information database Information table and product circulation log sheet, the record attribute of security code information table include product number, security code, security code shape State, the root grade owner, the leaf grade owner and date-time, the security code state include in selling, sell, gifting, give With four kinds of states;When the record attribute of product circulation log sheet includes security code, the leaf grade owner, the parent owner, date Between;The root grade owner, the leaf grade owner initial value be all 0;
Step S2: creation security code, security code information table generates N number of unique security code of value, and alliance is written in N number of security code In block chain;
Step S3: the security code of generation is subjected to physical interconnection with product in the form of antifalsification label, and will be in security code information table Security code establish corresponding logic association with product;
Step S4: after product is sold, when carrying out authenticity of products verifying, consumer reads antifalsification label by mobile intelligent terminal In security code, be sent to anti-counterfeiting system together with the unique identifying number of the mobile intelligent terminal;
Step S5: using security code as code key, security code is encrypted using symmetric encipherment algorithm, obtained result is denoted as Retrieve security code;
Step S6: being equal to the record of retrieval security code with the presence or absence of record attribute " security code " in retrieval security code information table, if It is not present, then returning to query result is invalid information into mobile intelligent terminal, and fake certification process terminates;If it exists, it holds Row step S7;
Step S7: whether the record attribute " security code state " for judging search result record is " sale ", if so, executing step S8, if it is not, executing step S9;
Step S8: being updated the record in security code information table, and record attribute " security code state " is changed to " sell Out ", record attribute " date-time " is changed to current date-time, using the unique identifying number of mobile intelligent terminal as secret Key encrypts security code using symmetric encipherment algorithm, and encrypted ciphertext is updated to record attribute " the root grade owner " In, and return query result be certified products information into mobile intelligent terminal;
Step S9: using the unique identifying number of mobile intelligent terminal as code key, security code is added using symmetric encipherment algorithm It is close, encrypted ciphertext is denoted as owner's ciphertext;
Step S10: whether the record attribute " security code state " for judging search result record is " selling ", if so, executing step Rapid S11, if it is not, thening follow the steps S12;
Step S11: judge whether the value of record attribute " the root grade owner " is equal to the value of owner's ciphertext and returns if differed Returning query result is to have no right the information of verifying to mobile intelligent terminal, and fake certification process terminates;If equal, inquiry is returned It as a result is the information of certified products to mobile intelligent terminal;Fake certification process terminates;
Step S12: judge search result record record attribute " security code state " whether be " in gifting ", if it is, holding Row step S13, it is no to then follow the steps S15;
Step S13: whether the value of the value or record attribute " the leaf grade owner " that judge record attribute " the root grade owner " is equal to institute The value of the person's of having ciphertext, if equal, returning to query result is information during product is gifted to mobile intelligent terminal: execution step S14;
Step S14: whether consumer's selection " is provided by mobile intelligent terminal and is gifted authorization code ", if so, thening follow the steps S22, if it is not, then terminating this fake certification process;
Step S15: whether the record attribute " security code state " for judging search result record is " gifting ", if it is, executing Otherwise step S16 returns to information that query result is Product Status exception to mobile intelligent terminal, fake certification process terminates;
Step S16: judge whether the value of record attribute " the leaf grade owner " is equal to the value of owner's ciphertext and returns if differing Query result is to have no right the information of verifying into mobile intelligent terminal, and fake certification process terminates;If equal, then follow the steps S17;
Step S17: retrieving product circulation log sheet, and search condition is equal to for record attribute " security code " to be made with security code For code key, the value encrypted using symmetric encipherment algorithm to security code, and record attribute " the leaf grade owner " is equal to Using the unique identifying number of mobile intelligent terminal as code key, the value encrypted using symmetric encipherment algorithm to security code, Two search conditions be with relationship;
Step S18: judging whether there is search result, and if it does not exist, then returning to query result is that product circulation log is abnormal To mobile intelligent terminal, fake certification process terminates information;Search result if it exists thens follow the steps S19;
Step S19: using the unique identifying number of mobile intelligent terminal as key, to the record attribute " the parent owner " retrieved Be decrypted, obtain parent mobile intelligent terminal unique identification number, using parent mobile intelligent terminal unique identification as Code key encrypts security code using symmetric encipherment algorithm, and obtained result is denoted as the retrieval root grade owner;
