CN106372950B - Anti-counterfeiting authentication method for e-commerce and online shopping commodities - Google Patents

Anti-counterfeiting authentication method for e-commerce and online shopping commodities Download PDF

Info

Publication number
CN106372950B
CN106372950B CN201610836561.4A CN201610836561A CN106372950B CN 106372950 B CN106372950 B CN 106372950B CN 201610836561 A CN201610836561 A CN 201610836561A CN 106372950 B CN106372950 B CN 106372950B
Authority
CN
China
Prior art keywords
terminal
distributor
dealer
identity information
online shopping
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610836561.4A
Other languages
Chinese (zh)
Other versions
CN106372950A (en
Inventor
史闻博
刘明曦
张起嘉
董志勇
黄帆
陶怡戈
汤景扬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Northeastern University Qinhuangdao Branch
Original Assignee
Northeastern University Qinhuangdao Branch
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Northeastern University Qinhuangdao Branch filed Critical Northeastern University Qinhuangdao Branch
Priority to CN201610836561.4A priority Critical patent/CN106372950B/en
Publication of CN106372950A publication Critical patent/CN106372950A/en
Application granted granted Critical
Publication of CN106372950B publication Critical patent/CN106372950B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • G06Q30/0185Product, service or business identity fraud
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Finance (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • Development Economics (AREA)
  • Accounting & Taxation (AREA)
  • Economics (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses an anti-counterfeiting authentication method for E-commerce and online shopping commodities, which comprises the following steps: s1, the supplier terminal confirms and authorizes the distributor terminal; s2, after the authorization is successful, the dealer terminal sends the encrypted goods feeding application and the dealer identity information to the supplier terminal for goods feeding operation; s3, after the supplier terminal decrypts the information, the identity information of the dealer is verified; if the verification is successful, feeding back the encrypted corresponding commodity code to the dealer terminal; s4, the dealer terminal decrypts the information to obtain the commodity code; s5, after receiving the buyer transaction request, the distributor terminal encrypts the commodity code and the distributor identity information and sends the encrypted commodity code and the encrypted commodity together with the commodity to the buyer; and S6, the buyer verifies the purchased goods and the identity of the distributor through the online shopping platform. The invention avoids the risk of intercepting or tampering the data, so that the security of the anti-counterfeiting verification is higher, and the result of the anti-counterfeiting verification is more objective and real.

Description

Anti-counterfeiting authentication method for e-commerce and online shopping commodities
Technical Field
The invention relates to an anti-counterfeiting authentication method for E-commerce and online shopping commodities, belonging to the technical field of commodity anti-counterfeiting and shop anti-counterfeiting.
Background
Nowadays, online shopping is fashionable, but when people carry out online shopping, a problem always puzzles everywhere, namely whether goods are true or not; in addition, the supply channel of the goods is also a concern for many consumers, for example, consumers buy overseas products, and often want to buy products directly mailed in a specific country rather than products produced by a factory. Therefore, the anti-counterfeiting verification of the supply channel of the e-commerce (namely, the distributor) is also necessary, and the anti-counterfeiting verification method can play a role in double insurance.
The patent application with the application number of 201110189920.9 discloses a commodity anti-counterfeiting method based on a path mechanism, which effectively realizes the validity judgment of the identities of commodities and sellers, thereby preventing the circulation of counterfeit and shoddy commodities and recirculated commodities. However, the following disadvantages still exist with this technique:
1. the safety in the data transmission process cannot be guaranteed, and the risk of data interception or tampering exists, so that the objectivity and authenticity of the final anti-counterfeiting verification result are to be studied;
2. each step of commodity flow needs to send information confirmation to the anti-counterfeiting authentication center, so that the service pressure of the anti-counterfeiting authentication center is too high;
3. the identification code of the commodity and the ID of the seller are not reasonably protected and are both in a naked state, so that if the ID of a certain seller is stolen by others, the flow direction information of the commodity can be sent to the anti-counterfeiting authentication center by the identity of the seller; if the counterfeiter sells the counterfeit commodity, the legal rights and interests of the seller with the stolen ID are infringed;
4. the generation process of the unique commodity identification code is not explained, the randomness cannot be guaranteed, and the stability of the whole system can be threatened if the generation principle of the commodity identification code is cracked.
Disclosure of Invention
The invention aims to provide an anti-counterfeiting authentication method for e-commerce and online shopping commodities, which can effectively solve the problems in the prior art, particularly the problems that the safety in the data transmission process cannot be ensured, and the risk of data interception or tampering exists, so that the objectivity and the authenticity of the final anti-counterfeiting verification result need to be studied.
In order to solve the technical problems, the invention adopts the following technical scheme: an anti-counterfeiting authentication method for E-commerce and online shopping commodities comprises the following steps:
s1, the supplier terminal confirms and authorizes the distributor terminal;
s2, after the authorization is successful, the dealer terminal sends the encrypted goods feeding application and the dealer identity information to the supplier terminal for goods feeding operation;
s3, after the supplier terminal decrypts the information, the identity information of the dealer is verified; if the verification is successful, feeding back the encrypted corresponding commodity code (with unique identification) to the distributor terminal (and feeding back the corresponding commodity to the distributor);
s4, the dealer terminal decrypts the information to obtain the commodity code;
s5, after receiving the buyer transaction request, the distributor terminal encrypts the commodity code and the distributor identity information and sends the encrypted commodity code and the encrypted commodity together with the commodity to the buyer;
and S6, the buyer verifies the purchased goods and the identity of the distributor through the online shopping platform.
The online shopping platform has the function of CA.
Preferably, step S1 includes:
s11, the supplier terminal, the distributor terminal and the online shopping platform generate respective private keys, and generate corresponding public keys according to the private keys and store the public keys locally;
s12, the supplier terminal sends the supplier public key to the online shopping platform and obtains the online shopping platform public key; the method comprises the steps that a distributor terminal sends a distributor public key to an online shopping platform and obtains the online shopping platform public key;
s13, the online shopping platform sends the supplier public key to the distributor terminal, and simultaneously sends the distributor public key to the supplier terminal;
s14, the supplier terminal confirms and authorizes the distributor terminal.
More preferably, step S14 includes: the vendor terminal generates the dealer identity information, encrypts the dealer identity information by using the vendor public key and the vendor private key and sends the dealer identity information to the vendor terminal, and the vendor terminal decrypts the dealer identity information by using the vendor private key and the vendor public key to obtain the dealer identity information. By generating the dealer ID (namely dealer identity information) by a supplier, the source safety of the dealer ID can be ensured because potential safety hazard does not exist at the source, and if other third-party platforms are used for generating the dealer ID, on one hand, the uniqueness and the randomness of the dealer ID cannot be ensured, and on the other hand, the data storage safety of the third-party platforms cannot be ensured, in addition, the information safety cannot be ensured in the process of transmitting the dealer ID, and man-in-the-middle attack is easy to occur; in addition, the invention uses the private key of the supplier to encrypt the ID of the distributor, ensures that the distributor can not receive the ID of the distributor sent by a counterfeit supplier, uses the public key of the distributor to encrypt, only can the distributor use the private key to decrypt information, ensures the safety of information transmission, and reduces the risk of receiving man-in-the-middle attack.
Preferably, step S2 includes:
and after the authorization is successful, the distributor terminal sends the goods feeding application and the distributor identity information which are encrypted by using the distributor private key and the supplier public key to the supplier terminal for goods feeding operation. In the invention, the dealer private key is used for encrypting information, and because only the dealer holds the dealer private key, the dealer cannot repudiate the goods input information; the public key of the supplier is used for encrypting the information, so that only a true supplier with the private key of the supplier can decrypt the information, the safety of information transmission is ensured, and the risk of man-in-the-middle attacks such as tampering and the like is prevented.
In the above method for authenticating an e-commerce or an online shopping product, step S3 includes: after the supplier terminal decrypts the information, the identity information of the dealer is verified; if the verification is successful, distributing corresponding commodity codes according to the goods feeding information and the dealer identity information (the goods suppliers distribute the commodity codes for each commodity), encrypting the commodity codes by using a private key of the goods suppliers and a public key of the dealers, and feeding back the encrypted commodity codes to the dealer terminal (and feeding back the corresponding commodities to the dealers).
In the above method for authenticating an e-commerce or an online shopping product, step S4 includes: and the distributor terminal decrypts the information by using the distributor private key and the supplier public key to obtain the commodity code.
Data transmission is carried out through the mode, so that the commodity code can be obtained only by a specific dealer, the commodity code is prevented from being intercepted and utilized by bad molecules, and the safety of data is further guaranteed.
Preferably, in step S5, the public key of the online shopping platform is used to encrypt the commodity code and the identity information of the distributor, so that only a specific online shopping platform can obtain the commodity code and the identity information of the distributor, and the anti-counterfeit verification of the commodity is performed, thereby ensuring the security of the source of the verification result.
In the present invention, step S6 includes:
s61, the online shopping platform decrypts the information (by using the private key of the online shopping platform) and then obtains the commodity code and the identity information of the dealer;
s62, the online shopping platform encrypts the commodity code (using the private key of the online shopping platform and the public key of the supplier) and sends the encrypted commodity code to the terminal of the supplier;
s63, the supplier terminal (using the public key of the online shopping platform and the private key of the supplier) decrypts the received information to obtain the commodity code; then matching the commodity code with stored dealer identity information (the commodity code and the dealer identity information are in a many-to-one relationship);
s64, if the commodity code exists and is successfully matched with the dealer identity information, sending (by using the public key of the online shopping platform) the encrypted dealer identity information to the online shopping platform;
s65, after the online shopping platform decrypts the information (by using the private key of the online shopping platform), the dealer identity information fed back is obtained; and then matching the identification information with the identity information of the distributor sent by the buyer, and if the identification information is consistent with the identity information of the distributor sent by the buyer, successfully authenticating the identification and feeding back the identification to the buyer.
In the above method, the supplier terminal can directly obtain the dealer identity information by using the dealer identity information established when the commodity code is distributed and the corresponding table of the commodity code.
In the method, the online shopping platform only sends the commodity code to the supplier terminal for verification instead of sending the commodity code and the identity information of the distributor together, so that the supplier can be prevented from sheltering the distributor, and the authentication result obtained by the online shopping platform is more convincing, real and objective; if the goods code and the dealer identity information are sent to the supplier terminal together for verification, and if the verification fails, but the supplier terminal is hidden from the online shopping platform, the online shopping platform cannot acquire a real verification result. Therefore, the invention only sends the commodity code to the supplier terminal for verification, so that the verification process is more transparent, if the verification is not passed, the supplier terminal cannot be matched with correct distributor identity information, and the correct distributor identity information cannot be returned, so that the authentication result obtained by the online shopping platform is more convincing, and the authentication risk is reduced; in addition, the method can effectively reduce the service pressure of the online shopping platform and improve the working efficiency.
In the above method, the commodity code is obtained by performing AES encryption (i.e., symmetric encryption) using the dealer identification information and the time information of the received order and the large-digit random number as a key (for a normal commodity code), and then performing the MD5 (information digest algorithm 5) operation again on the encryption result. The existing commodity code is public and one kind of commodity code is public and can only be used as an electronic tag of the commodity, but the commodity code is obtained by performing AES encryption on the basis of the existing commodity code by using dealer identity information, time information of order receipt and a large-digit random number as a secret key and then performing MD5 operation on an encryption result, so that the commodity codes of the same commodity are different (one commodity corresponds to one commodity code, namely, each generated commodity code is unique and irregular), the unknown commodity code cannot be guessed according to the known commodity code, the commodity code can be prevented from being maliciously generated by a third party, and the security of anti-counterfeiting authentication is further improved.
Compared with the prior art, the invention has the following beneficial effects:
1. the communication between a supplier terminal and a distributor terminal is realized by utilizing an online shopping platform, the purchased goods and the identity of the distributor are verified, and important information in the transmission process is encrypted (such as a goods code and the identity information of the distributor) based on cryptography, so that the risk of intercepting or tampering data is avoided, the legal rights and interests of the distributor are protected, the security of anti-counterfeiting verification is higher, and the anti-counterfeiting verification result is more objective and real;
2. in the invention, the supplier terminal encrypts the commodity code by using the supplier private key and the distributor public key and feeds the encrypted commodity code back to the distributor terminal, thereby ensuring that only a specific distributor can obtain the commodity code, preventing the commodity code from being intercepted and utilized by bad molecules, and further ensuring the safety of data;
3. the commodity code in the invention is obtained by using the identity information of the dealer, the time information of the received order and the large-digit random number as a key (for a common commodity code) to carry out AES encryption and then carrying out MD5 operation on the encryption result again; the existing commodity code is public and one kind of commodity code is public and can only be used as an electronic tag of the commodity, but the commodity code in the invention is obtained by performing AES encryption on the basis of the existing commodity code by using dealer identity information, time information of receiving an order and a large-digit random number as a secret key and then performing MD5 operation on an encryption result; therefore, the commodity codes of the same commodity are different (one commodity corresponds to one commodity code), are unique and irregular, unknown commodity codes cannot be guessed according to the known commodity codes, the commodity codes can be prevented from being maliciously generated by a third party, and the safety of anti-counterfeiting authentication and the stability of the whole system are further improved;
4. the online shopping platform only sends the commodity code to the terminal of the supplier for verification instead of sending the commodity code and the identity information of the distributor together, thereby preventing the supplier from covering the distributor, leading the authentication result obtained by the online shopping platform to be more convincing, truer and more objective (namely, the commodity anti-counterfeiting authentication in the invention is interactive, the supplier simply returns a result which cannot pass through, and the authentication is successful only when the supplier returns correct identity information of the distributor and the identity information of the distributor sent by a buyer can be matched and consistent on the online shopping platform); meanwhile, the service pressure of the online shopping platform can be effectively reduced, and the working efficiency is improved;
5. the whole system architecture of the invention is under the cryptology system, the conception is strict, compared with other prior art, it is extremely difficult to dig the loophole therein;
6. the invention authenticates the authenticity and the credibility of the dealer while verifying the authenticity of the commodity, and the authentication result can be stored as the credit rating basis of the dealer on the online shopping platform;
7. according to a large amount of data statistics, compared with the prior art, the method for anti-counterfeiting authentication has the advantages that the accuracy can be improved by 30%, and the efficiency can be improved by 20%.
Drawings
FIG. 1 is a schematic diagram of the architecture of a supplier terminal, a distributor terminal and an online shopping platform according to the present invention;
fig. 2 is a work flow diagram of an embodiment of the present invention.
The invention is further described with reference to the following figures and detailed description.
Detailed Description
The embodiment of the invention comprises the following steps: an anti-counterfeiting authentication method for e-commerce and online shopping commodities is shown in fig. 1 and 2 and comprises the following steps:
s1, the supplier terminal confirms and authorizes the distributor terminal;
s2, after the authorization is successful, the dealer terminal sends the encrypted goods feeding application and the dealer identity information to the supplier terminal for goods feeding operation;
s3, after the supplier terminal decrypts the information, the identity information of the dealer is verified; if the verification is successful, feeding back the encrypted corresponding commodity code (with unique identification) to the distributor terminal (and sending the corresponding commodity to the distributor);
s4, the dealer terminal decrypts the information to obtain the commodity code;
s5, after receiving the buyer transaction request, the distributor terminal encrypts the commodity code and the distributor identity information and sends the encrypted commodity code and the encrypted commodity together with the commodity to the buyer;
and S6, the buyer verifies the purchased goods and the identity of the distributor through the online shopping platform.
The step S1 includes:
s11, the supplier terminal, the distributor terminal and the online shopping platform generate respective private keys, and generate corresponding public keys according to the private keys and store the public keys locally;
s12, the supplier terminal sends the supplier public key to the online shopping platform and obtains the online shopping platform public key; the method comprises the steps that a distributor terminal sends a distributor public key to an online shopping platform and obtains the online shopping platform public key;
s13, the online shopping platform sends the supplier public key to the distributor terminal, and simultaneously sends the distributor public key to the supplier terminal;
s14, the supplier terminal confirms and authorizes the distributor terminal.
In order to ensure the security of the source of the dealer identity information, step S14 includes: the vendor terminal generates the dealer identity information, encrypts the dealer identity information by using the vendor public key and the vendor private key and sends the dealer identity information to the vendor terminal, and the vendor terminal decrypts the dealer identity information by using the vendor private key and the vendor public key to obtain the dealer identity information.
The step S2 includes:
and after the authorization is successful, the distributor terminal sends the goods feeding application and the distributor identity information which are encrypted by using the distributor private key and the supplier public key to the supplier terminal for goods feeding operation.
Step S3 includes: after the supplier terminal decrypts the information, the identity information of the dealer is verified; if the verification is successful, distributing corresponding commodity codes according to the goods feeding information and the dealer identity information (the goods suppliers distribute the commodity codes for each commodity), encrypting the commodity codes by using a private key of the goods suppliers and a public key of the dealers, and feeding back the encrypted commodity codes to the dealer terminal (and feeding back the corresponding commodities to the dealers).
Step S4 includes: and the distributor terminal decrypts the information by using the distributor private key and the supplier public key to obtain the commodity code.
In the above method, in step S5, the product code and the dealer identity information are encrypted by using the public key of the online shopping platform.
In order to further improve the authenticity and objectivity of the anti-counterfeit authentication, step S6 includes:
s61, the online shopping platform decrypts the information (by using the private key of the online shopping platform) and then obtains the commodity code and the identity information of the dealer;
s62, the online shopping platform encrypts the commodity code (using the private key of the online shopping platform and the public key of the supplier) and sends the encrypted commodity code to the terminal of the supplier;
s63, the supplier terminal (using the public key of the online shopping platform and the private key of the supplier) decrypts the received information to obtain the commodity code; then matching the commodity code with stored dealer identity information;
s64, if the commodity code exists and is successfully matched with the dealer identity information, sending (by using the public key of the online shopping platform) the encrypted dealer identity information to the online shopping platform;
s65, after the online shopping platform decrypts the information (by using the private key of the online shopping platform), the dealer identity information fed back is obtained; and then matching the identification information with the identity information of the distributor sent by the buyer, and if the identification information is consistent with the identity information of the distributor sent by the buyer, successfully authenticating the identification and feeding back the identification to the buyer.
In the above method, the commodity code is obtained by performing AES encryption using the dealer identification information and the time information of the received order and the large-digit random number as a key (for a normal commodity code), and then performing the MD5 operation again on the encryption result.
In the above method, the random number may be generated by using a software random algorithm, such as python language: randnt (100000,200000) (random numbers) are used (algorithms are used to define the range of random numbers, and the result is pseudo-random, but the method requirement is satisfied, so it is still expressed as "random numbers"). The invention can store the commodity numbers corresponding to the generated random numbers in a supplier database and create a binary search tree for all the random numbers; and inserting a random number into the binary search tree every time a random number is newly generated, discarding the current numerical value and regenerating the random number if the same random number exists (the purpose of using the binary search tree is to prevent the time consumption of traversal for checking uniqueness when the number of random numbers is too large, and the purpose of directly traversing the random numbers in the database to check uniqueness when the number of random numbers is small). Because the random numbers are different, each commodity code generated is different; in addition, because the MD5 is used in the production process of the commodity codes, according to the characteristics of MD5, even if small changes occur in input variables, the reflection in output is large, so that the difference between each generated commodity code is large, a third party cannot guess unknown commodity codes according to known commodity codes, the commodity codes can be prevented from being maliciously generated by the third party, and the safety of anti-counterfeiting authentication and the stability of the whole system are further improved.
The above embodiments describe the method flow of the present invention in detail, which is only a preferred embodiment of the present invention, and the scope of the present invention should not be limited by the above embodiments, and all equivalent embodiments changed or modified according to the concept of the present invention should be within the scope of the present invention without departing from the spirit covered by the description and the drawings.

Claims (5)

1. An anti-counterfeiting authentication method for E-commerce and online shopping commodities is characterized by comprising the following steps:
s1, the supplier terminal confirms and authorizes the distributor terminal; the method specifically comprises the following steps:
s11, the supplier terminal, the distributor terminal and the online shopping platform generate respective private keys, and generate corresponding public keys according to the private keys and store the public keys locally;
s12, the supplier terminal sends the supplier public key to the online shopping platform and obtains the online shopping platform public key; the method comprises the steps that a distributor terminal sends a distributor public key to an online shopping platform and obtains the online shopping platform public key;
s13, the online shopping platform sends the supplier public key to the distributor terminal, and simultaneously sends the distributor public key to the supplier terminal;
s14, the supplier terminal confirms and authorizes the distributor terminal; the vendor terminal generates vendor identity information, encrypts the vendor identity information by using a vendor public key and a vendor private key and sends the vendor identity information to the vendor terminal, and decrypts the vendor identity information by using the vendor private key and the vendor public key to obtain the vendor identity information;
s2, after the authorization is successful, the dealer terminal sends the encrypted goods feeding application and the dealer identity information to the supplier terminal for goods feeding operation;
s3, after the supplier terminal decrypts the information, the identity information of the dealer is verified; if the verification is successful, feeding back the encrypted corresponding commodity code to the dealer terminal; the commodity code is obtained by performing AES encryption by using the dealer identity information, the time information of the received order and the large-digit random number as keys and then performing MD5 operation on the encrypted result again;
s4, the dealer terminal decrypts the information to obtain the commodity code;
s5, after receiving the buyer transaction request, the distributor terminal encrypts the commodity code and the distributor identity information and sends the encrypted commodity code and the encrypted commodity together with the commodity to the buyer;
s6, the buyer verifies the purchased goods and the identity of the distributor through the online shopping platform, which specifically includes:
s61, the online shopping platform decrypts the information to obtain the commodity code and the dealer identity information;
s62, the online shopping platform encrypts the commodity code and sends the encrypted commodity code to a supplier terminal;
s63, the supplier terminal decrypts the received information to obtain the commodity code; then matching the commodity code with stored dealer identity information;
s64, if the commodity code exists and is successfully matched with the dealer identity information, sending the encrypted dealer identity information to the online shopping platform;
s65, after the online shopping platform decrypts the information, the dealer identity information fed back is obtained; and then matching the identification information with the identity information of the distributor sent by the buyer, and if the identification information is consistent with the identity information of the distributor sent by the buyer, successfully authenticating the identification and feeding back the identification to the buyer.
2. The method for authenticating the forgery of the e-commerce and the online shopping goods as claimed in claim 1, wherein step S2 comprises: and after the authorization is successful, the distributor terminal sends the goods feeding application and the distributor identity information which are encrypted by using the distributor private key and the supplier public key to the supplier terminal for goods feeding operation.
3. The method for authenticating the forgery of the e-commerce and the online shopping goods as claimed in claim 1, wherein step S3 comprises: after the supplier terminal decrypts the information, the identity information of the dealer is verified; if the verification is successful, distributing corresponding commodity codes according to the goods feeding information and the dealer identity information, encrypting the commodity codes by using a supplier private key and a dealer public key, and feeding back the encrypted commodity codes to a dealer terminal.
4. The method for authenticating the forgery of the e-commerce and the online shopping goods as claimed in claim 3, wherein step S4 comprises: and the distributor terminal decrypts the information by using the distributor private key and the supplier public key to obtain the commodity code.
5. The method for authenticating the authenticity of e-commerce and online shopping goods as claimed in claim 1, wherein in step S5, the goods code and the dealer identity information are encrypted by using the online shopping platform public key.
CN201610836561.4A 2016-09-21 2016-09-21 Anti-counterfeiting authentication method for e-commerce and online shopping commodities Active CN106372950B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610836561.4A CN106372950B (en) 2016-09-21 2016-09-21 Anti-counterfeiting authentication method for e-commerce and online shopping commodities

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610836561.4A CN106372950B (en) 2016-09-21 2016-09-21 Anti-counterfeiting authentication method for e-commerce and online shopping commodities

Publications (2)

Publication Number Publication Date
CN106372950A CN106372950A (en) 2017-02-01
CN106372950B true CN106372950B (en) 2020-12-15

Family

ID=57897874

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610836561.4A Active CN106372950B (en) 2016-09-21 2016-09-21 Anti-counterfeiting authentication method for e-commerce and online shopping commodities

Country Status (1)

Country Link
CN (1) CN106372950B (en)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107016552A (en) * 2017-04-11 2017-08-04 刘凯斌 A kind of authentication method of commodity transaction process
JP6499729B2 (en) 2017-07-19 2019-04-10 ファナック株式会社 Application sales management server system
CN109951427B (en) * 2017-12-21 2021-04-16 航天信息股份有限公司 Product tracing method and system and cloud tracing platform
CN109902450B (en) * 2019-03-14 2023-01-24 成都安恒信息技术有限公司 Method for off-line permission issuing management
CN110135862B (en) * 2019-04-26 2022-11-18 安徽美博智能电器有限公司 Air conditioner user identity identification method and device
CN113691574B (en) * 2020-05-19 2024-10-15 武汉同创元盛科技有限公司 Comprehensive service management platform based on e-commerce transaction and implementation method thereof
CN111831654B (en) * 2020-06-15 2024-10-15 深圳拓邦股份有限公司 Product data acquisition method, device and server

