CN107730276A - It is a kind of that retrospect is carried out to logistics with encrypted radio-frequency identification technology and packs fidelity method - Google Patents
It is a kind of that retrospect is carried out to logistics with encrypted radio-frequency identification technology and packs fidelity method Download PDFInfo
- Publication number
- CN107730276A CN107730276A CN201710937946.4A CN201710937946A CN107730276A CN 107730276 A CN107730276 A CN 107730276A CN 201710937946 A CN201710937946 A CN 201710937946A CN 107730276 A CN107730276 A CN 107730276A
- Authority
- CN
- China
- Prior art keywords
- logistics
- rfid
- information
- inner cap
- goods
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/067—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
- G06K19/07—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
- G06K19/077—Constructional details, e.g. mounting of circuits in the carrier
- G06K19/07749—Constructional details, e.g. mounting of circuits in the carrier the record carrier being capable of non-contact communication, e.g. constructional details of the antenna of a non-contact smart card
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/018—Certifying business or products
- G06Q30/0185—Product, service or business identity fraud
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Business, Economics & Management (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Development Economics (AREA)
- Microelectronics & Electronic Packaging (AREA)
- General Engineering & Computer Science (AREA)
- Entrepreneurship & Innovation (AREA)
- Accounting & Taxation (AREA)
- Computing Systems (AREA)
- Economics (AREA)
- Finance (AREA)
- Marketing (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Storage Device Security (AREA)
Abstract
Retrospect is carried out to logistics with encrypted radio-frequency identification technology the invention discloses one kind and packs fidelity method, there is provided RFID, the RFID are arranged on superscribing for Bale Cargo, comprised the following steps:Technological service business generates some keys pair, each private key is respectively allocated into consignor and each logistics provider's node, by public key distribution to recipient;Consignor writes goods information in RFID before delivery and is encrypted;Each logistics provider's node logistics information and is encrypted in RFID corresponding to write-in respectively, in addition to mill auxiliaries device destroys to the illegal RFID for opening packaging;After recipient receives parcel, confirm whether parcel has physical damage, rejected if having physical damage, otherwise read the information in RFID, signed for after confirmation is errorless.The present invention realizes the retrospect in logistics progress to goods, is easy to determine the first responsibility of consignor, Added Management is carried out to carrier's liability in logistics.
Description
Technical field
The present invention relates to logistics field, more particularly to one kind to be traced and be packed to logistics with encrypted radio-frequency identification technology
Fidelity method.
Background technology
Buy on behalf, this naughty virtual age of sea, how to go to trustWhen we determine done shopping in the hand of a stranger when
Wait, how we go to believe this kinds of goods true and false.
1st, when product order under individual client is by electronic channel, how to ensure the product of purchase is sent out from original producton location
Goods;
2nd, during Product transport, how to ensure that goods is not opened, article is not changed;
3rd, in carrier, courier's violence transport causes damage of product to occur often;
4th, the problems such as often part is lost in generation transport in transportation, and transit information does not have;
The naughty commodity present situation in sea now:" fake products changes one's identity suddenly into the naughty certified products in sea ", by taking cosmetics as an example:In pass-along deal platform
On, mass purchase big shot cosmetics empty bottle, by forging external express delivery list and buying receipt, forge logistics information and the place of origin
After reaching " overseas gold-plated " purpose, major sales platform is appeared in buy the identity of certified products on behalf.
Prior art is the scanning of each logistics links to this, by informing owner of cargo's logistics information behind face singly identification, and goods
It is central what owner of cargo to be ignorant there occurs.
And existing RFID Fidelity technologies, logistics scanning is not bound with logistics links, RFID is the original of static state of dispatching from the factory
State, at most only knows this batch number date of production when client's verification, centre implement Time Effect without and logistics
With reference to.Secondly, existing RFID Fidelity technologies are very limited comprising information content, pack BOM information without factory, original shippers believe
Breath, carrier's link information, geography information, this just allows fake producer to have much room to remove brush false pain product using RFID anti-counterfeiting technologies,
Verification website is even forged, client has been difficult to protect the rights and interests of oneself by this means.
The content of the invention
Retrospect is carried out to logistics with encrypted radio-frequency identification technology it is an object of the invention to provide one kind and packs fidelity side
Method, the retrospect in logistics progress to goods is realized, be easy to determine the first responsibility of consignor, carrier is blamed in logistics
Appoint and carry out Added Management;The self-destruction to RFID is realized by mill auxiliaries device simultaneously, it is non-to prevent that criminal from being carried out to goods
Normal Kaifeng.
To achieve the above object, the present invention provides following technical scheme:
It is a kind of that retrospect is carried out to logistics with encrypted radio-frequency identification technology and packs fidelity method, there is provided RFID,
The RFID is arranged on superscribing for Bale Cargo, it is characterised in that comprises the following steps:
Step S1:Technological service business generates some keys pair, and each key is to including a public key and a private key, by each private key
Consignor and each logistics provider's node are respectively allocated to, by public key distribution to recipient;
Step S2:Consignor writes goods information before delivery in RFID, passes through allocated private key pair
The goods information is encrypted, and the parcel equipped with goods is transferred into logistics provider;Described superscribe is provided with mill auxiliaries dress
Put, when parcel is opened, the mill auxiliaries device, which destroys RFID, makes its failure;
Step S3:Each logistics provider's node logistics information corresponding to write-in in RFID, and by being divided respectively
The logistics information is encrypted the private key matched somebody with somebody;
Step S4:After recipient receives parcel, first confirm that parcel whether there is physical damage, it is straight if having physical damage
Rejection is connect, goods information and logistics information in RFID are otherwise read by allocated public key, after confirmation is errorless
Signed for.
Further, the mill auxiliaries device includes inner cap, enclosing cover and fixed plug;The upper surface of the inner cap is provided with
Annular cutting groove and RFID, the chip of the RFID are located at the inner side of annular cutting groove, RFID electronics
The antenna of label extends to all portions of inner cap across the annular cutting groove, and the lower surface of the inner cap is provided with fixing tooth, institute
The bottom for stating inner cap is provided with the guiding mechanism of mutual cooperation with fixed plug, only allows fixed fill in relative to inner cap in the first direction
Rotate;The enclosing cover is arranged on the outside of inner cap, and the lower surface of enclosing cover is fixed with cutter, and the cutter is cut positioned at annular
In groove, the first position-limit mechanism and the second position-limit mechanism are provided between the inner cap and enclosing cover, first position-limit mechanism hinders completely
Only inner cap rotates relative to first direction described in outer cover rim, and the second position-limit mechanism part prevents inner cap relative to outer cover rim the
Two directions rotate, and are only applied to inner cap in a second direction or when the power covered outside is more than a threshold value, inner cap is relative to outer cover rim
Second direction rotates;It is at least one in the inner cap and enclosing cover to be filled in the fixation through being threadedly coupled.
Further, the goods information in the RFID and logistics information only corresponding to withing reference to key to
Can modification.
Further, the consignor and each logistics provider's node are also digitally signed while row information encryption is entered.
Further, in the step S3, consignor also increases pipelined video record flow before delivery, and goods is given birth to
Production, the video segment of packaging are recorded.
Further, step S0 is also included before the step S1:Block chain is built, the block chain is used to preserve the goods
Thing information and logistics information.
Further, the block chain has the data check function of the self checking function and multinode of node quasi real time.
Further, the goods information in the step S3 includes production BOM information, time of making the product information, the body of goods
Part code and place of departure GPS location information.
Further, when the logistics information in the step S4 is including connecing ETCD estimated time of commencing discharging, connecing goods address, situation of examining goods, transhipment
Between and connect trader's code.
Compared with prior art, the beneficial effects of the invention are as follows:It is of the invention to be using public key, primary private key, secondary private key
Temporary private realizes the write-in and reading to different content in RFID, and each private key is provided with different access limits,
The information of guarantee comes into the open, and is easy to the retrospect in later stage;In addition, the RFID of the present invention is provided with special mark of unpacking
Position is used to record open case record, avoids that goods midway is opened and situation that client knows nothing to this occurs, and client reads
, can direct rejected goods in the case of having got open case record.Meanwhile the present invention is realized to RFID's by mill auxiliaries device
Self-destruction, prevent criminal from carrying out improper Kaifeng to goods.
Brief description of the drawings
Fig. 1 is the overall flow figure of the present invention.
Fig. 2 is the encryption method and decryption method flow chart of the RFID Verification Systems with authentication function.
Fig. 3 is the block diagram of the configuration of the RFID Verification Systems with authentication function.
Fig. 4 is the sectional view of one embodiment of the invention.
Fig. 5 is the top view of one embodiment of the invention.
Fig. 6 is the guiding mechanism Local map of one embodiment of the invention.
In figure:1- enclosing covers;11- cutters;12- screw threads;The projections of 13- the 3rd;The projections of 14- second;The projections of 15- the 4th;2-
Inner cap;21- inner cap rotary steering teeth;22- screw threads;The projections of 23- first;24- grooves;25- annular cutting grooves;3- fixes plug;31-
Fixed plug rotary steering tooth;32- screw threads;33- screw threads;34- packaging seals;4-RFID electronic tags;41- chips;42- labels;
5- fixing tooths.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete
Site preparation describes, it is clear that described embodiment is only part of the embodiment of the present invention, rather than whole embodiments.It is based on
Embodiment in the present invention, those of ordinary skill in the art are obtained every other under the premise of creative work is not made
Embodiment, belong to the scope of protection of the invention.
Retrospect is carried out to logistics with encrypted radio-frequency identification technology and packs fidelity side referring to Fig. 1, the present invention provides one kind
Method, there is provided RFID, the RFID are arranged on superscribing for Bale Cargo, can also be encapsulated in parcel
It is interior, comprise the following steps:
Step S1:Technological service business generates some keys pair, and each key is to including a public key and a private key, by each private key
Consignor and each logistics provider's node are respectively allocated to, by public key distribution to recipient;
Step S2:Consignor writes goods information before delivery in RFID, and the goods information includes goods
Production BOM information, time of making the product information, identity code and the place of departure GPS location information of thing.And by allocated private key to institute
State goods information to be encrypted, the parcel equipped with goods is transferred to logistics provider;Described superscribe is provided with mill auxiliaries device,
When parcel is opened, the mill auxiliaries device, which destroys RFID, makes its failure;
Step S3:Each logistics provider's node respectively believe in RFID by logistics information corresponding to write-in, the logistics
Breath includes connecing ETCD estimated time of commencing discharging, connecing goods address, situation of examining goods, transhipment time and connect trader's code.And by allocated private key to institute
Logistics information is stated to be encrypted;
Some Block are provided with the present embodiment, in RFID and are respectively used to the consignor and logistics provider
Node writes goods information or logistics information;It has been written into goods information and the logistics information only combination pair of RFID
The key answered is to that could change.The RFID includes AFE(analog front end) and AES modules;The AES modules include control
Device, RAM module and data path;One submodule of structure, the submodule only carry out a quarter in the data path
MixColumns is operated.
Fig. 2 is the encryption method and decryption side for showing the RFID Verification Systems with authentication function according to example embodiment
The figure of method.
With reference to figure 2, the ciphering unit of certificate server includes XOR execution unit 201.XOR execution units 201 for add
Close confirmation data 203 and 0 to 15 execution XOR of output key 205, pass through the position for generating encrypted acknowledgment data 207
Unit.Encrypted acknowledgment data 207 are sent to certification reader together with enter key (InputKey_RN), and are sent to and recognize
The confirmation data 207 and enter key (InputKey_RN) for demonstrate,proving reader are generated as a message and send authenticating tag to.
The decryption unit of authenticating tag includes XOR execution unit 211.XOR execution units 211 relative to output key 215
Position 0 to 15 and encrypted acknowledgment data 213 included in Sec_Auth command messages perform XOR and be used to producing decryption and confirm number
According to unit 217.
In this case, output key 215 is included in Sec_Auth orders by the key processor use of authenticating tag
Input key (InputKey_RN) and the AES key being included in certification memory in message
In addition, the ciphering unit of authenticating tag includes XOR execution unit 221.XOR execution units 221 to encrypt really
The position 16 to 31 for recognizing data 223 and run-out key 225 performs XOR, and performing XOR with position unit generates encrypted acknowledgment data 227. at this
In the case of kind, the confirmation data 223 to be encrypted can be the confirmation data 217 from the decryption unit decryption of authenticating tag.Therefore,
The confirmation data 217 of the re-encrypted of XOR execution units 221 decryption are to generate encrypted acknowledgment data 227.
Encrypted acknowledgment data 227 are made up of Sec_auth response messages, and are sent to certification reader.In addition, send
Confirmation data 227 to certification reader are sent to certificate server.
In addition, the decryption unit of certificate server is true for encrypting including XOR execution unit 231.XOR execution units 231
Recognize data 233 and export the position 16 to 31 of key 235 and perform XOR, bitwise generate the confirmation data 237 of decryption.
Then, certificate server by the confirmation data 203 generated in certificate server with from certification reader receive solution
Close confirmation data 237 are compared, so as to the authenticity of authentication verification label.
Fig. 3 is the block diagram for the configuration for showing the RFID Verification Systems with authentication function according to example embodiment.
As shown in figure 3, RFID Verification Systems include certificate server, certification reader and authenticating tag.
Certificate server includes key database 302, key processor 303, confirms Data Generator 304, ciphering unit 305,
Smart-tag authentication unit 306 and decryption unit 307.
When receiving authentication information from certification reader, key processor 303 determines AES key using authentication information.This
In, authentication information includes electronic product code (EPC) and SecParam.That is, key processor 303 determines and key database
The AES key of SecParam in 302 indexes corresponding AES key.
Then, the input key that key processor 303 is generated at random by using AES key and in certificate server
(InputKey_RN) generation output key.In this case, enter key (InputKey_RN) can be public key.
Confirm that Data Generator 304 generates the confirmation data of predetermined length, and by using ciphering unit 305 to confirming
Data are encrypted.Then, confirm that Data Generator 304 sends input key and encrypted acknowledgment data to certification reader.This
In, ciphering unit 305 performs XOR (XOR) for confirmation data and for the output key of encrypted acknowledgment data.
When receiving the confirmation response data of encryption from certification reader, smart-tag authentication unit 306 is by using decryption
The confirmation response data of encryption is decrypted unit 307, and compares the confirmation response data for confirming data and decryption, with checking
The authenticity of authenticating tag passes through certification reader that is, when confirming that data are identical with the confirmation response data of decryption
Certification authenticating tag, therefore, the authentication verification label of smart-tag authentication unit 305 are real, represent that authenticating tag is by legal life
Production person produces.On the contrary, when the confirmation response data for confirming data and decryption differs, pass through certification reader not certification certification
Label, therefore the authentication verification label of smart-tag authentication unit 305 is insincere, represents that authenticating tag is not generated by the legal producer.
Then, smart-tag authentication unit 305 can send authentication result to certification reader.Here, decryption unit 307 can be to encryption
Confirm that the output key of response data and the confirmation response data for decrypting encryption performs XOR.
Therefore, ciphering unit 305 by using run-out key to input data perform XOR, with decryption unit 307 relative to
XOR, which is performed, using the input data of output input data is encrypted key to decrypt input data identical mode, therefore,
Ciphering unit 305 and decryption unit 307 can have identical structure.
Certification reader can also include authentication information transmission unit 323 and confirmation transmission unit device 325.
Authentication information transmission unit 323 sends a part for authentication information when receiving authentication information from authenticating tag.
Here, authentication information includes protocol integrated test system (PC), Extended Protocol control (XPC), EPC, and a SecParam.
In this case, authentication information transmission unit 323 can be received by authenticating tag and is identified in XPC ST positions
For PC, XPC, EPC and the SecParam sent after " 1 ".
In addition, authentication information transmission unit 323 receives PC, XPC and EPC, and authentication information in authentication information first
Transmitting element 323 determines to be identified as " 1 " in the ST positions XPC of authentication information transmitting element 323.Then, authentication information transmission is single
Member 323 can receive SecParam by using Get_SecParam orders and response message from authenticating tag.
Step S4:After recipient receives parcel, first confirm that parcel whether there is physical damage, it is straight if having physical damage
Rejection is connect, goods information and logistics information in RFID are otherwise read by allocated public key, after confirmation is errorless
Signed for.
With in another embodiment of the present invention, the subsidiary body includes inner cap 2, enclosing cover 1 and fixed plug 3;
The upper surface of the inner cap 2 is provided with annular cutting groove 25 and RFID 4, the RFID electronics
The chip 41 of label is located at the inner side of annular cutting groove 25, and the antenna 42 of RFID prolongs across the annular cutting groove 25
All portions of inner cap 2 are extended, the lower surface of the inner cap 2 is provided with the fixing tooth 5 for fixing and packaging sealing 34, the inner cap 2
Bottom the guiding mechanism of mutual cooperation is provided with fixed plug, only allow fixed plug 3 (suitable in the first direction relative to inner cap 2
Hour hands are counterclockwise, in the present embodiment for clockwise) rotate, Fig. 3 is refer to, the guiding mechanism includes oppositely arranged
Inner cap rotary steering tooth 21 and fixed plug rotary steering tooth 31;In the embodiment, fixed plug rotary steering tooth 31 can be along counterclockwise
Direction is rotated, but when it is rotated clockwise, inner cap rotary steering tooth 21 and fixed plug rotary steering tooth 31 can be blocked mutually.
The enclosing cover 1 is arranged on the outside of inner cap, and the lower surface of enclosing cover 1 is fixed with cutter 11, the cutter 11
In in annular cutting groove 25, when enclosing cover 1 rotates, cutter 11 moves in a circle in annular cutting groove 25, to RFID electronics
The antenna of label is cut, so as to reach the purpose that destruction RFID makes its cisco unity malfunction.The He of inner cap 2
The first position-limit mechanism and the second position-limit mechanism are provided between enclosing cover 1, first position-limit mechanism prevents inner cap 2 relative to outer completely
Lid 1 rotates along the first direction, and the second position-limit mechanism part prevents inner cap 2 relative to the (up time in a second direction of enclosing cover 1
Pin is counterclockwise, in the present embodiment for counterclockwise) rotate, the power for being only applied to inner cap in a second direction or covering outside is big
When a threshold value, inner cap 2 is rotated in a second direction, relative to enclosing cover 1.
In the present embodiment, first position-limit mechanism includes the first projection 23 and the inner circumferential side of enclosing cover 1 of the outer circumferential side of inner cap 2
It is close to the second projection 14 of the first projection 23 setting, the second projection 14 is located in the counter clockwise direction of the first projection 23;In another
In embodiment, the 4th projection 15 is additionally provided with enclosing cover 1, the 4th soil block is located at the first projection 23 clockwise, and it is made
With, realization part restriction similar with the second position-limit mechanism.
In the present embodiment, second position-limit mechanism includes some grooves 24 for being arranged on the outer circumferential side of inner cap 2 and set
The 3rd projection 13 of the groove 24 is caught on the inner circumferential side of enclosing cover 1, the number of the present embodiment groove 24 is 6, is uniformly arranged
In all portions of inner cap 2, in the present embodiment, enclosing cover 1 carries certain elasticity, rotates enclosing cover clockwise or counterclockwise,
When dynamics reaches certain value, the 3rd projection 13 departs from groove 24, realizes the relative rotation of enclosing cover 1 and inner cap 2.In addition, the 3rd
Intersect on the vertical direction of projection 13 with the antenna 42 of RFID, when the 3rd projection 13 goes to the position of antenna 42,
Three projections 13 are extruded antenna, realize secondary destruction.
It is at least one in the inner cap 2 and enclosing cover 1 to be filled in the fixation through being threadedly coupled.Refer to Fig. 1, fixed plug 3 with
Inner cap 2 is connected through screw thread 22 and screw thread 33, and fixed plug 3 is connected with enclosing cover 1 through screw thread 12 and screw thread 32.
The application method of subsidiary body is introduced below, including encapsulation process and deblocking process,
Encapsulation process
Step A1:Inner cap and enclosing cover are combined, using the elasticity of enclosing cover, inner cap is pressed into inner cap, through second
Position-limit mechanism is defined, and prevents it from coming off;
Step A2:Packaging seal alignment fixing tooth is placed in inner cap, the packaging seal includes the sack of packaging bag
Or the tongue that packing case sealing is extended;
Step A3:Fixed plug is screwed in inner cap and enclosing cover until bottom, realizes the encapsulation of packaging seal in the first direction;
Deblocking process
Step B1:Enclosing cover is rotated in a second direction, due to the effect of guiding mechanism, fixed plug is relatively fixed with inner cap;
Step B2:Progressively go into overdrive, when reaching the threshold value, outer cover rim inner cap rotates, while cutter is in annular
Moved in cutting groove;
Step B3:After cutter encounters the antenna of RFID, antenna is cut off.
When recipient is signing for, first check whether packaging bag or packing case have physical damage, if it is intact, then pass through mobile phone
APP or RFID reader read RFID, if reading corresponding information, represent that RFID is intact, its
Packaging was not opened, realized the antiforge function to logistics.
In the present embodiment, consignor also increases before delivery pipelined video record flow, and goods is produced, packed
Video segment is recorded and uploaded, and carrier's liability is defined for the later stage.
In the present embodiment, step S0 is also included before the step S1:Block chain is built, the block chain is used to preserve institute
State the information such as goods information, logistics information, the video segment of streamline and open case record.
The block chain ensures that service request can not be tampered in transmitting procedure by the digital signature of asymmetric encryption,
The consistent storage of the data of each node is ensured by publicity mechanism.The node for passing through node for stored data record
The data check function of self checking function and multinode quasi real time ensures that stored data record can not be changed.
The self checking function of node:Block chain is recorded using block chain structure data storage, the modification meeting of which part record
The integrality of block chain structure is destroyed, can be with rapid verification out and from other nodes by data recovery.Other block chain is each remembered
Account node has the private key of oneself, contains the signature of this node private key in each block head, in block the modification of data all may be used
To be come out by signature check.
The data check function of multinode quasi real time:When the private key of node is stolen, malicious user is modification account book be present
The possibility of all data on chain, block chain provide the data comparison mechanism between multinode quasi real time, can found in time
The situation that some node account book data is tampered.
Privacy of user and transaction privacy
User profile and block chain address are isolation in block chain.From the record storage of each node, it can not get
Associated user profile.User profile is stored with the multilayer protections such as control of authority, access registrar, encryption storage.Transaction is protected
The higher user of close degree is also an option that transaction irrelevance mechanism, and each transaction of same user is mapped to block chain
On upper different address, so as to ensure that the relevance that more transactions of a user can not be obtained on transaction account book.
In the key management solution of block chain, there is provided key safety box and the function of user account commission are protected
Demonstrate,prove the safety of key.Key safety box is encrypted and split to key using user profile and is stored on multiple different nodes, just
Key safety box will not be accessed under normal operation flow, can be by afterwards will to user information authentication after user key is lost
Key is given for change.Account commission is that entrusted account is operated by discretionary account to realize function that account is given for change, block chain institute
There is discretionary account operation separate records on block chain, and the operation to discretionary account has strict frequency limitation and independence
Air control strategy, can strictly control the operational risk of discretionary account.
It is obvious to a person skilled in the art that the invention is not restricted to the details of above-mentioned one exemplary embodiment, Er Qie
In the case of without departing substantially from spirit or essential attributes of the invention, the present invention can be realized in other specific forms.Therefore, no matter
From the point of view of which point, embodiment all should be regarded as exemplary, and be nonrestrictive, the scope of the present invention is by appended power
Profit requires rather than described above limits, it is intended that all in the implication and scope of the equivalency of claim by falling
Change is included in the present invention.Any reference in claim should not be considered as to the involved claim of limitation.
Claims (9)
1. a kind of carry out retrospect to logistics with encrypted radio-frequency identification technology and pack fidelity method, there is provided RFID, institute
State RFID and be arranged on superscribing for Bale Cargo, it is characterised in that comprise the following steps:
Step S1:Technological service business generates some keys pair, and each key is to including a public key and a private key, each private key is distinguished
Distribution is to consignor and each logistics provider's node, by public key distribution to recipient;
Step S2:Consignor writes goods information before delivery in RFID, by allocated private key to described
Goods information is encrypted, and the parcel equipped with goods is transferred into logistics provider;Described superscribe is provided with mill auxiliaries device, when
When parcel is opened, the mill auxiliaries device, which destroys RFID, makes its failure;
Step S3:Each logistics provider's node respectively in RFID write-in corresponding to logistics information, and by be allocated
The logistics information is encrypted private key;
Step S4:After recipient receives parcel, first confirm that parcel whether there is physical damage, directly refused if having physical damage
Receive, goods information and logistics information in RFID are otherwise read by allocated public key, is carried out after confirmation is errorless
Sign for.
2. one kind according to claim 1 carries out retrospect to logistics with encrypted radio-frequency identification technology and packs fidelity method,
Characterized in that, the mill auxiliaries device includes inner cap, enclosing cover and fixed plug;The upper surface of the inner cap is provided with annular and cut
Groove and RFID are cut, the chip of the RFID is located at the inner side of annular cutting groove, RFID
Antenna extends to all portions of inner cap across the annular cutting groove, and the lower surface of the inner cap is provided with fixing tooth, the inner cap
Bottom the guiding mechanism of mutual cooperation is provided with fixed plug, only allow fixed plug being rotated in a first direction relative to inner cap;
The enclosing cover is arranged on the outside of inner cap, and the lower surface of enclosing cover is fixed with cutter, and the cutter is located in annular cutting groove,
The first position-limit mechanism and the second position-limit mechanism are provided between the inner cap and enclosing cover, first position-limit mechanism prevents inner cap completely
Rotated relative to first direction described in outer cover rim, the second position-limit mechanism part prevent inner cap relative to enclosing cover in a second direction
Rotate, be only applied to inner cap in a second direction or when the power covered outside is more than a threshold value, inner cap is relative to outer cover rim second party
To rotation;It is at least one in the inner cap and enclosing cover to be filled in the fixation through being threadedly coupled.
3. one kind according to claim 1 carries out retrospect to logistics with encrypted radio-frequency identification technology and packs fidelity method,
Characterized in that, goods information and logistics information in the RFID only with reference to corresponding to key to can just repair
Change.
4. one kind according to claim 1 carries out retrospect to logistics with encrypted radio-frequency identification technology and packs fidelity method,
Characterized in that, the consignor and each logistics provider's node are also digitally signed while row information encryption is entered.
5. one kind according to claim 1 carries out retrospect to logistics with encrypted radio-frequency identification technology and packs fidelity method,
Characterized in that, in the step S3, consignor also increases pipelined video record flow before delivery, and goods is produced, wrapped
The video segment of dress is recorded.
6. one kind according to claim 1 carries out retrospect to logistics with encrypted radio-frequency identification technology and packs fidelity method,
Characterized in that, also include step S0 before the step S1:Block chain is built, the block chain is used to preserve the goods information
And logistics information.
7. one kind according to claim 6 carries out retrospect to logistics with encrypted radio-frequency identification technology and packs fidelity method,
Characterized in that, the block chain has the data check function of the self checking function and multinode of node quasi real time.
8. one kind according to claim 1 carries out retrospect to logistics with encrypted radio-frequency identification technology and packs fidelity method,
Characterized in that, goods information in the step S3 include the production BOM information of goods, time of making the product information, identity code and
Place of departure GPS location information.
9. one kind according to claim 1 carries out retrospect to logistics with encrypted radio-frequency identification technology and packs fidelity method,
Characterized in that, the logistics information in the step S4 includes connecing ETCD estimated time of commencing discharging, connecing goods address, situation of examining goods, transhipment time and connect
Trader's code.
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710937946.4A CN107730276A (en) | 2017-09-30 | 2017-09-30 | It is a kind of that retrospect is carried out to logistics with encrypted radio-frequency identification technology and packs fidelity method |
JP2020517551A JP7022821B2 (en) | 2017-09-30 | 2018-09-10 | Product traceability Anti-counterfeiting methods and equipment |
PCT/CN2018/104822 WO2019062530A1 (en) | 2017-09-30 | 2018-09-10 | Commodity tracing and anti-counterfeiting method and device |
JP2022017439A JP2022081481A (en) | 2017-09-30 | 2022-02-07 | Product traceability anti-counterfeiting method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710937946.4A CN107730276A (en) | 2017-09-30 | 2017-09-30 | It is a kind of that retrospect is carried out to logistics with encrypted radio-frequency identification technology and packs fidelity method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107730276A true CN107730276A (en) | 2018-02-23 |
Family
ID=61210118
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710937946.4A Pending CN107730276A (en) | 2017-09-30 | 2017-09-30 | It is a kind of that retrospect is carried out to logistics with encrypted radio-frequency identification technology and packs fidelity method |
Country Status (3)
Country | Link |
---|---|
JP (2) | JP7022821B2 (en) |
CN (1) | CN107730276A (en) |
WO (1) | WO2019062530A1 (en) |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108256875A (en) * | 2018-04-09 | 2018-07-06 | 王先笨 | A kind of safe traceability system based on product supply chain |
CN108537558A (en) * | 2018-04-08 | 2018-09-14 | 中国联合网络通信集团有限公司 | Food quality method for tracing in logistics and system |
CN108711063A (en) * | 2018-05-27 | 2018-10-26 | 黄晓峰 | A kind of packaging based on block chain is actively anti-fake and traces upper cable architecture |
WO2019062530A1 (en) * | 2017-09-30 | 2019-04-04 | 浙江鑫泊物流科技有限公司 | Commodity tracing and anti-counterfeiting method and device |
CN110503499A (en) * | 2018-05-17 | 2019-11-26 | 上海富脉实业有限公司 | It is a kind of for confirming the method and system of product information |
CN110533799A (en) * | 2018-11-08 | 2019-12-03 | 朱胜 | A kind of smart lock method for anti-counterfeit based on block chain technology |
CN110598433A (en) * | 2019-09-10 | 2019-12-20 | 腾讯科技(深圳)有限公司 | Anti-counterfeiting information processing method and device based on block chain |
CN110689292A (en) * | 2018-07-06 | 2020-01-14 | 北京信用达互联网信息技术有限公司 | Supply chain management system and method |
CN111080311A (en) * | 2019-10-24 | 2020-04-28 | 广州运通链达金服科技有限公司 | Commodity tracing method and device based on block chain |
WO2020108106A1 (en) * | 2018-11-28 | 2020-06-04 | 阿里巴巴集团控股有限公司 | Blockchain-based resource object allocation method and apparatus and electronic device |
CN111461788A (en) * | 2020-04-03 | 2020-07-28 | 深圳市承和润文化传播股份有限公司 | RFID-based path control method |
CN112070459A (en) * | 2020-08-10 | 2020-12-11 | 国网甘肃省电力公司信息通信公司 | Power grid data responsibility confirmation and source tracing method |
CN112825205A (en) * | 2019-11-19 | 2021-05-21 | 阿里健康信息技术有限公司 | Vending machine, and packaging method and device for vending machine |
Families Citing this family (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110502922B (en) * | 2019-08-13 | 2024-01-16 | 上海域乎信息技术有限公司 | Article circulation link tracing method and device based on block chain and electronic equipment |
CN110876502B (en) * | 2019-10-22 | 2023-04-18 | 厦门理工学院 | Intelligent helmet suitable for express delivery, and express delivery goods checking method and system |
CN111784361B (en) * | 2020-04-02 | 2024-05-24 | 北京京东尚科信息技术有限公司 | Product tracing method, device, system and storage medium |
CN111680330A (en) * | 2020-04-17 | 2020-09-18 | 航天云网科技发展有限责任公司 | Traceability system and traceability method based on block chain data exchange |
CN111539671A (en) * | 2020-04-26 | 2020-08-14 | 上海火卫信息科技有限公司 | Device, system and method for realizing illegal unsealing prevention and process tracing functions in article transportation process |
CN111598696B (en) | 2020-05-19 | 2023-04-07 | 京东科技信息技术有限公司 | Transaction tracing method and device based on block chain |
CN111639729B (en) * | 2020-05-28 | 2023-10-27 | 深圳威尔智能系统有限公司 | RFID and blockchain-based anti-counterfeiting tracing method |
US11991284B1 (en) | 2020-07-02 | 2024-05-21 | Steven Ali Ghabel | Blockchain-based authentication system and method |
TWI748627B (en) * | 2020-09-01 | 2021-12-01 | 林庠序 | Logistics information management system and related computer program product |
CN113362079B (en) * | 2021-05-31 | 2023-07-18 | 中国科学技术大学 | Traceable transaction method based on blockchain, environment and commodity fingerprint |
CN116957611B (en) * | 2023-09-18 | 2023-12-22 | 长沙睿展数据科技有限公司 | Batch goods inspection traceability equipment and system based on RFID |
CN116993373B (en) * | 2023-09-27 | 2023-12-22 | 青岛君盛食品股份有限公司 | Infant food information safety traceability management system |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1728162A (en) * | 2005-07-07 | 2006-02-01 | 复旦大学 | Method for anti false verification based on identification technique in radio frequency, and anti false system |
US20070273578A1 (en) * | 2005-12-30 | 2007-11-29 | Comtech Mobile Datacom Corporation | Mobile satellite communications |
CN202765511U (en) * | 2012-09-13 | 2013-03-06 | 上海天臣防伪技术股份有限公司 | Wireless radio frequency anti-fake bottle cap |
CN106934639A (en) * | 2017-03-08 | 2017-07-07 | 章哲成 | A kind of false proof retroactive method of paper diaper based on RFID and Quick Response Code |
Family Cites Families (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN2734655Y (en) * | 2004-09-07 | 2005-10-19 | 王景琳 | Bidirectional opened bottle |
JP2006124115A (en) * | 2004-10-29 | 2006-05-18 | Sun Corp | Physical distribution management system |
CN201023809Y (en) * | 2007-04-25 | 2008-02-20 | 上海复旦天臣新技术有限公司 | Unscrewing-invalidating false-proof bottle cap with wireless radio frequency identification label |
WO2010119909A1 (en) * | 2009-04-14 | 2010-10-21 | 株式会社 ホロニック | Wireless tag attached article, wireless tag batch reading device, and network article management system |
TWM440942U (en) * | 2012-05-11 | 2012-11-11 | Wander Plastic Co | Anti-counterfeiting bottle cap |
KR101922312B1 (en) * | 2013-10-08 | 2018-11-26 | 도요세이칸 그룹 홀딩스 가부시키가이샤 | External member for container lid |
CN107038594A (en) * | 2017-04-12 | 2017-08-11 | 广州品聚网络科技股份有限公司 | A kind of commodity counterfeit prevention traceability system based on two-dimensional bar code |
CN106971288A (en) * | 2017-05-31 | 2017-07-21 | 无锡井通网络科技有限公司 | A kind of distributed material flow tracking method based on block chain |
CN107730276A (en) * | 2017-09-30 | 2018-02-23 | 浙江鑫泊新能源科技有限公司 | It is a kind of that retrospect is carried out to logistics with encrypted radio-frequency identification technology and packs fidelity method |
-
2017
- 2017-09-30 CN CN201710937946.4A patent/CN107730276A/en active Pending
-
2018
- 2018-09-10 JP JP2020517551A patent/JP7022821B2/en active Active
- 2018-09-10 WO PCT/CN2018/104822 patent/WO2019062530A1/en active Application Filing
-
2022
- 2022-02-07 JP JP2022017439A patent/JP2022081481A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1728162A (en) * | 2005-07-07 | 2006-02-01 | 复旦大学 | Method for anti false verification based on identification technique in radio frequency, and anti false system |
US20070273578A1 (en) * | 2005-12-30 | 2007-11-29 | Comtech Mobile Datacom Corporation | Mobile satellite communications |
CN202765511U (en) * | 2012-09-13 | 2013-03-06 | 上海天臣防伪技术股份有限公司 | Wireless radio frequency anti-fake bottle cap |
CN106934639A (en) * | 2017-03-08 | 2017-07-07 | 章哲成 | A kind of false proof retroactive method of paper diaper based on RFID and Quick Response Code |
Non-Patent Citations (2)
Title |
---|
张洁: "基于RFID技术的智能门禁系统设计", 《中国优秀硕士学位论文全文数据库 信息科技辑》 * |
腾讯FIT、腾讯研究院: "《腾讯区块链方案白皮书》", 30 April 2017 * |
Cited By (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2019062530A1 (en) * | 2017-09-30 | 2019-04-04 | 浙江鑫泊物流科技有限公司 | Commodity tracing and anti-counterfeiting method and device |
CN108537558A (en) * | 2018-04-08 | 2018-09-14 | 中国联合网络通信集团有限公司 | Food quality method for tracing in logistics and system |
CN108256875A (en) * | 2018-04-09 | 2018-07-06 | 王先笨 | A kind of safe traceability system based on product supply chain |
CN110503499B (en) * | 2018-05-17 | 2022-12-06 | 上海富脉实业有限公司 | Method and system for confirming product information |
CN110503499A (en) * | 2018-05-17 | 2019-11-26 | 上海富脉实业有限公司 | It is a kind of for confirming the method and system of product information |
CN108711063A (en) * | 2018-05-27 | 2018-10-26 | 黄晓峰 | A kind of packaging based on block chain is actively anti-fake and traces upper cable architecture |
CN110689292A (en) * | 2018-07-06 | 2020-01-14 | 北京信用达互联网信息技术有限公司 | Supply chain management system and method |
CN110533799A (en) * | 2018-11-08 | 2019-12-03 | 朱胜 | A kind of smart lock method for anti-counterfeit based on block chain technology |
WO2020108106A1 (en) * | 2018-11-28 | 2020-06-04 | 阿里巴巴集团控股有限公司 | Blockchain-based resource object allocation method and apparatus and electronic device |
CN110598433A (en) * | 2019-09-10 | 2019-12-20 | 腾讯科技(深圳)有限公司 | Anti-counterfeiting information processing method and device based on block chain |
CN110598433B (en) * | 2019-09-10 | 2024-03-15 | 腾讯科技(深圳)有限公司 | Block chain-based anti-fake information processing method and device |
CN111080311A (en) * | 2019-10-24 | 2020-04-28 | 广州运通链达金服科技有限公司 | Commodity tracing method and device based on block chain |
CN111080311B (en) * | 2019-10-24 | 2024-04-26 | 广州运通链达金服科技有限公司 | Commodity tracing method and device based on blockchain |
CN112825205A (en) * | 2019-11-19 | 2021-05-21 | 阿里健康信息技术有限公司 | Vending machine, and packaging method and device for vending machine |
CN111461788B (en) * | 2020-04-03 | 2021-09-07 | 深圳市承和润文化传播股份有限公司 | RFID-based path control method |
CN111461788A (en) * | 2020-04-03 | 2020-07-28 | 深圳市承和润文化传播股份有限公司 | RFID-based path control method |
CN112070459A (en) * | 2020-08-10 | 2020-12-11 | 国网甘肃省电力公司信息通信公司 | Power grid data responsibility confirmation and source tracing method |
Also Published As
Publication number | Publication date |
---|---|
JP2020536415A (en) | 2020-12-10 |
JP2022081481A (en) | 2022-05-31 |
WO2019062530A1 (en) | 2019-04-04 |
JP7022821B2 (en) | 2022-02-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107730276A (en) | It is a kind of that retrospect is carried out to logistics with encrypted radio-frequency identification technology and packs fidelity method | |
US9858569B2 (en) | Systems and methods in support of authentication of an item | |
WO2019100872A1 (en) | Method and apparatus for encrypting and decrypting product information | |
JP5139415B2 (en) | Article information acquisition method and apparatus | |
CN107222303A (en) | Digital publishing rights traceability system building method based on block chain and cloud platform | |
US10523644B2 (en) | System and method for secure digital sharing based on an inter-system exchange of a two-tier double encrypted digital information key | |
US20090315686A1 (en) | Rfid tag using encrypted value | |
US20060087407A1 (en) | Master tags | |
US20090096574A1 (en) | Rfid tag using encrypted password protection | |
CN107665414A (en) | A kind of band encrypted radio-frequency identifies active digital wiring board to kinds of goods back-tracing anti-fake method | |
JP2013539302A (en) | Product authentication using end-to-end encryption | |
CN109598520A (en) | A kind of product traceability method and system based on block chain | |
US10803374B2 (en) | Counterfeit prevention | |
CN101527021A (en) | RFID electronic tag reading and writing device used for product truth verification | |
US8181869B2 (en) | Method for customizing customer identifier | |
CN107852323A (en) | Counterfeit prevents | |
CN110503499B (en) | Method and system for confirming product information | |
King et al. | Securing the pharmaceutical supply chain using RFID | |
US9076188B2 (en) | Method and system for shipment authentication | |
US20240056438A1 (en) | Using globally-unique numbers for all secure unique transactions, authentications, verifications, and messaging identities | |
US11270184B2 (en) | Counterfeit prevention | |
CN109815711B (en) | Storage device, data storage method and data reading method | |
CN116596017B (en) | Anti-counterfeiting traceability system and anti-counterfeiting method based on electronic tag | |
King et al. | Applying RFID to secure the pharmaceutical supply chain | |
CN118070348A (en) | Method and system for protecting technical secrets by using intelligent electronic tag |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information |
Address after: 310052 room 504, Yuntai international business centre, 2030 Jianghui Road, Changhe street, Hangzhou, Zhejiang, Binjiang District Applicant after: Zhejiang Xin Bo Logistics Technology Co., Ltd. Address before: 310052 Jianghong Road, Binjiang District, Hangzhou, Zhejiang 752 Applicant before: Zhejiang Xin Bo Amperex Technology Limited |
|
CB02 | Change of applicant information | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180223 |
|
RJ01 | Rejection of invention patent application after publication |