CN106372950B - Anti-counterfeiting authentication method for e-commerce and online shopping commodities - Google Patents
Anti-counterfeiting authentication method for e-commerce and online shopping commodities Download PDFInfo
- Publication number
- CN106372950B CN106372950B CN201610836561.4A CN201610836561A CN106372950B CN 106372950 B CN106372950 B CN 106372950B CN 201610836561 A CN201610836561 A CN 201610836561A CN 106372950 B CN106372950 B CN 106372950B
- Authority
- CN
- China
- Prior art keywords
- terminal
- distributor
- dealer
- identity information
- online shopping
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/018—Certifying business or products
- G06Q30/0185—Product, service or business identity fraud
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Computer Security & Cryptography (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Finance (AREA)
- Marketing (AREA)
- Strategic Management (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- Development Economics (AREA)
- Accounting & Taxation (AREA)
- Economics (AREA)
- Entrepreneurship & Innovation (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention discloses an anti-counterfeiting authentication method for E-commerce and online shopping commodities, which comprises the following steps: s1, the supplier terminal confirms and authorizes the distributor terminal; s2, after the authorization is successful, the dealer terminal sends the encrypted goods feeding application and the dealer identity information to the supplier terminal for goods feeding operation; s3, after the supplier terminal decrypts the information, the identity information of the dealer is verified; if the verification is successful, feeding back the encrypted corresponding commodity code to the dealer terminal; s4, the dealer terminal decrypts the information to obtain the commodity code; s5, after receiving the buyer transaction request, the distributor terminal encrypts the commodity code and the distributor identity information and sends the encrypted commodity code and the encrypted commodity together with the commodity to the buyer; and S6, the buyer verifies the purchased goods and the identity of the distributor through the online shopping platform. The invention avoids the risk of intercepting or tampering the data, so that the security of the anti-counterfeiting verification is higher, and the result of the anti-counterfeiting verification is more objective and real.
Description
Technical Field
The invention relates to an anti-counterfeiting authentication method for E-commerce and online shopping commodities, belonging to the technical field of commodity anti-counterfeiting and shop anti-counterfeiting.
Background
Nowadays, online shopping is fashionable, but when people carry out online shopping, a problem always puzzles everywhere, namely whether goods are true or not; in addition, the supply channel of the goods is also a concern for many consumers, for example, consumers buy overseas products, and often want to buy products directly mailed in a specific country rather than products produced by a factory. Therefore, the anti-counterfeiting verification of the supply channel of the e-commerce (namely, the distributor) is also necessary, and the anti-counterfeiting verification method can play a role in double insurance.
The patent application with the application number of 201110189920.9 discloses a commodity anti-counterfeiting method based on a path mechanism, which effectively realizes the validity judgment of the identities of commodities and sellers, thereby preventing the circulation of counterfeit and shoddy commodities and recirculated commodities. However, the following disadvantages still exist with this technique:
1. the safety in the data transmission process cannot be guaranteed, and the risk of data interception or tampering exists, so that the objectivity and authenticity of the final anti-counterfeiting verification result are to be studied;
2. each step of commodity flow needs to send information confirmation to the anti-counterfeiting authentication center, so that the service pressure of the anti-counterfeiting authentication center is too high;
3. the identification code of the commodity and the ID of the seller are not reasonably protected and are both in a naked state, so that if the ID of a certain seller is stolen by others, the flow direction information of the commodity can be sent to the anti-counterfeiting authentication center by the identity of the seller; if the counterfeiter sells the counterfeit commodity, the legal rights and interests of the seller with the stolen ID are infringed;
4. the generation process of the unique commodity identification code is not explained, the randomness cannot be guaranteed, and the stability of the whole system can be threatened if the generation principle of the commodity identification code is cracked.
Disclosure of Invention
The invention aims to provide an anti-counterfeiting authentication method for e-commerce and online shopping commodities, which can effectively solve the problems in the prior art, particularly the problems that the safety in the data transmission process cannot be ensured, and the risk of data interception or tampering exists, so that the objectivity and the authenticity of the final anti-counterfeiting verification result need to be studied.
In order to solve the technical problems, the invention adopts the following technical scheme: an anti-counterfeiting authentication method for E-commerce and online shopping commodities comprises the following steps:
s1, the supplier terminal confirms and authorizes the distributor terminal;
s2, after the authorization is successful, the dealer terminal sends the encrypted goods feeding application and the dealer identity information to the supplier terminal for goods feeding operation;
s3, after the supplier terminal decrypts the information, the identity information of the dealer is verified; if the verification is successful, feeding back the encrypted corresponding commodity code (with unique identification) to the distributor terminal (and feeding back the corresponding commodity to the distributor);
s4, the dealer terminal decrypts the information to obtain the commodity code;
s5, after receiving the buyer transaction request, the distributor terminal encrypts the commodity code and the distributor identity information and sends the encrypted commodity code and the encrypted commodity together with the commodity to the buyer;
and S6, the buyer verifies the purchased goods and the identity of the distributor through the online shopping platform.
The online shopping platform has the function of CA.
Preferably, step S1 includes:
s11, the supplier terminal, the distributor terminal and the online shopping platform generate respective private keys, and generate corresponding public keys according to the private keys and store the public keys locally;
s12, the supplier terminal sends the supplier public key to the online shopping platform and obtains the online shopping platform public key; the method comprises the steps that a distributor terminal sends a distributor public key to an online shopping platform and obtains the online shopping platform public key;
s13, the online shopping platform sends the supplier public key to the distributor terminal, and simultaneously sends the distributor public key to the supplier terminal;
s14, the supplier terminal confirms and authorizes the distributor terminal.
More preferably, step S14 includes: the vendor terminal generates the dealer identity information, encrypts the dealer identity information by using the vendor public key and the vendor private key and sends the dealer identity information to the vendor terminal, and the vendor terminal decrypts the dealer identity information by using the vendor private key and the vendor public key to obtain the dealer identity information. By generating the dealer ID (namely dealer identity information) by a supplier, the source safety of the dealer ID can be ensured because potential safety hazard does not exist at the source, and if other third-party platforms are used for generating the dealer ID, on one hand, the uniqueness and the randomness of the dealer ID cannot be ensured, and on the other hand, the data storage safety of the third-party platforms cannot be ensured, in addition, the information safety cannot be ensured in the process of transmitting the dealer ID, and man-in-the-middle attack is easy to occur; in addition, the invention uses the private key of the supplier to encrypt the ID of the distributor, ensures that the distributor can not receive the ID of the distributor sent by a counterfeit supplier, uses the public key of the distributor to encrypt, only can the distributor use the private key to decrypt information, ensures the safety of information transmission, and reduces the risk of receiving man-in-the-middle attack.
Preferably, step S2 includes:
and after the authorization is successful, the distributor terminal sends the goods feeding application and the distributor identity information which are encrypted by using the distributor private key and the supplier public key to the supplier terminal for goods feeding operation. In the invention, the dealer private key is used for encrypting information, and because only the dealer holds the dealer private key, the dealer cannot repudiate the goods input information; the public key of the supplier is used for encrypting the information, so that only a true supplier with the private key of the supplier can decrypt the information, the safety of information transmission is ensured, and the risk of man-in-the-middle attacks such as tampering and the like is prevented.
In the above method for authenticating an e-commerce or an online shopping product, step S3 includes: after the supplier terminal decrypts the information, the identity information of the dealer is verified; if the verification is successful, distributing corresponding commodity codes according to the goods feeding information and the dealer identity information (the goods suppliers distribute the commodity codes for each commodity), encrypting the commodity codes by using a private key of the goods suppliers and a public key of the dealers, and feeding back the encrypted commodity codes to the dealer terminal (and feeding back the corresponding commodities to the dealers).
In the above method for authenticating an e-commerce or an online shopping product, step S4 includes: and the distributor terminal decrypts the information by using the distributor private key and the supplier public key to obtain the commodity code.
Data transmission is carried out through the mode, so that the commodity code can be obtained only by a specific dealer, the commodity code is prevented from being intercepted and utilized by bad molecules, and the safety of data is further guaranteed.
Preferably, in step S5, the public key of the online shopping platform is used to encrypt the commodity code and the identity information of the distributor, so that only a specific online shopping platform can obtain the commodity code and the identity information of the distributor, and the anti-counterfeit verification of the commodity is performed, thereby ensuring the security of the source of the verification result.
In the present invention, step S6 includes:
s61, the online shopping platform decrypts the information (by using the private key of the online shopping platform) and then obtains the commodity code and the identity information of the dealer;
s62, the online shopping platform encrypts the commodity code (using the private key of the online shopping platform and the public key of the supplier) and sends the encrypted commodity code to the terminal of the supplier;
s63, the supplier terminal (using the public key of the online shopping platform and the private key of the supplier) decrypts the received information to obtain the commodity code; then matching the commodity code with stored dealer identity information (the commodity code and the dealer identity information are in a many-to-one relationship);
s64, if the commodity code exists and is successfully matched with the dealer identity information, sending (by using the public key of the online shopping platform) the encrypted dealer identity information to the online shopping platform;
s65, after the online shopping platform decrypts the information (by using the private key of the online shopping platform), the dealer identity information fed back is obtained; and then matching the identification information with the identity information of the distributor sent by the buyer, and if the identification information is consistent with the identity information of the distributor sent by the buyer, successfully authenticating the identification and feeding back the identification to the buyer.
In the above method, the supplier terminal can directly obtain the dealer identity information by using the dealer identity information established when the commodity code is distributed and the corresponding table of the commodity code.
In the method, the online shopping platform only sends the commodity code to the supplier terminal for verification instead of sending the commodity code and the identity information of the distributor together, so that the supplier can be prevented from sheltering the distributor, and the authentication result obtained by the online shopping platform is more convincing, real and objective; if the goods code and the dealer identity information are sent to the supplier terminal together for verification, and if the verification fails, but the supplier terminal is hidden from the online shopping platform, the online shopping platform cannot acquire a real verification result. Therefore, the invention only sends the commodity code to the supplier terminal for verification, so that the verification process is more transparent, if the verification is not passed, the supplier terminal cannot be matched with correct distributor identity information, and the correct distributor identity information cannot be returned, so that the authentication result obtained by the online shopping platform is more convincing, and the authentication risk is reduced; in addition, the method can effectively reduce the service pressure of the online shopping platform and improve the working efficiency.
In the above method, the commodity code is obtained by performing AES encryption (i.e., symmetric encryption) using the dealer identification information and the time information of the received order and the large-digit random number as a key (for a normal commodity code), and then performing the MD5 (information digest algorithm 5) operation again on the encryption result. The existing commodity code is public and one kind of commodity code is public and can only be used as an electronic tag of the commodity, but the commodity code is obtained by performing AES encryption on the basis of the existing commodity code by using dealer identity information, time information of order receipt and a large-digit random number as a secret key and then performing MD5 operation on an encryption result, so that the commodity codes of the same commodity are different (one commodity corresponds to one commodity code, namely, each generated commodity code is unique and irregular), the unknown commodity code cannot be guessed according to the known commodity code, the commodity code can be prevented from being maliciously generated by a third party, and the security of anti-counterfeiting authentication is further improved.
Compared with the prior art, the invention has the following beneficial effects:
1. the communication between a supplier terminal and a distributor terminal is realized by utilizing an online shopping platform, the purchased goods and the identity of the distributor are verified, and important information in the transmission process is encrypted (such as a goods code and the identity information of the distributor) based on cryptography, so that the risk of intercepting or tampering data is avoided, the legal rights and interests of the distributor are protected, the security of anti-counterfeiting verification is higher, and the anti-counterfeiting verification result is more objective and real;
2. in the invention, the supplier terminal encrypts the commodity code by using the supplier private key and the distributor public key and feeds the encrypted commodity code back to the distributor terminal, thereby ensuring that only a specific distributor can obtain the commodity code, preventing the commodity code from being intercepted and utilized by bad molecules, and further ensuring the safety of data;
3. the commodity code in the invention is obtained by using the identity information of the dealer, the time information of the received order and the large-digit random number as a key (for a common commodity code) to carry out AES encryption and then carrying out MD5 operation on the encryption result again; the existing commodity code is public and one kind of commodity code is public and can only be used as an electronic tag of the commodity, but the commodity code in the invention is obtained by performing AES encryption on the basis of the existing commodity code by using dealer identity information, time information of receiving an order and a large-digit random number as a secret key and then performing MD5 operation on an encryption result; therefore, the commodity codes of the same commodity are different (one commodity corresponds to one commodity code), are unique and irregular, unknown commodity codes cannot be guessed according to the known commodity codes, the commodity codes can be prevented from being maliciously generated by a third party, and the safety of anti-counterfeiting authentication and the stability of the whole system are further improved;
4. the online shopping platform only sends the commodity code to the terminal of the supplier for verification instead of sending the commodity code and the identity information of the distributor together, thereby preventing the supplier from covering the distributor, leading the authentication result obtained by the online shopping platform to be more convincing, truer and more objective (namely, the commodity anti-counterfeiting authentication in the invention is interactive, the supplier simply returns a result which cannot pass through, and the authentication is successful only when the supplier returns correct identity information of the distributor and the identity information of the distributor sent by a buyer can be matched and consistent on the online shopping platform); meanwhile, the service pressure of the online shopping platform can be effectively reduced, and the working efficiency is improved;
5. the whole system architecture of the invention is under the cryptology system, the conception is strict, compared with other prior art, it is extremely difficult to dig the loophole therein;
6. the invention authenticates the authenticity and the credibility of the dealer while verifying the authenticity of the commodity, and the authentication result can be stored as the credit rating basis of the dealer on the online shopping platform;
7. according to a large amount of data statistics, compared with the prior art, the method for anti-counterfeiting authentication has the advantages that the accuracy can be improved by 30%, and the efficiency can be improved by 20%.
Drawings
FIG. 1 is a schematic diagram of the architecture of a supplier terminal, a distributor terminal and an online shopping platform according to the present invention;
fig. 2 is a work flow diagram of an embodiment of the present invention.
The invention is further described with reference to the following figures and detailed description.
Detailed Description
The embodiment of the invention comprises the following steps: an anti-counterfeiting authentication method for e-commerce and online shopping commodities is shown in fig. 1 and 2 and comprises the following steps:
s1, the supplier terminal confirms and authorizes the distributor terminal;
s2, after the authorization is successful, the dealer terminal sends the encrypted goods feeding application and the dealer identity information to the supplier terminal for goods feeding operation;
s3, after the supplier terminal decrypts the information, the identity information of the dealer is verified; if the verification is successful, feeding back the encrypted corresponding commodity code (with unique identification) to the distributor terminal (and sending the corresponding commodity to the distributor);
s4, the dealer terminal decrypts the information to obtain the commodity code;
s5, after receiving the buyer transaction request, the distributor terminal encrypts the commodity code and the distributor identity information and sends the encrypted commodity code and the encrypted commodity together with the commodity to the buyer;
and S6, the buyer verifies the purchased goods and the identity of the distributor through the online shopping platform.
The step S1 includes:
s11, the supplier terminal, the distributor terminal and the online shopping platform generate respective private keys, and generate corresponding public keys according to the private keys and store the public keys locally;
s12, the supplier terminal sends the supplier public key to the online shopping platform and obtains the online shopping platform public key; the method comprises the steps that a distributor terminal sends a distributor public key to an online shopping platform and obtains the online shopping platform public key;
s13, the online shopping platform sends the supplier public key to the distributor terminal, and simultaneously sends the distributor public key to the supplier terminal;
s14, the supplier terminal confirms and authorizes the distributor terminal.
In order to ensure the security of the source of the dealer identity information, step S14 includes: the vendor terminal generates the dealer identity information, encrypts the dealer identity information by using the vendor public key and the vendor private key and sends the dealer identity information to the vendor terminal, and the vendor terminal decrypts the dealer identity information by using the vendor private key and the vendor public key to obtain the dealer identity information.
The step S2 includes:
and after the authorization is successful, the distributor terminal sends the goods feeding application and the distributor identity information which are encrypted by using the distributor private key and the supplier public key to the supplier terminal for goods feeding operation.
Step S3 includes: after the supplier terminal decrypts the information, the identity information of the dealer is verified; if the verification is successful, distributing corresponding commodity codes according to the goods feeding information and the dealer identity information (the goods suppliers distribute the commodity codes for each commodity), encrypting the commodity codes by using a private key of the goods suppliers and a public key of the dealers, and feeding back the encrypted commodity codes to the dealer terminal (and feeding back the corresponding commodities to the dealers).
Step S4 includes: and the distributor terminal decrypts the information by using the distributor private key and the supplier public key to obtain the commodity code.
In the above method, in step S5, the product code and the dealer identity information are encrypted by using the public key of the online shopping platform.
In order to further improve the authenticity and objectivity of the anti-counterfeit authentication, step S6 includes:
s61, the online shopping platform decrypts the information (by using the private key of the online shopping platform) and then obtains the commodity code and the identity information of the dealer;
s62, the online shopping platform encrypts the commodity code (using the private key of the online shopping platform and the public key of the supplier) and sends the encrypted commodity code to the terminal of the supplier;
s63, the supplier terminal (using the public key of the online shopping platform and the private key of the supplier) decrypts the received information to obtain the commodity code; then matching the commodity code with stored dealer identity information;
s64, if the commodity code exists and is successfully matched with the dealer identity information, sending (by using the public key of the online shopping platform) the encrypted dealer identity information to the online shopping platform;
s65, after the online shopping platform decrypts the information (by using the private key of the online shopping platform), the dealer identity information fed back is obtained; and then matching the identification information with the identity information of the distributor sent by the buyer, and if the identification information is consistent with the identity information of the distributor sent by the buyer, successfully authenticating the identification and feeding back the identification to the buyer.
In the above method, the commodity code is obtained by performing AES encryption using the dealer identification information and the time information of the received order and the large-digit random number as a key (for a normal commodity code), and then performing the MD5 operation again on the encryption result.
In the above method, the random number may be generated by using a software random algorithm, such as python language: randnt (100000,200000) (random numbers) are used (algorithms are used to define the range of random numbers, and the result is pseudo-random, but the method requirement is satisfied, so it is still expressed as "random numbers"). The invention can store the commodity numbers corresponding to the generated random numbers in a supplier database and create a binary search tree for all the random numbers; and inserting a random number into the binary search tree every time a random number is newly generated, discarding the current numerical value and regenerating the random number if the same random number exists (the purpose of using the binary search tree is to prevent the time consumption of traversal for checking uniqueness when the number of random numbers is too large, and the purpose of directly traversing the random numbers in the database to check uniqueness when the number of random numbers is small). Because the random numbers are different, each commodity code generated is different; in addition, because the MD5 is used in the production process of the commodity codes, according to the characteristics of MD5, even if small changes occur in input variables, the reflection in output is large, so that the difference between each generated commodity code is large, a third party cannot guess unknown commodity codes according to known commodity codes, the commodity codes can be prevented from being maliciously generated by the third party, and the safety of anti-counterfeiting authentication and the stability of the whole system are further improved.
The above embodiments describe the method flow of the present invention in detail, which is only a preferred embodiment of the present invention, and the scope of the present invention should not be limited by the above embodiments, and all equivalent embodiments changed or modified according to the concept of the present invention should be within the scope of the present invention without departing from the spirit covered by the description and the drawings.
Claims (5)
1. An anti-counterfeiting authentication method for E-commerce and online shopping commodities is characterized by comprising the following steps:
s1, the supplier terminal confirms and authorizes the distributor terminal; the method specifically comprises the following steps:
s11, the supplier terminal, the distributor terminal and the online shopping platform generate respective private keys, and generate corresponding public keys according to the private keys and store the public keys locally;
s12, the supplier terminal sends the supplier public key to the online shopping platform and obtains the online shopping platform public key; the method comprises the steps that a distributor terminal sends a distributor public key to an online shopping platform and obtains the online shopping platform public key;
s13, the online shopping platform sends the supplier public key to the distributor terminal, and simultaneously sends the distributor public key to the supplier terminal;
s14, the supplier terminal confirms and authorizes the distributor terminal; the vendor terminal generates vendor identity information, encrypts the vendor identity information by using a vendor public key and a vendor private key and sends the vendor identity information to the vendor terminal, and decrypts the vendor identity information by using the vendor private key and the vendor public key to obtain the vendor identity information;
s2, after the authorization is successful, the dealer terminal sends the encrypted goods feeding application and the dealer identity information to the supplier terminal for goods feeding operation;
s3, after the supplier terminal decrypts the information, the identity information of the dealer is verified; if the verification is successful, feeding back the encrypted corresponding commodity code to the dealer terminal; the commodity code is obtained by performing AES encryption by using the dealer identity information, the time information of the received order and the large-digit random number as keys and then performing MD5 operation on the encrypted result again;
s4, the dealer terminal decrypts the information to obtain the commodity code;
s5, after receiving the buyer transaction request, the distributor terminal encrypts the commodity code and the distributor identity information and sends the encrypted commodity code and the encrypted commodity together with the commodity to the buyer;
s6, the buyer verifies the purchased goods and the identity of the distributor through the online shopping platform, which specifically includes:
s61, the online shopping platform decrypts the information to obtain the commodity code and the dealer identity information;
s62, the online shopping platform encrypts the commodity code and sends the encrypted commodity code to a supplier terminal;
s63, the supplier terminal decrypts the received information to obtain the commodity code; then matching the commodity code with stored dealer identity information;
s64, if the commodity code exists and is successfully matched with the dealer identity information, sending the encrypted dealer identity information to the online shopping platform;
s65, after the online shopping platform decrypts the information, the dealer identity information fed back is obtained; and then matching the identification information with the identity information of the distributor sent by the buyer, and if the identification information is consistent with the identity information of the distributor sent by the buyer, successfully authenticating the identification and feeding back the identification to the buyer.
2. The method for authenticating the forgery of the e-commerce and the online shopping goods as claimed in claim 1, wherein step S2 comprises: and after the authorization is successful, the distributor terminal sends the goods feeding application and the distributor identity information which are encrypted by using the distributor private key and the supplier public key to the supplier terminal for goods feeding operation.
3. The method for authenticating the forgery of the e-commerce and the online shopping goods as claimed in claim 1, wherein step S3 comprises: after the supplier terminal decrypts the information, the identity information of the dealer is verified; if the verification is successful, distributing corresponding commodity codes according to the goods feeding information and the dealer identity information, encrypting the commodity codes by using a supplier private key and a dealer public key, and feeding back the encrypted commodity codes to a dealer terminal.
4. The method for authenticating the forgery of the e-commerce and the online shopping goods as claimed in claim 3, wherein step S4 comprises: and the distributor terminal decrypts the information by using the distributor private key and the supplier public key to obtain the commodity code.
5. The method for authenticating the authenticity of e-commerce and online shopping goods as claimed in claim 1, wherein in step S5, the goods code and the dealer identity information are encrypted by using the online shopping platform public key.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610836561.4A CN106372950B (en) | 2016-09-21 | 2016-09-21 | Anti-counterfeiting authentication method for e-commerce and online shopping commodities |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610836561.4A CN106372950B (en) | 2016-09-21 | 2016-09-21 | Anti-counterfeiting authentication method for e-commerce and online shopping commodities |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106372950A CN106372950A (en) | 2017-02-01 |
CN106372950B true CN106372950B (en) | 2020-12-15 |
Family
ID=57897874
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610836561.4A Active CN106372950B (en) | 2016-09-21 | 2016-09-21 | Anti-counterfeiting authentication method for e-commerce and online shopping commodities |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106372950B (en) |
Families Citing this family (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107016552A (en) * | 2017-04-11 | 2017-08-04 | 刘凯斌 | A kind of authentication method of commodity transaction process |
JP6499729B2 (en) | 2017-07-19 | 2019-04-10 | ファナック株式会社 | Application sales management server system |
CN109951427B (en) * | 2017-12-21 | 2021-04-16 | 航天信息股份有限公司 | Product tracing method and system and cloud tracing platform |
CN109902450B (en) * | 2019-03-14 | 2023-01-24 | 成都安恒信息技术有限公司 | Method for off-line permission issuing management |
CN110135862B (en) * | 2019-04-26 | 2022-11-18 | 安徽美博智能电器有限公司 | Air conditioner user identity identification method and device |
CN113691574B (en) * | 2020-05-19 | 2024-10-15 | 武汉同创元盛科技有限公司 | Comprehensive service management platform based on e-commerce transaction and implementation method thereof |
CN111831654B (en) * | 2020-06-15 | 2024-10-15 | 深圳拓邦股份有限公司 | Product data acquisition method, device and server |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1617495A (en) * | 2004-11-26 | 2005-05-18 | 王小矿 | Anti-fake technology based on dynamic cipher |
CN101009014A (en) * | 2007-01-24 | 2007-08-01 | 华中科技大学 | Secure anti-counterfeiting method and system thereof |
CN202102500U (en) * | 2011-05-24 | 2012-01-04 | 南通纺织职业技术学院 | Digital anti-counterfeiting system based on chaotic cipher encryption |
WO2012128976A2 (en) * | 2011-03-18 | 2012-09-27 | Name Technology, Inc. | Systems and methods for anti-counterfeit authentication through communication networks |
CN105447710A (en) * | 2015-11-12 | 2016-03-30 | 东北大学 | Commodity authenticity verification system and commodity authenticity verification method based on two-dimensional barcode in e-commerce |
-
2016
- 2016-09-21 CN CN201610836561.4A patent/CN106372950B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1617495A (en) * | 2004-11-26 | 2005-05-18 | 王小矿 | Anti-fake technology based on dynamic cipher |
CN101009014A (en) * | 2007-01-24 | 2007-08-01 | 华中科技大学 | Secure anti-counterfeiting method and system thereof |
WO2012128976A2 (en) * | 2011-03-18 | 2012-09-27 | Name Technology, Inc. | Systems and methods for anti-counterfeit authentication through communication networks |
CN202102500U (en) * | 2011-05-24 | 2012-01-04 | 南通纺织职业技术学院 | Digital anti-counterfeiting system based on chaotic cipher encryption |
CN105447710A (en) * | 2015-11-12 | 2016-03-30 | 东北大学 | Commodity authenticity verification system and commodity authenticity verification method based on two-dimensional barcode in e-commerce |
Non-Patent Citations (1)
Title |
---|
On the security of a certificateless online/offline signcryption for internet of things;shiwenbo, et al;《PEER-TO-PEER NETWORKING AND APPLICATIONS》;20150930;全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN106372950A (en) | 2017-02-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106372950B (en) | Anti-counterfeiting authentication method for e-commerce and online shopping commodities | |
US11853987B2 (en) | System and method for secure communication in a retail environment | |
US11115209B2 (en) | Methods and systems for preparing and performing an object authentication | |
US10089627B2 (en) | Cryptographic authentication and identification method using real-time encryption | |
US20100153273A1 (en) | Systems for performing transactions at a point-of-sale terminal using mutating identifiers | |
Gupta et al. | Role of multiple encryption in secure electronic transaction | |
JP2018513597A (en) | Method and apparatus for providing a universal, deterministic reproducible representation of cryptographic key pairs for all SKUs, shipping cartons and items | |
CN1921395B (en) | Method for improving security of network software | |
CN110941858B (en) | Personal network consumption information protection method based on zero-knowledge proof | |
TWI591553B (en) | Systems and methods for mobile devices to trade financial documents | |
CA2623556C (en) | Method for the authenticated transmission of a personalized data set or program to a hardware security module in particular of a franking machine. | |
US20220084042A1 (en) | Method for ensuring the authenticity and validity of item ownership transfer | |
WO1997031321A1 (en) | Electronic commerce system | |
CN114240547B (en) | Steel trade transaction method, system, device and storage medium based on digital signature | |
CN110098925B (en) | Quantum communication service station key negotiation method and system based on asymmetric key pool pair and random number | |
CN110798321B (en) | Article information service method based on block chain | |
CN112926972B (en) | Information processing method based on block chain, block chain system and terminal | |
CN1798026B (en) | Method for enhancing security of electronic signature tool in use for computer | |
Ashrafi et al. | Enabling privacy-preserving e-payment processing | |
KR101789562B1 (en) | Mobile payment method and system | |
JP2019125882A (en) | Electronic commerce system, communication terminal, third party organization server, electronic commerce method, and program | |
Chen et al. | The construction of mobile RFID authentication mechanism and relative ownership transfer protocols for supply chain | |
CN114565393A (en) | Whole industry chain product traceability authentication method and system based on block chain technology | |
KR20150025140A (en) | On-line payment system and method of payment | |
KR20210156681A (en) | Architecture and methods to ensure database information safety |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |