CN107730276A - It is a kind of that retrospect is carried out to logistics with encrypted radio-frequency identification technology and packs fidelity method - Google Patents

It is a kind of that retrospect is carried out to logistics with encrypted radio-frequency identification technology and packs fidelity method Download PDF

Info

Publication number
CN107730276A
CN107730276A CN201710937946.4A CN201710937946A CN107730276A CN 107730276 A CN107730276 A CN 107730276A CN 201710937946 A CN201710937946 A CN 201710937946A CN 107730276 A CN107730276 A CN 107730276A
Authority
CN
China
Prior art keywords
logistics
rfid
information
inner cap
goods
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710937946.4A
Other languages
Chinese (zh)
Inventor
朝鲁
徐坚
张纯滢
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang Xin Bo Amperex Technology Ltd
Original Assignee
Zhejiang Xin Bo Amperex Technology Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang Xin Bo Amperex Technology Ltd filed Critical Zhejiang Xin Bo Amperex Technology Ltd
Priority to CN201710937946.4A priority Critical patent/CN107730276A/en
Publication of CN107730276A publication Critical patent/CN107730276A/en
Priority to JP2020517551A priority patent/JP7022821B2/en
Priority to PCT/CN2018/104822 priority patent/WO2019062530A1/en
Priority to JP2022017439A priority patent/JP2022081481A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/067Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
    • G06K19/07Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
    • G06K19/077Constructional details, e.g. mounting of circuits in the carrier
    • G06K19/07749Constructional details, e.g. mounting of circuits in the carrier the record carrier being capable of non-contact communication, e.g. constructional details of the antenna of a non-contact smart card
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • G06Q30/0185Product, service or business identity fraud
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Business, Economics & Management (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Development Economics (AREA)
  • Microelectronics & Electronic Packaging (AREA)
  • General Engineering & Computer Science (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Accounting & Taxation (AREA)
  • Computing Systems (AREA)
  • Economics (AREA)
  • Finance (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Storage Device Security (AREA)

Abstract

Retrospect is carried out to logistics with encrypted radio-frequency identification technology the invention discloses one kind and packs fidelity method, there is provided RFID, the RFID are arranged on superscribing for Bale Cargo, comprised the following steps:Technological service business generates some keys pair, each private key is respectively allocated into consignor and each logistics provider's node, by public key distribution to recipient;Consignor writes goods information in RFID before delivery and is encrypted;Each logistics provider's node logistics information and is encrypted in RFID corresponding to write-in respectively, in addition to mill auxiliaries device destroys to the illegal RFID for opening packaging;After recipient receives parcel, confirm whether parcel has physical damage, rejected if having physical damage, otherwise read the information in RFID, signed for after confirmation is errorless.The present invention realizes the retrospect in logistics progress to goods, is easy to determine the first responsibility of consignor, Added Management is carried out to carrier's liability in logistics.

Description

It is a kind of that retrospect is carried out to logistics with encrypted radio-frequency identification technology and packs fidelity method
Technical field
The present invention relates to logistics field, more particularly to one kind to be traced and be packed to logistics with encrypted radio-frequency identification technology Fidelity method.
Background technology
Buy on behalf, this naughty virtual age of sea, how to go to trustWhen we determine done shopping in the hand of a stranger when Wait, how we go to believe this kinds of goods true and false.
1st, when product order under individual client is by electronic channel, how to ensure the product of purchase is sent out from original producton location Goods;
2nd, during Product transport, how to ensure that goods is not opened, article is not changed;
3rd, in carrier, courier's violence transport causes damage of product to occur often;
4th, the problems such as often part is lost in generation transport in transportation, and transit information does not have;
The naughty commodity present situation in sea now:" fake products changes one's identity suddenly into the naughty certified products in sea ", by taking cosmetics as an example:In pass-along deal platform On, mass purchase big shot cosmetics empty bottle, by forging external express delivery list and buying receipt, forge logistics information and the place of origin After reaching " overseas gold-plated " purpose, major sales platform is appeared in buy the identity of certified products on behalf.
Prior art is the scanning of each logistics links to this, by informing owner of cargo's logistics information behind face singly identification, and goods It is central what owner of cargo to be ignorant there occurs.
And existing RFID Fidelity technologies, logistics scanning is not bound with logistics links, RFID is the original of static state of dispatching from the factory State, at most only knows this batch number date of production when client's verification, centre implement Time Effect without and logistics With reference to.Secondly, existing RFID Fidelity technologies are very limited comprising information content, pack BOM information without factory, original shippers believe Breath, carrier's link information, geography information, this just allows fake producer to have much room to remove brush false pain product using RFID anti-counterfeiting technologies, Verification website is even forged, client has been difficult to protect the rights and interests of oneself by this means.
The content of the invention
Retrospect is carried out to logistics with encrypted radio-frequency identification technology it is an object of the invention to provide one kind and packs fidelity side Method, the retrospect in logistics progress to goods is realized, be easy to determine the first responsibility of consignor, carrier is blamed in logistics Appoint and carry out Added Management;The self-destruction to RFID is realized by mill auxiliaries device simultaneously, it is non-to prevent that criminal from being carried out to goods Normal Kaifeng.
To achieve the above object, the present invention provides following technical scheme:
It is a kind of that retrospect is carried out to logistics with encrypted radio-frequency identification technology and packs fidelity method, there is provided RFID, The RFID is arranged on superscribing for Bale Cargo, it is characterised in that comprises the following steps:
Step S1:Technological service business generates some keys pair, and each key is to including a public key and a private key, by each private key Consignor and each logistics provider's node are respectively allocated to, by public key distribution to recipient;
Step S2:Consignor writes goods information before delivery in RFID, passes through allocated private key pair The goods information is encrypted, and the parcel equipped with goods is transferred into logistics provider;Described superscribe is provided with mill auxiliaries dress Put, when parcel is opened, the mill auxiliaries device, which destroys RFID, makes its failure;
Step S3:Each logistics provider's node logistics information corresponding to write-in in RFID, and by being divided respectively The logistics information is encrypted the private key matched somebody with somebody;
Step S4:After recipient receives parcel, first confirm that parcel whether there is physical damage, it is straight if having physical damage Rejection is connect, goods information and logistics information in RFID are otherwise read by allocated public key, after confirmation is errorless Signed for.
Further, the mill auxiliaries device includes inner cap, enclosing cover and fixed plug;The upper surface of the inner cap is provided with Annular cutting groove and RFID, the chip of the RFID are located at the inner side of annular cutting groove, RFID electronics The antenna of label extends to all portions of inner cap across the annular cutting groove, and the lower surface of the inner cap is provided with fixing tooth, institute The bottom for stating inner cap is provided with the guiding mechanism of mutual cooperation with fixed plug, only allows fixed fill in relative to inner cap in the first direction Rotate;The enclosing cover is arranged on the outside of inner cap, and the lower surface of enclosing cover is fixed with cutter, and the cutter is cut positioned at annular In groove, the first position-limit mechanism and the second position-limit mechanism are provided between the inner cap and enclosing cover, first position-limit mechanism hinders completely Only inner cap rotates relative to first direction described in outer cover rim, and the second position-limit mechanism part prevents inner cap relative to outer cover rim the Two directions rotate, and are only applied to inner cap in a second direction or when the power covered outside is more than a threshold value, inner cap is relative to outer cover rim Second direction rotates;It is at least one in the inner cap and enclosing cover to be filled in the fixation through being threadedly coupled.
Further, the goods information in the RFID and logistics information only corresponding to withing reference to key to Can modification.
Further, the consignor and each logistics provider's node are also digitally signed while row information encryption is entered.
Further, in the step S3, consignor also increases pipelined video record flow before delivery, and goods is given birth to Production, the video segment of packaging are recorded.
Further, step S0 is also included before the step S1:Block chain is built, the block chain is used to preserve the goods Thing information and logistics information.
Further, the block chain has the data check function of the self checking function and multinode of node quasi real time.
Further, the goods information in the step S3 includes production BOM information, time of making the product information, the body of goods Part code and place of departure GPS location information.
Further, when the logistics information in the step S4 is including connecing ETCD estimated time of commencing discharging, connecing goods address, situation of examining goods, transhipment Between and connect trader's code.
Compared with prior art, the beneficial effects of the invention are as follows:It is of the invention to be using public key, primary private key, secondary private key Temporary private realizes the write-in and reading to different content in RFID, and each private key is provided with different access limits, The information of guarantee comes into the open, and is easy to the retrospect in later stage;In addition, the RFID of the present invention is provided with special mark of unpacking Position is used to record open case record, avoids that goods midway is opened and situation that client knows nothing to this occurs, and client reads , can direct rejected goods in the case of having got open case record.Meanwhile the present invention is realized to RFID's by mill auxiliaries device Self-destruction, prevent criminal from carrying out improper Kaifeng to goods.
Brief description of the drawings
Fig. 1 is the overall flow figure of the present invention.
Fig. 2 is the encryption method and decryption method flow chart of the RFID Verification Systems with authentication function.
Fig. 3 is the block diagram of the configuration of the RFID Verification Systems with authentication function.
Fig. 4 is the sectional view of one embodiment of the invention.
Fig. 5 is the top view of one embodiment of the invention.
Fig. 6 is the guiding mechanism Local map of one embodiment of the invention.
In figure:1- enclosing covers;11- cutters;12- screw threads;The projections of 13- the 3rd;The projections of 14- second;The projections of 15- the 4th;2- Inner cap;21- inner cap rotary steering teeth;22- screw threads;The projections of 23- first;24- grooves;25- annular cutting grooves;3- fixes plug;31- Fixed plug rotary steering tooth;32- screw threads;33- screw threads;34- packaging seals;4-RFID electronic tags;41- chips;42- labels; 5- fixing tooths.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Site preparation describes, it is clear that described embodiment is only part of the embodiment of the present invention, rather than whole embodiments.It is based on Embodiment in the present invention, those of ordinary skill in the art are obtained every other under the premise of creative work is not made Embodiment, belong to the scope of protection of the invention.
Retrospect is carried out to logistics with encrypted radio-frequency identification technology and packs fidelity side referring to Fig. 1, the present invention provides one kind Method, there is provided RFID, the RFID are arranged on superscribing for Bale Cargo, can also be encapsulated in parcel It is interior, comprise the following steps:
Step S1:Technological service business generates some keys pair, and each key is to including a public key and a private key, by each private key Consignor and each logistics provider's node are respectively allocated to, by public key distribution to recipient;
Step S2:Consignor writes goods information before delivery in RFID, and the goods information includes goods Production BOM information, time of making the product information, identity code and the place of departure GPS location information of thing.And by allocated private key to institute State goods information to be encrypted, the parcel equipped with goods is transferred to logistics provider;Described superscribe is provided with mill auxiliaries device, When parcel is opened, the mill auxiliaries device, which destroys RFID, makes its failure;
Step S3:Each logistics provider's node respectively believe in RFID by logistics information corresponding to write-in, the logistics Breath includes connecing ETCD estimated time of commencing discharging, connecing goods address, situation of examining goods, transhipment time and connect trader's code.And by allocated private key to institute Logistics information is stated to be encrypted;
Some Block are provided with the present embodiment, in RFID and are respectively used to the consignor and logistics provider Node writes goods information or logistics information;It has been written into goods information and the logistics information only combination pair of RFID The key answered is to that could change.The RFID includes AFE(analog front end) and AES modules;The AES modules include control Device, RAM module and data path;One submodule of structure, the submodule only carry out a quarter in the data path MixColumns is operated.
Fig. 2 is the encryption method and decryption side for showing the RFID Verification Systems with authentication function according to example embodiment The figure of method.
With reference to figure 2, the ciphering unit of certificate server includes XOR execution unit 201.XOR execution units 201 for add Close confirmation data 203 and 0 to 15 execution XOR of output key 205, pass through the position for generating encrypted acknowledgment data 207 Unit.Encrypted acknowledgment data 207 are sent to certification reader together with enter key (InputKey_RN), and are sent to and recognize The confirmation data 207 and enter key (InputKey_RN) for demonstrate,proving reader are generated as a message and send authenticating tag to.
The decryption unit of authenticating tag includes XOR execution unit 211.XOR execution units 211 relative to output key 215 Position 0 to 15 and encrypted acknowledgment data 213 included in Sec_Auth command messages perform XOR and be used to producing decryption and confirm number According to unit 217.
In this case, output key 215 is included in Sec_Auth orders by the key processor use of authenticating tag Input key (InputKey_RN) and the AES key being included in certification memory in message
In addition, the ciphering unit of authenticating tag includes XOR execution unit 221.XOR execution units 221 to encrypt really The position 16 to 31 for recognizing data 223 and run-out key 225 performs XOR, and performing XOR with position unit generates encrypted acknowledgment data 227. at this In the case of kind, the confirmation data 223 to be encrypted can be the confirmation data 217 from the decryption unit decryption of authenticating tag.Therefore, The confirmation data 217 of the re-encrypted of XOR execution units 221 decryption are to generate encrypted acknowledgment data 227.
Encrypted acknowledgment data 227 are made up of Sec_auth response messages, and are sent to certification reader.In addition, send Confirmation data 227 to certification reader are sent to certificate server.
In addition, the decryption unit of certificate server is true for encrypting including XOR execution unit 231.XOR execution units 231 Recognize data 233 and export the position 16 to 31 of key 235 and perform XOR, bitwise generate the confirmation data 237 of decryption.
Then, certificate server by the confirmation data 203 generated in certificate server with from certification reader receive solution Close confirmation data 237 are compared, so as to the authenticity of authentication verification label.
Fig. 3 is the block diagram for the configuration for showing the RFID Verification Systems with authentication function according to example embodiment.
As shown in figure 3, RFID Verification Systems include certificate server, certification reader and authenticating tag.
Certificate server includes key database 302, key processor 303, confirms Data Generator 304, ciphering unit 305, Smart-tag authentication unit 306 and decryption unit 307.
When receiving authentication information from certification reader, key processor 303 determines AES key using authentication information.This In, authentication information includes electronic product code (EPC) and SecParam.That is, key processor 303 determines and key database The AES key of SecParam in 302 indexes corresponding AES key.
Then, the input key that key processor 303 is generated at random by using AES key and in certificate server (InputKey_RN) generation output key.In this case, enter key (InputKey_RN) can be public key.
Confirm that Data Generator 304 generates the confirmation data of predetermined length, and by using ciphering unit 305 to confirming Data are encrypted.Then, confirm that Data Generator 304 sends input key and encrypted acknowledgment data to certification reader.This In, ciphering unit 305 performs XOR (XOR) for confirmation data and for the output key of encrypted acknowledgment data.
When receiving the confirmation response data of encryption from certification reader, smart-tag authentication unit 306 is by using decryption The confirmation response data of encryption is decrypted unit 307, and compares the confirmation response data for confirming data and decryption, with checking The authenticity of authenticating tag passes through certification reader that is, when confirming that data are identical with the confirmation response data of decryption Certification authenticating tag, therefore, the authentication verification label of smart-tag authentication unit 305 are real, represent that authenticating tag is by legal life Production person produces.On the contrary, when the confirmation response data for confirming data and decryption differs, pass through certification reader not certification certification Label, therefore the authentication verification label of smart-tag authentication unit 305 is insincere, represents that authenticating tag is not generated by the legal producer. Then, smart-tag authentication unit 305 can send authentication result to certification reader.Here, decryption unit 307 can be to encryption Confirm that the output key of response data and the confirmation response data for decrypting encryption performs XOR.
Therefore, ciphering unit 305 by using run-out key to input data perform XOR, with decryption unit 307 relative to XOR, which is performed, using the input data of output input data is encrypted key to decrypt input data identical mode, therefore, Ciphering unit 305 and decryption unit 307 can have identical structure.
Certification reader can also include authentication information transmission unit 323 and confirmation transmission unit device 325.
Authentication information transmission unit 323 sends a part for authentication information when receiving authentication information from authenticating tag. Here, authentication information includes protocol integrated test system (PC), Extended Protocol control (XPC), EPC, and a SecParam.
In this case, authentication information transmission unit 323 can be received by authenticating tag and is identified in XPC ST positions For PC, XPC, EPC and the SecParam sent after " 1 ".
In addition, authentication information transmission unit 323 receives PC, XPC and EPC, and authentication information in authentication information first Transmitting element 323 determines to be identified as " 1 " in the ST positions XPC of authentication information transmitting element 323.Then, authentication information transmission is single Member 323 can receive SecParam by using Get_SecParam orders and response message from authenticating tag.
Step S4:After recipient receives parcel, first confirm that parcel whether there is physical damage, it is straight if having physical damage Rejection is connect, goods information and logistics information in RFID are otherwise read by allocated public key, after confirmation is errorless Signed for.
With in another embodiment of the present invention, the subsidiary body includes inner cap 2, enclosing cover 1 and fixed plug 3;
The upper surface of the inner cap 2 is provided with annular cutting groove 25 and RFID 4, the RFID electronics The chip 41 of label is located at the inner side of annular cutting groove 25, and the antenna 42 of RFID prolongs across the annular cutting groove 25 All portions of inner cap 2 are extended, the lower surface of the inner cap 2 is provided with the fixing tooth 5 for fixing and packaging sealing 34, the inner cap 2 Bottom the guiding mechanism of mutual cooperation is provided with fixed plug, only allow fixed plug 3 (suitable in the first direction relative to inner cap 2 Hour hands are counterclockwise, in the present embodiment for clockwise) rotate, Fig. 3 is refer to, the guiding mechanism includes oppositely arranged Inner cap rotary steering tooth 21 and fixed plug rotary steering tooth 31;In the embodiment, fixed plug rotary steering tooth 31 can be along counterclockwise Direction is rotated, but when it is rotated clockwise, inner cap rotary steering tooth 21 and fixed plug rotary steering tooth 31 can be blocked mutually.
The enclosing cover 1 is arranged on the outside of inner cap, and the lower surface of enclosing cover 1 is fixed with cutter 11, the cutter 11 In in annular cutting groove 25, when enclosing cover 1 rotates, cutter 11 moves in a circle in annular cutting groove 25, to RFID electronics The antenna of label is cut, so as to reach the purpose that destruction RFID makes its cisco unity malfunction.The He of inner cap 2 The first position-limit mechanism and the second position-limit mechanism are provided between enclosing cover 1, first position-limit mechanism prevents inner cap 2 relative to outer completely Lid 1 rotates along the first direction, and the second position-limit mechanism part prevents inner cap 2 relative to the (up time in a second direction of enclosing cover 1 Pin is counterclockwise, in the present embodiment for counterclockwise) rotate, the power for being only applied to inner cap in a second direction or covering outside is big When a threshold value, inner cap 2 is rotated in a second direction, relative to enclosing cover 1.
In the present embodiment, first position-limit mechanism includes the first projection 23 and the inner circumferential side of enclosing cover 1 of the outer circumferential side of inner cap 2 It is close to the second projection 14 of the first projection 23 setting, the second projection 14 is located in the counter clockwise direction of the first projection 23;In another In embodiment, the 4th projection 15 is additionally provided with enclosing cover 1, the 4th soil block is located at the first projection 23 clockwise, and it is made With, realization part restriction similar with the second position-limit mechanism.
In the present embodiment, second position-limit mechanism includes some grooves 24 for being arranged on the outer circumferential side of inner cap 2 and set The 3rd projection 13 of the groove 24 is caught on the inner circumferential side of enclosing cover 1, the number of the present embodiment groove 24 is 6, is uniformly arranged In all portions of inner cap 2, in the present embodiment, enclosing cover 1 carries certain elasticity, rotates enclosing cover clockwise or counterclockwise, When dynamics reaches certain value, the 3rd projection 13 departs from groove 24, realizes the relative rotation of enclosing cover 1 and inner cap 2.In addition, the 3rd Intersect on the vertical direction of projection 13 with the antenna 42 of RFID, when the 3rd projection 13 goes to the position of antenna 42, Three projections 13 are extruded antenna, realize secondary destruction.
It is at least one in the inner cap 2 and enclosing cover 1 to be filled in the fixation through being threadedly coupled.Refer to Fig. 1, fixed plug 3 with Inner cap 2 is connected through screw thread 22 and screw thread 33, and fixed plug 3 is connected with enclosing cover 1 through screw thread 12 and screw thread 32.
The application method of subsidiary body is introduced below, including encapsulation process and deblocking process,
Encapsulation process
Step A1:Inner cap and enclosing cover are combined, using the elasticity of enclosing cover, inner cap is pressed into inner cap, through second Position-limit mechanism is defined, and prevents it from coming off;
Step A2:Packaging seal alignment fixing tooth is placed in inner cap, the packaging seal includes the sack of packaging bag Or the tongue that packing case sealing is extended;
Step A3:Fixed plug is screwed in inner cap and enclosing cover until bottom, realizes the encapsulation of packaging seal in the first direction;
Deblocking process
Step B1:Enclosing cover is rotated in a second direction, due to the effect of guiding mechanism, fixed plug is relatively fixed with inner cap;
Step B2:Progressively go into overdrive, when reaching the threshold value, outer cover rim inner cap rotates, while cutter is in annular Moved in cutting groove;
Step B3:After cutter encounters the antenna of RFID, antenna is cut off.
When recipient is signing for, first check whether packaging bag or packing case have physical damage, if it is intact, then pass through mobile phone APP or RFID reader read RFID, if reading corresponding information, represent that RFID is intact, its Packaging was not opened, realized the antiforge function to logistics.
In the present embodiment, consignor also increases before delivery pipelined video record flow, and goods is produced, packed Video segment is recorded and uploaded, and carrier's liability is defined for the later stage.
In the present embodiment, step S0 is also included before the step S1:Block chain is built, the block chain is used to preserve institute State the information such as goods information, logistics information, the video segment of streamline and open case record.
The block chain ensures that service request can not be tampered in transmitting procedure by the digital signature of asymmetric encryption, The consistent storage of the data of each node is ensured by publicity mechanism.The node for passing through node for stored data record The data check function of self checking function and multinode quasi real time ensures that stored data record can not be changed.
The self checking function of node:Block chain is recorded using block chain structure data storage, the modification meeting of which part record The integrality of block chain structure is destroyed, can be with rapid verification out and from other nodes by data recovery.Other block chain is each remembered Account node has the private key of oneself, contains the signature of this node private key in each block head, in block the modification of data all may be used To be come out by signature check.
The data check function of multinode quasi real time:When the private key of node is stolen, malicious user is modification account book be present The possibility of all data on chain, block chain provide the data comparison mechanism between multinode quasi real time, can found in time The situation that some node account book data is tampered.
Privacy of user and transaction privacy
User profile and block chain address are isolation in block chain.From the record storage of each node, it can not get Associated user profile.User profile is stored with the multilayer protections such as control of authority, access registrar, encryption storage.Transaction is protected The higher user of close degree is also an option that transaction irrelevance mechanism, and each transaction of same user is mapped to block chain On upper different address, so as to ensure that the relevance that more transactions of a user can not be obtained on transaction account book.
In the key management solution of block chain, there is provided key safety box and the function of user account commission are protected Demonstrate,prove the safety of key.Key safety box is encrypted and split to key using user profile and is stored on multiple different nodes, just Key safety box will not be accessed under normal operation flow, can be by afterwards will to user information authentication after user key is lost Key is given for change.Account commission is that entrusted account is operated by discretionary account to realize function that account is given for change, block chain institute There is discretionary account operation separate records on block chain, and the operation to discretionary account has strict frequency limitation and independence Air control strategy, can strictly control the operational risk of discretionary account.
It is obvious to a person skilled in the art that the invention is not restricted to the details of above-mentioned one exemplary embodiment, Er Qie In the case of without departing substantially from spirit or essential attributes of the invention, the present invention can be realized in other specific forms.Therefore, no matter From the point of view of which point, embodiment all should be regarded as exemplary, and be nonrestrictive, the scope of the present invention is by appended power Profit requires rather than described above limits, it is intended that all in the implication and scope of the equivalency of claim by falling Change is included in the present invention.Any reference in claim should not be considered as to the involved claim of limitation.

Claims (9)

1. a kind of carry out retrospect to logistics with encrypted radio-frequency identification technology and pack fidelity method, there is provided RFID, institute State RFID and be arranged on superscribing for Bale Cargo, it is characterised in that comprise the following steps:
Step S1:Technological service business generates some keys pair, and each key is to including a public key and a private key, each private key is distinguished Distribution is to consignor and each logistics provider's node, by public key distribution to recipient;
Step S2:Consignor writes goods information before delivery in RFID, by allocated private key to described Goods information is encrypted, and the parcel equipped with goods is transferred into logistics provider;Described superscribe is provided with mill auxiliaries device, when When parcel is opened, the mill auxiliaries device, which destroys RFID, makes its failure;
Step S3:Each logistics provider's node respectively in RFID write-in corresponding to logistics information, and by be allocated The logistics information is encrypted private key;
Step S4:After recipient receives parcel, first confirm that parcel whether there is physical damage, directly refused if having physical damage Receive, goods information and logistics information in RFID are otherwise read by allocated public key, is carried out after confirmation is errorless Sign for.
2. one kind according to claim 1 carries out retrospect to logistics with encrypted radio-frequency identification technology and packs fidelity method, Characterized in that, the mill auxiliaries device includes inner cap, enclosing cover and fixed plug;The upper surface of the inner cap is provided with annular and cut Groove and RFID are cut, the chip of the RFID is located at the inner side of annular cutting groove, RFID Antenna extends to all portions of inner cap across the annular cutting groove, and the lower surface of the inner cap is provided with fixing tooth, the inner cap Bottom the guiding mechanism of mutual cooperation is provided with fixed plug, only allow fixed plug being rotated in a first direction relative to inner cap; The enclosing cover is arranged on the outside of inner cap, and the lower surface of enclosing cover is fixed with cutter, and the cutter is located in annular cutting groove, The first position-limit mechanism and the second position-limit mechanism are provided between the inner cap and enclosing cover, first position-limit mechanism prevents inner cap completely Rotated relative to first direction described in outer cover rim, the second position-limit mechanism part prevent inner cap relative to enclosing cover in a second direction Rotate, be only applied to inner cap in a second direction or when the power covered outside is more than a threshold value, inner cap is relative to outer cover rim second party To rotation;It is at least one in the inner cap and enclosing cover to be filled in the fixation through being threadedly coupled.
3. one kind according to claim 1 carries out retrospect to logistics with encrypted radio-frequency identification technology and packs fidelity method, Characterized in that, goods information and logistics information in the RFID only with reference to corresponding to key to can just repair Change.
4. one kind according to claim 1 carries out retrospect to logistics with encrypted radio-frequency identification technology and packs fidelity method, Characterized in that, the consignor and each logistics provider's node are also digitally signed while row information encryption is entered.
5. one kind according to claim 1 carries out retrospect to logistics with encrypted radio-frequency identification technology and packs fidelity method, Characterized in that, in the step S3, consignor also increases pipelined video record flow before delivery, and goods is produced, wrapped The video segment of dress is recorded.
6. one kind according to claim 1 carries out retrospect to logistics with encrypted radio-frequency identification technology and packs fidelity method, Characterized in that, also include step S0 before the step S1:Block chain is built, the block chain is used to preserve the goods information And logistics information.
7. one kind according to claim 6 carries out retrospect to logistics with encrypted radio-frequency identification technology and packs fidelity method, Characterized in that, the block chain has the data check function of the self checking function and multinode of node quasi real time.
8. one kind according to claim 1 carries out retrospect to logistics with encrypted radio-frequency identification technology and packs fidelity method, Characterized in that, goods information in the step S3 include the production BOM information of goods, time of making the product information, identity code and Place of departure GPS location information.
9. one kind according to claim 1 carries out retrospect to logistics with encrypted radio-frequency identification technology and packs fidelity method, Characterized in that, the logistics information in the step S4 includes connecing ETCD estimated time of commencing discharging, connecing goods address, situation of examining goods, transhipment time and connect Trader's code.
CN201710937946.4A 2017-09-30 2017-09-30 It is a kind of that retrospect is carried out to logistics with encrypted radio-frequency identification technology and packs fidelity method Pending CN107730276A (en)

Priority Applications (4)

Application Number Priority Date Filing Date Title
CN201710937946.4A CN107730276A (en) 2017-09-30 2017-09-30 It is a kind of that retrospect is carried out to logistics with encrypted radio-frequency identification technology and packs fidelity method
JP2020517551A JP7022821B2 (en) 2017-09-30 2018-09-10 Product traceability Anti-counterfeiting methods and equipment
PCT/CN2018/104822 WO2019062530A1 (en) 2017-09-30 2018-09-10 Commodity tracing and anti-counterfeiting method and device
JP2022017439A JP2022081481A (en) 2017-09-30 2022-02-07 Product traceability anti-counterfeiting method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710937946.4A CN107730276A (en) 2017-09-30 2017-09-30 It is a kind of that retrospect is carried out to logistics with encrypted radio-frequency identification technology and packs fidelity method

Publications (1)

Publication Number Publication Date
CN107730276A true CN107730276A (en) 2018-02-23

Family

ID=61210118

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710937946.4A Pending CN107730276A (en) 2017-09-30 2017-09-30 It is a kind of that retrospect is carried out to logistics with encrypted radio-frequency identification technology and packs fidelity method

Country Status (3)

Country Link
JP (2) JP7022821B2 (en)
CN (1) CN107730276A (en)
WO (1) WO2019062530A1 (en)

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108256875A (en) * 2018-04-09 2018-07-06 王先笨 A kind of safe traceability system based on product supply chain
CN108537558A (en) * 2018-04-08 2018-09-14 中国联合网络通信集团有限公司 Food quality method for tracing in logistics and system
CN108711063A (en) * 2018-05-27 2018-10-26 黄晓峰 A kind of packaging based on block chain is actively anti-fake and traces upper cable architecture
WO2019062530A1 (en) * 2017-09-30 2019-04-04 浙江鑫泊物流科技有限公司 Commodity tracing and anti-counterfeiting method and device
CN110503499A (en) * 2018-05-17 2019-11-26 上海富脉实业有限公司 It is a kind of for confirming the method and system of product information
CN110533799A (en) * 2018-11-08 2019-12-03 朱胜 A kind of smart lock method for anti-counterfeit based on block chain technology
CN110598433A (en) * 2019-09-10 2019-12-20 腾讯科技(深圳)有限公司 Anti-counterfeiting information processing method and device based on block chain
CN110689292A (en) * 2018-07-06 2020-01-14 北京信用达互联网信息技术有限公司 Supply chain management system and method
CN111080311A (en) * 2019-10-24 2020-04-28 广州运通链达金服科技有限公司 Commodity tracing method and device based on block chain
WO2020108106A1 (en) * 2018-11-28 2020-06-04 阿里巴巴集团控股有限公司 Blockchain-based resource object allocation method and apparatus and electronic device
CN111461788A (en) * 2020-04-03 2020-07-28 深圳市承和润文化传播股份有限公司 RFID-based path control method
CN112070459A (en) * 2020-08-10 2020-12-11 国网甘肃省电力公司信息通信公司 Power grid data responsibility confirmation and source tracing method
CN112825205A (en) * 2019-11-19 2021-05-21 阿里健康信息技术有限公司 Vending machine, and packaging method and device for vending machine

Families Citing this family (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110502922B (en) * 2019-08-13 2024-01-16 上海域乎信息技术有限公司 Article circulation link tracing method and device based on block chain and electronic equipment
CN110876502B (en) * 2019-10-22 2023-04-18 厦门理工学院 Intelligent helmet suitable for express delivery, and express delivery goods checking method and system
CN111784361B (en) * 2020-04-02 2024-05-24 北京京东尚科信息技术有限公司 Product tracing method, device, system and storage medium
CN111680330A (en) * 2020-04-17 2020-09-18 航天云网科技发展有限责任公司 Traceability system and traceability method based on block chain data exchange
CN111539671A (en) * 2020-04-26 2020-08-14 上海火卫信息科技有限公司 Device, system and method for realizing illegal unsealing prevention and process tracing functions in article transportation process
CN111598696B (en) 2020-05-19 2023-04-07 京东科技信息技术有限公司 Transaction tracing method and device based on block chain
CN111639729B (en) * 2020-05-28 2023-10-27 深圳威尔智能系统有限公司 RFID and blockchain-based anti-counterfeiting tracing method
US11991284B1 (en) 2020-07-02 2024-05-21 Steven Ali Ghabel Blockchain-based authentication system and method
TWI748627B (en) * 2020-09-01 2021-12-01 林庠序 Logistics information management system and related computer program product
CN113362079B (en) * 2021-05-31 2023-07-18 中国科学技术大学 Traceable transaction method based on blockchain, environment and commodity fingerprint
CN116957611B (en) * 2023-09-18 2023-12-22 长沙睿展数据科技有限公司 Batch goods inspection traceability equipment and system based on RFID
CN116993373B (en) * 2023-09-27 2023-12-22 青岛君盛食品股份有限公司 Infant food information safety traceability management system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1728162A (en) * 2005-07-07 2006-02-01 复旦大学 Method for anti false verification based on identification technique in radio frequency, and anti false system
US20070273578A1 (en) * 2005-12-30 2007-11-29 Comtech Mobile Datacom Corporation Mobile satellite communications
CN202765511U (en) * 2012-09-13 2013-03-06 上海天臣防伪技术股份有限公司 Wireless radio frequency anti-fake bottle cap
CN106934639A (en) * 2017-03-08 2017-07-07 章哲成 A kind of false proof retroactive method of paper diaper based on RFID and Quick Response Code

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN2734655Y (en) * 2004-09-07 2005-10-19 王景琳 Bidirectional opened bottle
JP2006124115A (en) * 2004-10-29 2006-05-18 Sun Corp Physical distribution management system
CN201023809Y (en) * 2007-04-25 2008-02-20 上海复旦天臣新技术有限公司 Unscrewing-invalidating false-proof bottle cap with wireless radio frequency identification label
WO2010119909A1 (en) * 2009-04-14 2010-10-21 株式会社 ホロニック Wireless tag attached article, wireless tag batch reading device, and network article management system
TWM440942U (en) * 2012-05-11 2012-11-11 Wander Plastic Co Anti-counterfeiting bottle cap
KR101922312B1 (en) * 2013-10-08 2018-11-26 도요세이칸 그룹 홀딩스 가부시키가이샤 External member for container lid
CN107038594A (en) * 2017-04-12 2017-08-11 广州品聚网络科技股份有限公司 A kind of commodity counterfeit prevention traceability system based on two-dimensional bar code
CN106971288A (en) * 2017-05-31 2017-07-21 无锡井通网络科技有限公司 A kind of distributed material flow tracking method based on block chain
CN107730276A (en) * 2017-09-30 2018-02-23 浙江鑫泊新能源科技有限公司 It is a kind of that retrospect is carried out to logistics with encrypted radio-frequency identification technology and packs fidelity method

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1728162A (en) * 2005-07-07 2006-02-01 复旦大学 Method for anti false verification based on identification technique in radio frequency, and anti false system
US20070273578A1 (en) * 2005-12-30 2007-11-29 Comtech Mobile Datacom Corporation Mobile satellite communications
CN202765511U (en) * 2012-09-13 2013-03-06 上海天臣防伪技术股份有限公司 Wireless radio frequency anti-fake bottle cap
CN106934639A (en) * 2017-03-08 2017-07-07 章哲成 A kind of false proof retroactive method of paper diaper based on RFID and Quick Response Code

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
张洁: "基于RFID技术的智能门禁系统设计", 《中国优秀硕士学位论文全文数据库 信息科技辑》 *
腾讯FIT、腾讯研究院: "《腾讯区块链方案白皮书》", 30 April 2017 *

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019062530A1 (en) * 2017-09-30 2019-04-04 浙江鑫泊物流科技有限公司 Commodity tracing and anti-counterfeiting method and device
CN108537558A (en) * 2018-04-08 2018-09-14 中国联合网络通信集团有限公司 Food quality method for tracing in logistics and system
CN108256875A (en) * 2018-04-09 2018-07-06 王先笨 A kind of safe traceability system based on product supply chain
CN110503499B (en) * 2018-05-17 2022-12-06 上海富脉实业有限公司 Method and system for confirming product information
CN110503499A (en) * 2018-05-17 2019-11-26 上海富脉实业有限公司 It is a kind of for confirming the method and system of product information
CN108711063A (en) * 2018-05-27 2018-10-26 黄晓峰 A kind of packaging based on block chain is actively anti-fake and traces upper cable architecture
CN110689292A (en) * 2018-07-06 2020-01-14 北京信用达互联网信息技术有限公司 Supply chain management system and method
CN110533799A (en) * 2018-11-08 2019-12-03 朱胜 A kind of smart lock method for anti-counterfeit based on block chain technology
WO2020108106A1 (en) * 2018-11-28 2020-06-04 阿里巴巴集团控股有限公司 Blockchain-based resource object allocation method and apparatus and electronic device
CN110598433A (en) * 2019-09-10 2019-12-20 腾讯科技(深圳)有限公司 Anti-counterfeiting information processing method and device based on block chain
CN110598433B (en) * 2019-09-10 2024-03-15 腾讯科技(深圳)有限公司 Block chain-based anti-fake information processing method and device
CN111080311A (en) * 2019-10-24 2020-04-28 广州运通链达金服科技有限公司 Commodity tracing method and device based on block chain
CN111080311B (en) * 2019-10-24 2024-04-26 广州运通链达金服科技有限公司 Commodity tracing method and device based on blockchain
CN112825205A (en) * 2019-11-19 2021-05-21 阿里健康信息技术有限公司 Vending machine, and packaging method and device for vending machine
CN111461788B (en) * 2020-04-03 2021-09-07 深圳市承和润文化传播股份有限公司 RFID-based path control method
CN111461788A (en) * 2020-04-03 2020-07-28 深圳市承和润文化传播股份有限公司 RFID-based path control method
CN112070459A (en) * 2020-08-10 2020-12-11 国网甘肃省电力公司信息通信公司 Power grid data responsibility confirmation and source tracing method

Also Published As

Publication number Publication date
JP2020536415A (en) 2020-12-10
JP2022081481A (en) 2022-05-31
WO2019062530A1 (en) 2019-04-04
JP7022821B2 (en) 2022-02-18

Similar Documents

Publication Publication Date Title
CN107730276A (en) It is a kind of that retrospect is carried out to logistics with encrypted radio-frequency identification technology and packs fidelity method
US9858569B2 (en) Systems and methods in support of authentication of an item
WO2019100872A1 (en) Method and apparatus for encrypting and decrypting product information
JP5139415B2 (en) Article information acquisition method and apparatus
CN107222303A (en) Digital publishing rights traceability system building method based on block chain and cloud platform
US10523644B2 (en) System and method for secure digital sharing based on an inter-system exchange of a two-tier double encrypted digital information key
US20090315686A1 (en) Rfid tag using encrypted value
US20060087407A1 (en) Master tags
US20090096574A1 (en) Rfid tag using encrypted password protection
CN107665414A (en) A kind of band encrypted radio-frequency identifies active digital wiring board to kinds of goods back-tracing anti-fake method
JP2013539302A (en) Product authentication using end-to-end encryption
CN109598520A (en) A kind of product traceability method and system based on block chain
US10803374B2 (en) Counterfeit prevention
CN101527021A (en) RFID electronic tag reading and writing device used for product truth verification
US8181869B2 (en) Method for customizing customer identifier
CN107852323A (en) Counterfeit prevents
CN110503499B (en) Method and system for confirming product information
King et al. Securing the pharmaceutical supply chain using RFID
US9076188B2 (en) Method and system for shipment authentication
US20240056438A1 (en) Using globally-unique numbers for all secure unique transactions, authentications, verifications, and messaging identities
US11270184B2 (en) Counterfeit prevention
CN109815711B (en) Storage device, data storage method and data reading method
CN116596017B (en) Anti-counterfeiting traceability system and anti-counterfeiting method based on electronic tag
King et al. Applying RFID to secure the pharmaceutical supply chain
CN118070348A (en) Method and system for protecting technical secrets by using intelligent electronic tag

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: 310052 room 504, Yuntai international business centre, 2030 Jianghui Road, Changhe street, Hangzhou, Zhejiang, Binjiang District

Applicant after: Zhejiang Xin Bo Logistics Technology Co., Ltd.

Address before: 310052 Jianghong Road, Binjiang District, Hangzhou, Zhejiang 752

Applicant before: Zhejiang Xin Bo Amperex Technology Limited

CB02 Change of applicant information
RJ01 Rejection of invention patent application after publication

Application publication date: 20180223

RJ01 Rejection of invention patent application after publication