Step S20: retrieval security code information table, search condition are that the value of record attribute " security code " is equal to using security code as secret Key, the value that security code is encrypted using symmetric encipherment algorithm, and record attribute " the root grade owner " is equal to retrieval The value of the root grade owner;If it exists, then returning to query result is the information of certified products into mobile intelligent terminal, fake certification process Terminate;If it does not exist, S21 is thened follow the steps;
Step S21: retrieving product circulation log sheet, and search condition is that the value of record attribute " security code " is equal to anti-fake Code is as code key, the value encrypted using symmetric encipherment algorithm to security code, and record attribute " the leaf grade owner " Value be equal to security code is added as code key, using symmetric encipherment algorithm using parent mobile intelligent terminal unique identification number Close obtained value, jumps back to step S18;
Step S22: consumer gifts authorization code information into anti-counterfeiting system by reading in mobile intelligent terminal, the authorization of gifting Code information includes to prevent pseudo-code as code key, using symmetric encipherment algorithm to giver's mobile intelligent terminal unique identification number into The value that row encryption obtains;And using current security code as code key, authorization code information of gifting is decrypted;Can judgement, which decrypt, is gifted Person mobile intelligent terminal unique identification number, if cannot, return query result be gift in vain authorization code information to movement Intelligent terminal, fake certification process terminate;If can, then follow the steps S23;
Step S23: using obtained giver's mobile intelligent terminal unique identification as code key, using symmetric encipherment algorithm to anti- Pseudo-code carries out encrypted ciphertext and is given to owner's ciphertext;And judge whether leaf owner value is NULL value, if not being NULL value thens follow the steps S24, no to then follow the steps S27;
Step S24: judge whether the value of record attribute " the leaf grade owner " is equal to the value of owner's ciphertext and returns if differing Query result is the information of giver's Information abnormity to mobile intelligent terminal, and fake certification process terminates;If equal, step is executed S25;
Step S25: updating security code information table, is to gift by security code Status Change, with the unique of current mobile intelligent terminal Identification number encrypts security code as code key, using symmetric encipherment algorithm, and encrypted ciphertext is updated record attribute " leaf The grade owner ";
Step S26: upgrading products circulation log sheet database, using security code as code key, using symmetric encipherment algorithm to anti-fake Code is encrypted, and assigns obtained result to security code;Using the unique identifying number of mobile intelligent terminal as code key, using symmetrical Encryption Algorithm encrypts security code, assigns encrypted ciphertext to the leaf grade owner;With unique mark of mobile intelligent terminal Knowledge number is used as code key, is encrypted using symmetric encipherment algorithm to security code, assigns encrypted ciphertext to the leaf grade owner;With For security code as code key, carrying out encryption to giver's mobile intelligent terminal unique identification number using symmetric encipherment algorithm will encryption Ciphertext afterwards assigns the parent owner;And returning to query result is success of gifting, the information of certified products is anti-fake to mobile intelligent terminal Verification process terminates;
Step S27: judge whether the value of record attribute " the root grade owner " is equal to the value of owner's ciphertext and returns if differing Query result is the information of giver's Information abnormity to mobile intelligent terminal, and fake certification process terminates;If equal, into holding Row step S25.
2. a kind of method for anti-counterfeit according to claim 1, which is characterized in that the symmetric encipherment algorithm be DES algorithm, 3DES algorithm, TDEA algorithm, Blowfish algorithm, one or more of RC5 algorithm, IDEA algorithm, aes algorithm.
3. a kind of method for anti-counterfeit according to claim 1, which is characterized in that explicit storage is not anti-fake for the anti-counterfeiting system The value of code;The not value of the explicit storage root grade owner, the leaf grade owner, the parent owner.
4. a kind of method for anti-counterfeit according to claim 1, which is characterized in that the antifalsification label is one-dimension code label, applies One or more combinations of layer one-dimension code label, two-dimension code label, coating two-dimension code label, RFID label tag, NFC label.
5. a kind of anti-counterfeiting system, the system is based on the described in any item methods of the claims 1~4, which is characterized in that The system includes information database, includes security code information table and product circulation log in the information database Table, security code information table include that record attribute has product number, security code, security code state, the root grade owner, the leaf grade owner And date-time, the security code state include sell, sell, gifting in, four kinds of states of gifting;Product circulation log sheet There are security code, the leaf grade owner, the parent owner, date-time comprising record attribute.
6. a kind of anti-counterfeiting system according to claim 5, which is characterized in that the pseudo-code information table is close with security code Key encrypts itself using symmetric encipherment algorithm, and encrypted ciphertext is stored in record attribute " security code ";Security code When associated product warehouse-out is sold, the state of security code is changed to " sell ";Product is checked the true and false after selling for the first time When, change security code state is " selling ", the root grade owner of the examination person as the product;The product owner produces in systems It has given birth to after gifting authorization code, the Status Change of security code is " in gifting ";After acceptor receives the process of gifting, the shape of security code State is changed to " gifting ";After product associated by security code is sold, when carrying out authenticity of products verifying for the first time, with the movement of the verifier The unique identification number of intelligent terminal is key, is encrypted using symmetric encipherment algorithm to security code, the ciphertext encrypted It is stored in record attribute " the root grade owner ";The date-time of fake certification is stored into date-time attribute.When product into It has gone after gifting, the unique identification number with acceptor's mobile intelligent terminal is key, using symmetric encipherment algorithm to security code It being encrypted, the ciphertext encrypted is stored in record attribute " the leaf grade owner ", when behavior occurs repeatedly to gift for product, The unique identification number that the leaf grade owner stores the mobile intelligent terminal of final acceptor is the cipher-text information of key.
7. a kind of anti-counterfeiting system according to claim 5, which is characterized in that in the product circulation log sheet, work as production Product gift behavior when, using security code as key, itself is encrypted using symmetric encipherment algorithm, encrypted ciphertext is deposited Storage is in " security code " attribute;The mobile intelligent terminal unique identification number of product giver is key, is calculated using symmetric cryptography Method encrypts security code, and ciphertext is stored in " the parent owner " attribute;The mobile intelligent terminal of product acceptor is unique Property identification number be key, security code is encrypted using symmetric encipherment algorithm, ciphertext is stored in " the leaf grade owner " attribute; Acceptor complete to gift process date-time storage in " date-time " attribute.
8. a kind of anti-counterfeiting system according to claim 5, which is characterized in that include anti-fake in alliance's block chain Code and checks block at block for the first time, and the security code block is for storing security code;The block of examination for the first time is used for The security code and examination person's information of storage true and false examination for the first time.
9. a kind of anti-counterfeiting system according to claim 8, which is characterized in that the system periodically carries out security code Verification, the specific steps are as follows:
The data read request of " security code data block " is issued to alliance's block chain, alliance's block chain returns to anti-counterfeiting system batch The unique security code of N number of value for generating and being written utilizes creation before last checkout action in return value verification anti-counterfeiting system Anti-fake code of tracing to the source whether quantity consistent, whether value consistent;
The read requests of the data of " security code for the first time examination person's data block " are issued to alliance's chain block chain, alliance's chain returns anti- Antiforge system has carried out the security code and its examination person's information of true and false examination for the first time, utilizes the last time in return value verification anti-counterfeiting system The security code of progress before checkout action true and false examination for the first time and its whether the quantity of examination person consistent, whether value is consistent;
If inconsistent, anti-counterfeiting system issues the inconsistent alarm of data and relevant inconsistent information record, while utilizing area, alliance Data on block chain in the synchronous anti-counterfeiting system of data, the restoration and reconstruction after carrying out exception;
If consistent, the number of the change of the kainogenesis since last checkout action has been written into alliance's block chain for anti-counterfeiting system According to:
1) alliance's block chain is written in the form of " security code data block " in newly-increased security code;
2) the newly generated security code for having carried out the examination of the true and false for the first time and its examination person are with " security code examination person data field for the first time Alliance's chain is written in the form of block ".
CN201910533762.0A 2019-06-19 2019-06-19 Anti-counterfeiting method and system Active CN110310130B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910533762.0A CN110310130B (en) 2019-06-19 2019-06-19 Anti-counterfeiting method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910533762.0A CN110310130B (en) 2019-06-19 2019-06-19 Anti-counterfeiting method and system

Publications (2)

Publication Number Publication Date
CN110310130A true CN110310130A (en) 2019-10-08
CN110310130B CN110310130B (en) 2022-12-06

Family

ID=68076822

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910533762.0A Active CN110310130B (en) 2019-06-19 2019-06-19 Anti-counterfeiting method and system

Country Status (1)

Country Link
CN (1) CN110310130B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110866761A (en) * 2019-11-07 2020-03-06 四川农链数科科技有限公司 Anti-counterfeiting mark and tracing method and system for decentralized article
CN111143466A (en) * 2019-11-12 2020-05-12 成都四方伟业软件股份有限公司 Data anti-counterfeiting method based on block chain
CN111784361A (en) * 2020-04-02 2020-10-16 北京京东尚科信息技术有限公司 Product tracing method, device, system and storage medium
CN114285662A (en) * 2021-12-28 2022-04-05 北京天融信网络安全技术有限公司 Authentication method, device, equipment and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104463606A (en) * 2014-12-25 2015-03-25 张世龙 Anti-fake tracing method and system based on mobile intelligent terminal
WO2016145705A1 (en) * 2015-03-13 2016-09-22 杭州沃朴物联科技有限公司 Time-based encrypted nfc cell phone terminal anti-counterfeit system and method
US20170017967A1 (en) * 2015-07-17 2017-01-19 Lui Kam Ming Electronic anti-counterfeiting system and electronic anti-counterfeiting method thereof

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104463606A (en) * 2014-12-25 2015-03-25 张世龙 Anti-fake tracing method and system based on mobile intelligent terminal
WO2016145705A1 (en) * 2015-03-13 2016-09-22 杭州沃朴物联科技有限公司 Time-based encrypted nfc cell phone terminal anti-counterfeit system and method
US20170017967A1 (en) * 2015-07-17 2017-01-19 Lui Kam Ming Electronic anti-counterfeiting system and electronic anti-counterfeiting method thereof

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110866761A (en) * 2019-11-07 2020-03-06 四川农链数科科技有限公司 Anti-counterfeiting mark and tracing method and system for decentralized article
CN111143466A (en) * 2019-11-12 2020-05-12 成都四方伟业软件股份有限公司 Data anti-counterfeiting method based on block chain
CN111143466B (en) * 2019-11-12 2022-06-24 成都四方伟业软件股份有限公司 Data anti-counterfeiting method based on block chain
CN111784361A (en) * 2020-04-02 2020-10-16 北京京东尚科信息技术有限公司 Product tracing method, device, system and storage medium
CN111784361B (en) * 2020-04-02 2024-05-24 北京京东尚科信息技术有限公司 Product tracing method, device, system and storage medium
CN114285662A (en) * 2021-12-28 2022-04-05 北京天融信网络安全技术有限公司 Authentication method, device, equipment and storage medium
CN114285662B (en) * 2021-12-28 2023-11-10 北京天融信网络安全技术有限公司 Authentication method, authentication device, authentication equipment and storage medium

Also Published As

Publication number Publication date
CN110310130B (en) 2022-12-06

Similar Documents

Publication Publication Date Title
US20230334480A1 (en) Decentralized title transfer and validation of assets
CN104463606B (en) A kind of false proof source tracing method and system based on mobile intelligent terminal
CN110310130A (en) A kind of method for anti-counterfeit and system
EP2002382B1 (en) Method and device for obtaining item information using rfid tags
Choi et al. RFID tag data processing in manufacturing for track-and-trace anti-counterfeiting
CN107292629A (en) Anti-counterfeit tracking verification method based on block chain and the device using this method
CN102831529B (en) A kind of commodity information identification method based on radio frequency and system
US8421593B2 (en) Apparatus, systems and methods for authentication of objects having multiple components
CN108389059A (en) Digital copyrighted work protection, transaction and distributing method based on ownership and system
Kwok et al. Design and development of a mobile EPC-RFID-based self-validation system (MESS) for product authentication
CN102779284B (en) RFID (radio frequency identification device) label integrating comprehensive functions such as merchandise anti-counterfeiting, logistics control and the like
CN109598540A (en) A kind of advertisement accurately method for pushing and advertisement accurately supplying system
CN104217241A (en) Electronic anti-fake label and realizing method
CN109146024A (en) Art work Anti-fake electronic label System and method for based on block chain
CN101009014A (en) Secure anti-counterfeiting method and system thereof
CN104854642A (en) Method and apparatus for marking manufactured items using physical characteristic
WO2007107068A1 (en) Anti-forgery method and apparatus based on cpk electronic label
US20110211727A1 (en) Authentication of "SOURCE" for brands
CN101388086A (en) Digital coding method for products anti-counterfeiting physical distribution monitoring system
JP2012533807A (en) Product distribution management method via the Internet
CN102622624B (en) A kind of commodity counterfeit prevention identification system and method
CN108960827A (en) A kind of computer system executing the application of block chain
CN100492968C (en) Anti-fake technology based on dynamic cipher
CN106228379A (en) False proof device, system and method
CN110533430A (en) A kind of antifake method for products and system and electronic device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant