CN104850999B - Commodity authenticity identification method and system based on cloud technology and hundred million-level encrypted two-dimensional code - Google Patents

Commodity authenticity identification method and system based on cloud technology and hundred million-level encrypted two-dimensional code Download PDF

Info

Publication number
CN104850999B
CN104850999B CN201510188774.6A CN201510188774A CN104850999B CN 104850999 B CN104850999 B CN 104850999B CN 201510188774 A CN201510188774 A CN 201510188774A CN 104850999 B CN104850999 B CN 104850999B
Authority
CN
China
Prior art keywords
commodity
code
encrypted
cloud computing
dimensional code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510188774.6A
Other languages
Chinese (zh)
Other versions
CN104850999A (en
Inventor
孙瑞志
邓超
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
NANJING DASHU INTELLIGENT SCIENCE AND TECHNOLOGY Co.,Ltd.
Original Assignee
China Agricultural University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Agricultural University filed Critical China Agricultural University
Priority to CN201510188774.6A priority Critical patent/CN104850999B/en
Publication of CN104850999A publication Critical patent/CN104850999A/en
Application granted granted Critical
Publication of CN104850999B publication Critical patent/CN104850999B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention relates to a commodity authenticity identification method and a commodity authenticity identification system based on a cloud technology and a hundred million-level encrypted two-dimensional code, wherein a cloud technology architecture in which a cloud computing platform and a cloud computing terminal are mutually cooperated is adopted, and the cloud computing platform is responsible for coding, compressing, encrypting, generating, activating, assigning and managing the hundred million-level encrypted two-dimensional code and provides commodity authenticity identification service for consumers; the cloud computing terminal is responsible for endowing the commodity with the encrypted two-dimensional code identification, and the system ensures the operation efficiency, reliability, flexibility and robustness by utilizing the strong computing capability and performance of the cloud technology and a convenient automatic centralized management mode.

Description

Commodity authenticity identification method and system based on cloud technology and hundred million-level encrypted two-dimensional code
Technical Field
The invention relates to the technical field of information processing, in particular to a commodity authenticity identification method and system based on a cloud technology and a hundred million-level encrypted two-dimensional code.
Background
At present, relevant laws and regulations and administrative enforcement on fighting against counterfeit commodities are continuously strengthened in China, but the phenomenon of counterfeit commodities, such as tobacco, wine, beverages, milk powder, edible oil and other food and fast consumer goods, still commonly exists in domestic markets, and the benefits of consumers are infringed. Many enterprises influence brand promotion because of the failure of realizing rapid authentication of goods, and the core benefits of the enterprises are lost. Therefore, many enterprises develop a plurality of methods for identifying authenticity aiming at own products, for example, an anti-counterfeit label is added on a product package, but the method has higher cost and is not beneficial to industrialized mass production, and the anti-counterfeit label is likely to be imitated at the same time.
At present, the method for anti-counterfeiting commodities by using two-dimension code identification has the advantages of large information load capacity, low cost, easy popularization and the like, but the batch printing production of the two-dimension codes is easy to generate repeated codes and wrong codes, and the possibility of imitation, copying, cracking, guessing or repeated recycling and embezzlement still exists, so that how to design an effective anti-counterfeiting identification method can ensure that consumers can quickly and conveniently realize the authenticity identification of commodities and enterprises can ensure that enterprises can apply the method to industrialized automatic batch large-scale production to become urgent needs.
Disclosure of Invention
The invention aims to provide a method or a system for quickly and conveniently identifying the authenticity of a commodity and ensure that the method or the system can be applied to industrialized automatic mass production.
In order to solve the technical problem, the invention discloses a commodity authenticity identification method based on a cloud technology and a hundred million-level encrypted two-dimensional code, which comprises the following steps:
s1, the cloud computing platform encodes the commodity to obtain a commodity code; encrypting the commodity code to generate a hundred million-level encrypted two-dimensional code, and establishing a one-to-one correspondence relationship between the commodity code and the encrypted two-dimensional code;
s2, the cloud computing terminal obtains the encrypted two-dimensional code and identifies the commodity by using the encrypted two-dimensional code;
s3, the code correcting terminal scans the encrypted two-dimensional codes of the marked commodities one by one, removes repeated and wrong encrypted two-dimensional codes and obtains the encrypted two-dimensional codes of the commodities which are actually used;
s4, the cloud computing terminal sends the encrypted two-dimensional code of the commodity which is actually used to the cloud computing platform;
s5, the cloud computing platform establishes a commodity code information database according to the received encrypted two-dimensional code of the commodity actually used and the corresponding relation, and activates and manages the encrypted two-dimensional code of the commodity actually used;
s6, when the user identifies the authenticity, the code scanning terminal is used for scanning the encrypted two-dimensional code of the commodity, scanning information is uploaded, a commodity authenticity identification service request is automatically sent to the cloud computing platform, the cloud computing platform analyzes and judges by using the commodity coding information database, an identification result is obtained, and the identification result is fed back to the user.
Preferably, in step S1, before encrypting the commodity code, the commodity code is compressed first.
Preferably, in step S5, the cloud computing platform updates the information of the product code information database according to the received encrypted two-dimensional code of the actually used product and the correspondence, and then activates and manages the encrypted two-dimensional code.
Preferably, the step S6 specifically includes:
s61, the user scans the commodity by using the code scanning terminal, analyzes the obtained encrypted two-dimensional code to obtain the commodity code, and then automatically sends the commodity code and the authenticity identification service request to the cloud computing platform;
s62, the cloud computing platform receives the commodity code and judges whether the commodity code exists in the commodity code information database, if not, an identification result of a counterfeit is sent to a user, otherwise, the step S63 is executed;
and S63, the cloud computing platform judges whether the request of the authenticity identification service of the commodity code is the first time, if so, the identification result of the genuine product is sent to the user, and if not, the identification result of the counterfeit product is sent to the user.
Preferably, in step S1, an RSA asymmetric encryption algorithm is used for encryption, where a public key and a private key pair are randomly generated and used for encrypting and decrypting the two-dimensional code to implement identity authentication.
Preferably, a vpn (virtual private network) encryption communication tunnel is adopted for communication between the cloud computing platform and the cloud computing terminal, a network communication protocol of the vpn encryption communication tunnel is IPSec, and an encryption method of the vpn encryption communication tunnel is an HMAC-MD5 algorithm of a hash function.
Preferably, the two-dimensional code adopts a hundred million-level two-dimensional code technology, and the hundred million-level encrypted two-dimensional code generated by the hundred million-level two-dimensional code technology has uniqueness and accuracy.
Preferably, the commodity code includes a service network address, a commodity type, a specification, a model, a batch, a price, a manufacturer, a production place, a production date, a quality detection result, and a commodity introduction.
A commodity authenticity identification system based on cloud technology and hundred million-level encrypted two-dimensional codes comprises:
the system comprises a cloud computing terminal, a cloud computing platform, a code correcting terminal and a code scanning terminal;
the cloud computing platform encodes the commodity to obtain a commodity code; encrypting the commodity code to generate a hundred million-level encrypted two-dimensional code, and establishing a one-to-one correspondence relationship between the commodity code and the encrypted two-dimensional code;
the cloud computing terminal acquires the encrypted two-dimensional code and identifies the commodity by using the encrypted two-dimensional code;
the code correcting terminal scans the encrypted two-dimensional codes of the identified commodities one by one, removes repeated and wrong encrypted two-dimensional codes and obtains the encrypted two-dimensional codes of the commodities which are actually used; the cloud computing terminal sends the encrypted two-dimensional code of the actually used commodity to the cloud computing platform, and the cloud computing platform establishes a commodity coding information database according to the received encrypted two-dimensional code of the actually used commodity and the corresponding relation, and activates and manages the encrypted two-dimensional code of the actually used commodity;
the code scanning terminal scans the encrypted two-dimensional code of the commodity, analyzes the obtained encrypted two-dimensional code to obtain the commodity code, then automatically sends the commodity code and the authenticity identification service request to the cloud computing platform, and the cloud computing platform analyzes and judges by using the commodity code information database to obtain an identification result and feeds the identification result back to the user.
Preferably, the cloud computing platform includes an identification unit, which receives the commodity code uploaded by the code scanning terminal, and determines whether the commodity code exists in the commodity code information database, if not, sends an identification result of a counterfeit product to the user, otherwise, determines whether the request of the authenticity identification service of the commodity code is the first time, if so, sends an identification result of a genuine product to the user, otherwise, sends an identification result of a counterfeit product to the user.
The technical scheme of the invention has the following advantages: the cloud computing platform is in charge of encoding, compressing, encrypting, generating, activating, assigning and managing the hundred million-level encrypted two-dimensional codes, and provides a commodity authenticity identification service for consumers; the cloud computing terminal is responsible for giving a commodity encrypted two-dimensional code identification (identity); by utilizing the powerful computing capability and performance of the cloud technology and a convenient automatic centralized management mode, the operation efficiency, reliability, flexibility and robustness of the system are ensured;
the uniqueness and reliability of the encrypted two-dimensional code of the commodity are ensured by adopting a hundred million-level encrypted two-dimensional code technology, and the industrial automatic batch production is facilitated; the verification work flow of scanning the encrypted two-dimensional codes one by one is adopted, so that the accuracy and the effectiveness of the activated commodity two-dimensional codes are ensured, and repeated codes and wrong codes are eliminated; the security and the confidentiality of a system communication channel are ensured by adopting IPSec communication and HMAC-MD5 algorithm encryption technology of a hash function; the method adopts an RSA asymmetric encryption technology, wherein public and private key pairs are generated by a system randomly and are used for encrypting and decrypting the coded information of the commodity encrypted two-dimensional code and realizing identity authentication, so that the safety, confidentiality and reliability of the encrypted two-dimensional code are ensured, and the problems of cracking, guessing or counterfeiting the commodity two-dimensional code are technically solved; the problem that the two-dimension code of the commodity is copied or recycled and stolen is solved by combining the limitation on the scanning times of the encrypted two-dimension code. The method and the system are widely applicable to various fast consumer product industries and enterprises, can not only enable consumers to quickly and conveniently realize the authenticity identification of commodities, but also can be applied to industrialized automatic mass production, and have low cost and strong operability.
Drawings
Fig. 1 is a flowchart of a method for authenticating goods based on cloud technology and hundred million-level encrypted two-dimensional codes according to a preferred embodiment of the present invention;
fig. 2 is a flowchart of a method for authenticating authenticity of a commodity based on cloud technology and a hundred million-level encrypted two-dimensional code according to a second preferred embodiment of the present invention;
fig. 3 is a schematic diagram illustrating a commodity encoding process in a commodity authentication method based on cloud technology and hundred million-level encrypted two-dimensional codes according to a second preferred embodiment of the present invention;
fig. 4 is a schematic structural diagram of a third preferred embodiment of the present invention, showing a system for authenticating goods based on cloud technology and hundred million-level encrypted two-dimensional codes;
fig. 5 is a schematic structural diagram of a system for authenticating goods based on cloud technology and hundred million-level encrypted two-dimensional codes according to a fourth preferred embodiment of the present invention.
Detailed Description
The following detailed description of embodiments of the invention is provided in connection with the accompanying drawings and examples. The following examples are intended to illustrate the invention but are not intended to limit the scope of the invention.
The first embodiment is as follows:
fig. 1 is a flowchart of a method for identifying authenticity of a commodity based on a cloud technology and a hundred million-level encrypted two-dimensional code according to a preferred embodiment of the present invention, where the method includes the following steps:
s1, the cloud computing platform encodes the commodity to obtain a commodity code; encrypting the commodity code to generate a hundred million-level encrypted two-dimensional code, and establishing a one-to-one correspondence relationship between the commodity code and the encrypted two-dimensional code;
s2, the cloud computing terminal obtains the encrypted two-dimensional code and identifies the commodity by using the encrypted two-dimensional code;
s3, the code correcting terminal scans the encrypted two-dimensional codes of the marked commodities one by one, removes repeated and wrong encrypted two-dimensional codes and obtains the encrypted two-dimensional codes of the commodities which are actually used;
s4, the cloud computing terminal sends the encrypted two-dimensional code of the commodity which is actually used to the cloud computing platform;
s5, the cloud computing platform establishes a commodity code information database according to the received encrypted two-dimensional code of the commodity actually used and the corresponding relation, and activates and manages the encrypted two-dimensional code of the commodity actually used;
s6, when the user identifies the authenticity, the code scanning terminal is used for scanning the encrypted two-dimensional code of the commodity, scanning information is uploaded, a commodity authenticity identification service request is automatically sent to the cloud computing platform, the cloud computing platform analyzes and judges by using the commodity coding information database, an identification result is obtained, and the identification result is fed back to the user.
In step S1 of this embodiment, the encrypted two-dimensional code adopts a hundred million-level two-dimensional code technology, and the cloud computing platform can encode, compress, encrypt, generate, activate, assign and manage hundreds of millions of levels of commodities; and the step S1 and the step S6 are encrypted by using an RSA asymmetric encryption algorithm, wherein public and private key pairs are randomly generated and used for realizing system identity authentication and encrypting and decrypting the two-dimensional code encoding information of the commodity. In this embodiment, an encryption communication tunnel is used for communication between the cloud computing platform and the cloud computing terminal, a network communication protocol of the encryption communication tunnel is IPSec, and an encryption method of the encryption communication tunnel is an HMAC-MD5 algorithm using a hash function.
Further, the cloud computing platform can use a private key as an encryption key for encrypting the two-dimensional code encoding plaintext, and the code correcting terminal uses a public key as a decryption key for decrypting the encrypted two-dimensional code encoding ciphertext; the code correcting terminal takes the public key as an encryption key to encrypt the verified commodity two-dimensional code data packet, and the cloud computing platform takes the private key as a decryption key to decrypt the encrypted verified commodity two-dimensional code data packet, so that system information encryption and system identity authentication are realized.
Further, in step S1, the cloud computing platform encodes the commodity according to the user requirement, so as to obtain the commodity code; preferably, the commodity code includes a verification service network address, a commodity type, a specification, a model, a batch, a price, a manufacturer, a production location, a production date, a quality detection result, a commodity introduction and other information.
The method of the embodiment adopts a cloud computing architecture, takes a hundred million-level encrypted two-dimensional code cloud computing platform as a center, and provides a commodity authenticity identification service for consumers; and the cloud computing terminal gives a two-dimensional code identification (identity) to the commodity. The embodiment ensures the operating efficiency, reliability, flexibility and robustness of the system by utilizing the strong computing capability and performance of the cloud technology and the convenient automatic centralized management mode; the uniqueness and reliability of the encrypted two-dimensional code of the commodity are ensured by adopting a hundred million-level encrypted two-dimensional code technology, and the industrial automatic batch production is facilitated; the verification work flow of scanning the encrypted two-dimensional codes one by one is adopted, so that the accuracy and the effectiveness of the activated commodity two-dimensional codes are ensured, and repeated codes and wrong codes are eliminated; the security and the confidentiality of a system communication channel are ensured by adopting IPSec communication and HMAC-MD5 algorithm encryption technology of a hash function; the method and the system are widely applicable to various fast consumer goods industries and enterprises, can not only enable consumers to quickly and conveniently realize the authenticity identification of goods, but also can be applied to industrialized automatic mass production, and are low in cost and strong in operability.
Example two:
fig. 2 is a flowchart of a method for authenticating a product based on a cloud technology and a hundred million-level encrypted two-dimensional code according to a second preferred embodiment of the present invention, where the steps of the method of the present embodiment are different from those of the first embodiment in that:
in step S1, before the commodity code is encrypted, the commodity code is compressed first, which can effectively reduce the waste of resources and improve the utilization rate of resources.
Further, in step S5, the cloud computing platform assigns the encrypted two-dimensional code first, and then activates and manages the encrypted two-dimensional code. The value assignment means that some information such as advertisements is given to the encrypted two-dimensional code according to the requirement. Further, if the commodity code information database is already established, the cloud computing platform may update the information of the commodity code information database according to the received encrypted two-dimensional code of the actually used commodity and the corresponding relationship, and then activate and manage the encrypted two-dimensional code.
Further, the step S6 specifically includes:
s61, the user scans the commodity by using the code scanning terminal, analyzes the obtained encrypted two-dimensional code to obtain the commodity code, and then automatically sends the commodity code and the authenticity identification service request to the cloud computing platform;
s62, the cloud computing platform receives the commodity code and judges whether the commodity code exists in the commodity code information database, if not, an identification result of a counterfeit is sent to a user, otherwise, the step S63 is executed;
and S63, the cloud computing platform judges whether the request of the authenticity identification service of the commodity code is the first time, if so, the identification result of the genuine product is sent to the user, and if not, the identification result of the counterfeit product is sent to the user.
In the step, the consumer is designed to scan the encrypted two-dimensional code of the commodity only once, and when the number of the encrypted two-dimensional code is more than one, the commodity is treated as a counterfeit product no matter whether the commodity is a genuine product or a counterfeit product.
Other steps in this embodiment are the same as those in the first embodiment, and are not described again here.
In this embodiment, the encrypted two-dimensional code is generated by using a hundred million-level two-dimensional code technology, and the cloud computing platform can encode, compress, encrypt, generate, activate, assign and manage hundreds of millions of levels of commodity two-dimensional codes; the encrypted two-dimensional code adopts an RSA asymmetric encryption algorithm, wherein a public key pair and a private key pair are randomly generated by the system and are used for encrypting and decrypting the coded information of the commodity two-dimensional code to realize system identity authentication; the communication between the cloud computing platform and the cloud computing terminal adopts an encryption communication tunnel, the network communication protocol of the encryption communication tunnel is IPSec, and the encryption method of the encryption communication tunnel is an HMAC-MD5 algorithm adopting a hash function.
The commodity code comprises a service network address, a commodity type, specification, a model, a batch, a price, a manufacturer, a production place, a production date, a quality detection result, commodity introduction and other information.
The cloud computing architecture is adopted in the embodiment, and a hundred million-level encrypted two-dimensional code cloud computing platform is taken as a center to provide commodity authenticity identification service for consumers; and the cloud computing terminal gives a two-dimensional code identification (identity) to the commodity. The embodiment ensures the operating efficiency, reliability, flexibility and robustness of the system in a convenient automatic centralized management mode; the uniqueness and reliability of the encrypted two-dimensional code of the commodity are ensured by adopting a hundred million-level encrypted two-dimensional code technology, and the industrial automatic batch production is facilitated; the verification work flow of scanning the encrypted two-dimensional codes one by one is adopted, so that the accuracy and the effectiveness of the activated commodity two-dimensional codes are ensured, and repeated codes and wrong codes are eliminated; the security and the confidentiality of a system communication channel are ensured by adopting IPSec communication and HMAC-MD5 algorithm encryption technology of a hash function; the method adopts an RSA asymmetric encryption technology, wherein public and private key pairs are generated by a system randomly and are used for encrypting and decrypting the coded information of the commodity encrypted two-dimensional code and realizing identity authentication, so that the safety, confidentiality and reliability of the encrypted two-dimensional code are ensured, and the problems of cracking, guessing or counterfeiting the commodity two-dimensional code are technically solved; the problem that the two-dimension code of the commodity is copied or recycled and stolen is solved by combining the limitation on the scanning times of the encrypted two-dimension code. The method and the system are widely applicable to various fast consumer product industries and enterprises, can not only enable consumers to quickly and conveniently realize the authenticity identification of commodities, but also can be applied to industrialized automatic mass production, and have low cost and strong operability.
Fig. 3 is a schematic diagram of a product coding performed in a cloud technology and hundred million-level encrypted two-dimensional code-based product authenticity identification method according to a second preferred embodiment of the present invention, as shown in the figure, for example, each manufacturer corresponds to a manufacturer number (i.e., a cloud computing terminal number), each product corresponds to a product model number, and each product corresponds to a product number. For example, Aa00000000x represents a product of type a, number 00000000x, made by vendor a; as another example, Zm00000000Z represents a model m item number 00000000Z manufactured by manufacturer Z. This is the simplest case. In order to achieve better system safety and practicability, the encoding and decoding module can be arranged in the cloud computing platform according to the use requirement, the one-to-one correspondence relationship between the commodities and the codes is realized by adopting a complex encoding and decoding algorithm, and the system operation efficiency is improved.
The following description will be given of an application process of the commodity authenticity identification method based on the cloud technology and the hundred million-level encrypted two-dimensional code, taking a certain manufacturing industry as an example.
An industry has 50 manufacturing enterprises, each with its own manufacturing plant and located in different provinces. The industry builds a cloud computing platform for realizing product numbering of the whole industry and providing commodity authenticity identification service, and each production and manufacturing enterprise or production factory has 1 cloud computing terminal for encrypting two-dimensional code identification on the product. The production and manufacturing enterprises can encode the two-dimensional codes of the commodities on the cloud computing platform according to the demands of the enterprises, automatically compress and encrypt the two-dimensional codes through the cloud computing platform, generate hundred million-level encrypted two-dimensional codes and download the hundred million-level encrypted two-dimensional codes to the cloud computing terminals of the enterprises; and the cloud computing terminal completes the distribution, printing and forward code scanning verification of the encrypted two-dimensional code. Then, encrypting the actually used and verified commodity two-dimensional code data packet and sending the encrypted and verified commodity two-dimensional code data packet to a cloud computing platform; and the cloud computing platform assigns, activates and manages the commodity two-dimensional codes which pass practical use and pass verification, and invalidates the commodity two-dimensional codes which are not used or pass verification. When a consumer purchases a commodity, the consumer can perform two-dimensional code scanning through a user terminal (code scanning terminal) such as a smart phone, and the user terminal automatically sends out a commodity authenticity service identification request through a mobile network according to a service network address embedded in an encrypted two-dimensional code; and after receiving the request, the cloud computing platform automatically performs retrieval, matching, analysis and calculation and feeds back the result and the commodity related information to the user terminal, so that the consumer can quickly, simply and conveniently finish the authenticity identification of the commodity.
Example three:
fig. 4 is a schematic structural diagram of a third preferred embodiment of the present invention, showing a system for identifying authenticity of a product based on cloud technology and hundred million-level encrypted two-dimensional codes, the system including:
the system comprises a cloud computing terminal, a cloud computing platform, a code correcting terminal and a code scanning terminal;
the cloud computing platform encodes the commodity to obtain a commodity code; encrypting the commodity code to generate a hundred million-level encrypted two-dimensional code, and establishing a one-to-one correspondence relationship between the commodity code and the encrypted two-dimensional code;
the cloud computing terminal cloud acquires the encrypted two-dimensional code and identifies the commodity by using the encrypted two-dimensional code;
the code correcting terminal scans the encrypted two-dimensional codes of the identified commodities one by one, removes repeated and wrong encrypted two-dimensional codes and obtains the encrypted two-dimensional codes of the commodities which are actually used; the cloud computing terminal sends the encrypted two-dimensional code of the actually used commodity to the cloud computing platform, and the cloud computing platform establishes a commodity coding information database according to the received encrypted two-dimensional code of the actually used commodity and the corresponding relation, and activates and manages the encrypted two-dimensional code of the actually used commodity;
the code scanning terminal scans the encrypted two-dimensional code of the commodity, analyzes the obtained encrypted two-dimensional code to obtain the commodity code, then automatically sends the commodity code and the authenticity identification service request to the cloud computing platform, and the cloud computing platform analyzes and judges by using the commodity code information database to obtain an identification result and feeds the identification result back to the user.
Further, the cloud computing platform comprises an identification unit which receives the commodity code uploaded by the code scanning terminal and judges whether the commodity code exists in the commodity code information database, if not, the identification result of a counterfeit product is sent to a user, otherwise, the identification result of a genuine product is sent to the user, and if not, the identification result of the genuine product is sent to the user.
Further, the cloud computing platform encodes the commodity according to user requirements and performs compression processing before encryption so as to reduce resource occupancy rate.
The system of the present invention corresponds to the above method one to one, and the present invention does not describe the above system in detail, and repeated content is not repeated.
Example four:
fig. 5 is a schematic structural diagram of a cloud technology and hundred million-level encrypted two-dimensional code-based commodity authenticity identification system according to a fourth preferred embodiment of the present invention, as shown in the figure, a cloud technology architecture is adopted in the present embodiment, a hundred million-level encrypted two-dimensional code cloud computing platform is taken as a center (equivalent to a cloud computing platform), and the cloud computing platform is responsible for encoding, compressing, encrypting, generating, activating, assigning and managing hundreds of millions of levels of commodity two-dimensional codes; each cloud computing terminal is in butt joint with the cloud computing platform, information interaction is carried out through protocols such as OBIX, SIP, SNMP, XML and P2P, and an IPSec security protocol and an HMAC-MD5 encryption algorithm are adopted to encrypt a communication tunnel so as to guarantee the security and confidentiality of system communication; the cloud computing terminal obtains the encrypted two-dimensional code from the cloud computing platform and identifies the commodity, the code correcting terminal conducts forward code scanning verification on the actually used commodity two-dimensional code, and then the verified commodity two-dimensional code data packet is encrypted and sent to the cloud computing platform.
The cloud computing platform is also responsible for providing commodity two-dimensional code authenticity identification services, each user code scanning terminal (such as a smart phone, a tablet computer, a notebook computer, a desktop computer, a two-dimensional code scanning instrument and the like) performs two-dimensional code scanning, automatically accesses a system verification service network address through the internet or a mobile communication network, and sends a two-dimensional code verification service request to the cloud computing platform; and the cloud computing platform compares, analyzes and calculates the received two-dimensional codes to obtain a true and false identification result, and feeds the true and false identification result back to the terminal equipment.
Cloud computing is a model for accessing a resource sharing pool (such as hardware resources, software resources, applications, services and the like) through a network and acquiring resources on demand, and has the characteristics of high efficiency, high reliability, strong robustness, high expansibility, high flexibility, on-demand services and the like.
The two-dimensional code is a black-white pattern which is distributed on a plane (two-dimensional direction) according to a certain rule by using a specific geometric figure, and has the characteristics of high coding density, wide range, large information capacity, strong fault tolerance and error correction capability, high decoding reliability, encryption, low cost, easiness in manufacturing and the like.
The embodiment ensures the operating efficiency, reliability, flexibility and robustness of the system by utilizing the strong computing capability and performance of the cloud technology and the convenient automatic centralized management mode.
In addition, the actually used article in the present application is an article whose identification is completed and which is ready to be sold, but is not limited to the article ready to be sold.
Finally, it should be noted that: the above examples are only intended to illustrate the technical solution of the present invention, but not to limit it; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions of the embodiments of the present invention.

Claims (8)

1. A commodity authenticity identification method based on a cloud technology and a hundred million-level encrypted two-dimensional code is characterized by comprising the following steps:
s1, the cloud computing platform encodes the commodity to obtain a commodity code; encrypting the commodity code to generate a hundred million-level encrypted two-dimensional code, and establishing a one-to-one correspondence relationship between the commodity code and the encrypted two-dimensional code;
s2, the cloud computing terminal obtains the encrypted two-dimensional code and identifies the commodity by using the encrypted two-dimensional code;
s3, the code correcting terminal scans the encrypted two-dimensional codes of the marked commodities one by one, removes repeated and wrong encrypted two-dimensional codes and obtains the encrypted two-dimensional codes of the commodities which are actually used;
s4, the cloud computing terminal sends the encrypted two-dimensional code of the commodity which is actually used to the cloud computing platform;
s5, the cloud computing platform establishes a commodity code information database according to the received encrypted two-dimensional code of the commodity actually used and the corresponding relation, and activates and manages the encrypted two-dimensional code of the commodity actually used;
s6, when the user identifies the authenticity, the encrypted two-dimensional code of the commodity is scanned by using the code scanning terminal, scanning information is uploaded, a commodity authenticity identification service request is automatically sent to the cloud computing platform, the cloud computing platform analyzes and judges by using the commodity coding information database to obtain an identification result, and the identification result is fed back to the user;
in steps S1 and S3, an RSA asymmetric encryption algorithm is used for encryption, wherein a public key and a private key pair are randomly generated;
the cloud computing platform uses a private key as an encryption key to encrypt a two-dimension code encoding plaintext, and the code correcting terminal uses a public key as a decryption key to decrypt an encrypted two-dimension code encoding ciphertext;
the code correcting terminal takes a public key as an encryption key for encrypting the commodity two-dimensional code data packet which passes the repeated verification and the error verification, and the cloud computing platform takes a private key as a decryption key for decrypting the encrypted commodity two-dimensional code data packet which passes the repeated verification and the error verification;
in step S1, before encrypting the product code, the product code is compressed first;
in step S5, the cloud computing platform updates the information of the product code information database according to the received encrypted two-dimensional code of the actually used product and the correspondence, and then activates and manages the encrypted two-dimensional code.
2. The method according to claim 1, wherein the step S6 specifically includes:
s61, the user scans the commodity by using the code scanning terminal, analyzes the obtained encrypted two-dimensional code to obtain the commodity code, and then automatically sends the commodity code and the authenticity identification service request to the cloud computing platform;
s62, the cloud computing platform receives the commodity code and judges whether the commodity code exists in the commodity code information database, if not, an identification result of a counterfeit is sent to a user, otherwise, the step S63 is executed;
and S63, the cloud computing platform judges whether the request of the authenticity identification service of the commodity code is the first time, if so, the identification result of the genuine product is sent to the user, and if not, the identification result of the counterfeit product is sent to the user.
3. The method according to claim 2, wherein in step S1, the two-dimensional code is encrypted by using RSA asymmetric encryption algorithm, and a public key and a private key pair are randomly generated and used for encrypting and decrypting the two-dimensional code to realize identity authentication.
4. The method according to claim 3, wherein the communication between the cloud computing platform and the cloud computing terminal adopts a VPN (virtual Private network) encryption communication tunnel, the network communication protocol of the VPN encryption communication tunnel is IPSec, and the encryption method adopts a hash function HMAC-MD5 algorithm.
5. The method of claim 4, wherein the two-dimensional code adopts hundred million-level two-dimensional code technology, and generation of hundreds of millions of encrypted two-dimensional codes by utilizing the hundred million-level two-dimensional code technology has uniqueness and accuracy.
6. The method of claim 5, wherein the goods code comprises a service network address, a goods type, a specification, a model, a batch, a price, a manufacturer, a production location, a production date, a quality inspection result, and a goods introduction.
7. A commodity authenticity identification system based on cloud technology and hundred million-level encrypted two-dimensional codes is characterized by comprising:
the system comprises a cloud computing terminal, a cloud computing platform, a code correcting terminal and a code scanning terminal;
the cloud computing platform encodes the commodity to obtain a commodity code; encrypting the commodity code to generate a hundred million-level encrypted two-dimensional code, and establishing a one-to-one correspondence relationship between the commodity code and the encrypted two-dimensional code;
the cloud computing terminal cloud acquires the encrypted two-dimensional code and identifies the commodity by using the encrypted two-dimensional code;
the code correcting terminal scans the encrypted two-dimensional codes of the identified commodities one by one, removes repeated and wrong encrypted two-dimensional codes and obtains the encrypted two-dimensional codes of the commodities which are actually used; the cloud computing terminal sends the encrypted two-dimensional code of the actually used commodity to the cloud computing platform, and the cloud computing platform establishes a commodity coding information database according to the received encrypted two-dimensional code of the actually used commodity and the corresponding relation, and activates and manages the encrypted two-dimensional code of the actually used commodity;
the code scanning terminal scans the encrypted two-dimensional code of the commodity, analyzes the obtained encrypted two-dimensional code to obtain the commodity code, automatically sends the commodity code and the authenticity identification service request to the cloud computing platform, and the cloud computing platform analyzes and judges by using the commodity code information database to obtain an identification result and feeds the identification result back to the user;
the cloud computing platform and the code correcting terminal are encrypted by adopting an RSA asymmetric encryption algorithm, wherein a public key and a private key pair are randomly generated;
the cloud computing platform uses a private key as an encryption key to encrypt a two-dimension code encoding plaintext, and the code correcting terminal uses a public key as a decryption key to decrypt an encrypted two-dimension code encoding ciphertext;
the code correcting terminal takes a public key as an encryption key for encrypting the commodity two-dimensional code data packets which pass the repeated verification and the error verification, and the cloud computing platform takes a private key as a decryption key for decrypting the encrypted commodity two-dimensional code data packets which pass the repeated verification and the error verification;
the cloud computing platform firstly compresses the commodity code before encrypting the commodity code; and the cloud computing platform updates the information of the commodity code information database according to the received encrypted two-dimensional code of the actually used commodity and the corresponding relation, and then activates and manages the encrypted two-dimensional code.
8. The system of claim 7, wherein the cloud computing platform comprises an identification unit, which receives the commodity code uploaded by the code scanning terminal, and determines whether the commodity code exists in the commodity code information database, if not, sends an identification result of a counterfeit product to the user, otherwise, determines whether the request of the authenticity identification service of the commodity code is the first time, if so, sends an identification result of a genuine product to the user, otherwise, sends an identification result of a counterfeit product to the user.
CN201510188774.6A 2015-04-20 2015-04-20 Commodity authenticity identification method and system based on cloud technology and hundred million-level encrypted two-dimensional code Active CN104850999B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510188774.6A CN104850999B (en) 2015-04-20 2015-04-20 Commodity authenticity identification method and system based on cloud technology and hundred million-level encrypted two-dimensional code

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510188774.6A CN104850999B (en) 2015-04-20 2015-04-20 Commodity authenticity identification method and system based on cloud technology and hundred million-level encrypted two-dimensional code

Publications (2)

Publication Number Publication Date
CN104850999A CN104850999A (en) 2015-08-19
CN104850999B true CN104850999B (en) 2020-06-26

Family

ID=53850629

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510188774.6A Active CN104850999B (en) 2015-04-20 2015-04-20 Commodity authenticity identification method and system based on cloud technology and hundred million-level encrypted two-dimensional code

Country Status (1)

Country Link
CN (1) CN104850999B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107451640B (en) * 2017-07-20 2020-04-24 福州觉感视觉软件科技有限公司 Anti-counterfeiting method based on two-dimensional code
CN110135858A (en) * 2019-04-04 2019-08-16 广东万和新电气股份有限公司 The anti-fake method and device with activation of equipment

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120265667A1 (en) * 2011-04-18 2012-10-18 Thomas Sachson Financial instrument discovery, transparency, communication, and trading facilitation
US8533015B2 (en) * 2011-09-01 2013-09-10 Dennis Meegan Method and system for creating electronic business referrals with cloud computing
CN102663605A (en) * 2012-04-27 2012-09-12 镇江邦德信息技术有限公司 Two-dimension code commodity anti-fake traceability system and commodity anti-fake traceability method based on cloud computing
JP5731071B2 (en) * 2012-08-17 2015-06-10 A・Tコミュニケーションズ株式会社 Two-dimensional code authentication device, two-dimensional code generation device, two-dimensional code authentication method, and program
US20140151446A1 (en) * 2012-12-01 2014-06-05 Don R. Bovell System and Method for Asset Management
CN103996122A (en) * 2013-07-15 2014-08-20 中保宇投资有限公司 Merchandise anti-counterfeiting system and method
CN104299140A (en) * 2014-09-12 2015-01-21 广州市坚真信息科技有限公司 Two-dimensional code anti-counterfeiting traceability system and method based on e-commerce

Also Published As

Publication number Publication date
CN104850999A (en) 2015-08-19

Similar Documents

Publication Publication Date Title
TWI683567B (en) Security verification method, device, server and terminal
CN104299140A (en) Two-dimensional code anti-counterfeiting traceability system and method based on e-commerce
CN101719205B (en) Digital copyright management method and system
AU2012345478B2 (en) A method of generation and transmission of secure tokens based on tokens generated by TRNG and split into shares and the system thereof
CN103093361A (en) Commodity double-layer anti-fake method based on technologies of internet of things
CN105450395A (en) Information encryption and decryption processing method and system
CN106027235A (en) PCI password card, and password operation method and system for massive keys
EP3099033B1 (en) System architecture and method for ensuring network information security
CN106372950B (en) Anti-counterfeiting authentication method for e-commerce and online shopping commodities
CN114338247B (en) Data transmission method and apparatus, electronic device, storage medium, and program product
CN105335667A (en) Innovation and creativity data processing method, device and system and certificate storing equipment
GB2533279A (en) Secure media player
CN112070516A (en) Product tracing method and device and block chain system
CN110198320B (en) Encrypted information transmission method and system
CN104850999B (en) Commodity authenticity identification method and system based on cloud technology and hundred million-level encrypted two-dimensional code
CN115021913A (en) Key generation method, system and storage medium for industrial internet identification analysis system
CN109726578A (en) A kind of anti-fake solution of novel dynamic two-dimension code
CN110890979B (en) Automatic deployment method, device, equipment and medium for fort machine
CN104868994B (en) A kind of method, apparatus and system cooperateing with key management
CN105227556A (en) Server and terminal anti-counterfeit authentication method, system
CN108596309B (en) Two-dimensional code generation and verification method
CN107392050B (en) System and method for realizing burning after printing of electronic supervision code
CN108830626A (en) A kind of two-dimension code anti-counterfeit traceability system and method suitable for e-commerce
CN114186998A (en) Privacy communication method based on block chain
CN103905206A (en) Cross-equipment and cross-application identity authentication method based on data image coding

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20220218

Address after: 210000 No.8, Yihuai street, Jiangning Economic and Technological Development Zone, Nanjing, Jiangsu Province

Patentee after: NANJING DASHU INTELLIGENT SCIENCE AND TECHNOLOGY Co.,Ltd.

Address before: 100193 No. 2 Old Summer Palace West Road, Beijing, Haidian District

Patentee before: CHINA AGRICULTURAL University