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1617495A (en) * 2004-11-26 2005-05-18 王小矿 Anti-fake technology based on dynamic cipher
CN101009014A (en) * 2007-01-24 2007-08-01 华中科技大学 Secure anti-counterfeiting method and system thereof
CN202102500U (en) * 2011-05-24 2012-01-04 南通纺织职业技术学院 Digital anti-counterfeiting system based on chaotic cipher encryption
WO2012128976A2 (en) * 2011-03-18 2012-09-27 Name Technology, Inc. Systems and methods for anti-counterfeit authentication through communication networks
CN105447710A (en) * 2015-11-12 2016-03-30 东北大学 Commodity authenticity verification system and commodity authenticity verification method based on two-dimensional barcode in e-commerce

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1617495A (en) * 2004-11-26 2005-05-18 王小矿 Anti-fake technology based on dynamic cipher
CN101009014A (en) * 2007-01-24 2007-08-01 华中科技大学 Secure anti-counterfeiting method and system thereof
WO2012128976A2 (en) * 2011-03-18 2012-09-27 Name Technology, Inc. Systems and methods for anti-counterfeit authentication through communication networks
CN202102500U (en) * 2011-05-24 2012-01-04 南通纺织职业技术学院 Digital anti-counterfeiting system based on chaotic cipher encryption
CN105447710A (en) * 2015-11-12 2016-03-30 东北大学 Commodity authenticity verification system and commodity authenticity verification method based on two-dimensional barcode in e-commerce

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
On the security of a certificateless online/offline signcryption for internet of things;shiwenbo, et al;《PEER-TO-PEER NETWORKING AND APPLICATIONS》;20150930;全文 *

Also Published As

Publication number Publication date
CN106372950A (en) 2017-02-01

Similar Documents

Publication Publication Date Title
CN106372950B (en) Anti-counterfeiting authentication method for e-commerce and online shopping commodities
US11853987B2 (en) System and method for secure communication in a retail environment
US11115209B2 (en) Methods and systems for preparing and performing an object authentication
US10089627B2 (en) Cryptographic authentication and identification method using real-time encryption
US20100153273A1 (en) Systems for performing transactions at a point-of-sale terminal using mutating identifiers
Gupta et al. Role of multiple encryption in secure electronic transaction
JP2018513597A (en) Method and apparatus for providing a universal, deterministic reproducible representation of cryptographic key pairs for all SKUs, shipping cartons and items
CN1921395B (en) Method for improving security of network software
CN110941858B (en) Personal network consumption information protection method based on zero-knowledge proof
TWI591553B (en) Systems and methods for mobile devices to trade financial documents
CA2623556C (en) Method for the authenticated transmission of a personalized data set or program to a hardware security module in particular of a franking machine.
US20220084042A1 (en) Method for ensuring the authenticity and validity of item ownership transfer
WO1997031321A1 (en) Electronic commerce system
CN114240547B (en) Steel trade transaction method, system, device and storage medium based on digital signature
CN110098925B (en) Quantum communication service station key negotiation method and system based on asymmetric key pool pair and random number
CN110798321B (en) Article information service method based on block chain
CN112926972B (en) Information processing method based on block chain, block chain system and terminal
CN1798026B (en) Method for enhancing security of electronic signature tool in use for computer
Ashrafi et al. Enabling privacy-preserving e-payment processing
KR101789562B1 (en) Mobile payment method and system
JP2019125882A (en) Electronic commerce system, communication terminal, third party organization server, electronic commerce method, and program
Chen et al. The construction of mobile RFID authentication mechanism and relative ownership transfer protocols for supply chain
CN114565393A (en) Whole industry chain product traceability authentication method and system based on block chain technology
KR20150025140A (en) On-line payment system and method of payment
KR20210156681A (en) Architecture and methods to ensure database information safety

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant