CN108520293A - A kind of product false proof source tracing method, device, server and storage medium - Google Patents

A kind of product false proof source tracing method, device, server and storage medium Download PDF

Info

Publication number
CN108520293A
CN108520293A CN201810288309.3A CN201810288309A CN108520293A CN 108520293 A CN108520293 A CN 108520293A CN 201810288309 A CN201810288309 A CN 201810288309A CN 108520293 A CN108520293 A CN 108520293A
Authority
CN
China
Prior art keywords
product
block
identification code
product identification
source
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810288309.3A
Other languages
Chinese (zh)
Inventor
钱立伟
于振瑞
邢帅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tianjin Zhongxing Cloud Chain Technology Co Ltd
ZHONGXING ENERGY (TIANJIN) Co Ltd
Original Assignee
Tianjin Zhongxing Cloud Chain Technology Co Ltd
ZHONGXING ENERGY (TIANJIN) Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tianjin Zhongxing Cloud Chain Technology Co Ltd, ZHONGXING ENERGY (TIANJIN) Co Ltd filed Critical Tianjin Zhongxing Cloud Chain Technology Co Ltd
Priority to CN201810288309.3A priority Critical patent/CN108520293A/en
Publication of CN108520293A publication Critical patent/CN108520293A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products

Abstract

The embodiment of the invention discloses a kind of product false proof source tracing method, device, server and storage mediums, wherein this method includes:The Transaction Information generated by scanning product identification code is obtained, and is recorded at least one first block;After carrying out Hash encryption to the Transaction Information, the encrypted result of the Transaction Information is recorded at least one second block, and at least one first block and at least one second block are linked in the existing block chain of the product identification code;Block chain after foundation link and the product identification code, carry out the inquiry of the true and false of the product and/or information of tracing to the source.The embodiment of the present invention solves the problems, such as fundamentally prevent counterfeit and shoddy goods using bar code is anti-fake, the inquiry that scanning product identification code carries out authenticity of products and/or information of tracing to the source is realized, the accuracy and practicability of authenticity of products and/or inquiry of tracing to the source are improved.

Description

A kind of product false proof source tracing method, device, server and storage medium
Technical field
The present embodiments relate to field of computer technology more particularly to a kind of product false proof source tracing method, device, services Device and storage medium.
Background technology
With the improvement of living standards, the personation that demand of the consumer to product is continuously increased, and frequently occurs in the market Low-quality goods, not only threatens the life security of consumer, while also causing huge loss to regular manufacturer, therefore, Product false proof, which is traced to the source, is increasingly becoming consumer and manufacturer's focus of attention.
Currently, product in the market usually using bar code as anti-counterfeiting mark, bar code is a string of Arabic numerals, tool There is certain coding rule.Fig. 1 is the bar code of photovoltaic module product, is one formed according to coding rule as shown in the figure String number.Each product corresponds to unique bar code number, can be referred to as the mark of product, and product producer passes through bar code number and interior Portion's management system can inquire the production relevant information of product, to judge the true and false of product.
But for consumers, it is not known that the coding rule of product, therefore bar code is a string of Arabic numbers nothing but Word, without practical significance;For illegal molecule, once obtain the coding rule of bar code, so that it may with light batch duplicating item Shape code, the at low cost and manufacturer that fakes can not distinguish, can not fundamentally prevent counterfeit and shoddy goods in the market.
Invention content
A kind of product false proof source tracing method of present invention offer, device, server and storage medium, to solve to utilize bar code Carry out anti-fake the problem of can not fundamentally preventing counterfeit and shoddy goods, realize scanning product identification code carry out authenticity of products and The inquiry for information of tracing to the source improves authenticity of products and traces to the source the accuracy and practicability of inquiry.
In a first aspect, an embodiment of the present invention provides a kind of product false proof source tracing method, this method includes:
The Transaction Information generated by scanning product identification code is obtained, and is recorded at least one first block;
After carrying out Hash encryption to the Transaction Information, the encrypted result of the Transaction Information is recorded at least one the In two blocks, and at least one first block and at least one second block are linked at the product identification code Have in block chain;
Block chain after foundation link and the product identification code, carry out the true and false of the product and/or information of tracing to the source Inquiry.
Second aspect, the embodiment of the present invention additionally provide a kind of product false proof and trace to the source device, which includes:
Data obtaining module for obtaining the Transaction Information generated by scanning product identification code, and is recorded at least one In a first block;
Encrypted link module, after carrying out Hash encryption to the Transaction Information, by the encryption knot of the Transaction Information Fruit is recorded at least one second block, and at least one first block and at least one second block are linked In the existing block chain of the product identification code;
The true and false is traced to the source enquiry module, for according to after link block chain and the product identification code, carry out the product The true and false and/or information of tracing to the source inquiry.
The third aspect, an embodiment of the present invention provides a kind of servers, including:
One or more processors;
Storage device, for storing one or more programs;
When one or more of programs are executed by one or more of processors so that one or more of processing Device realizes the product false proof source tracing method as described in any embodiment of the present invention.
Fourth aspect, the embodiment of the present invention additionally provide a kind of computer readable storage medium, are stored thereon with computer Program realizes the product false proof source tracing method as described in any embodiment of the present invention when the program is executed by processor.
An embodiment of the present invention provides a kind of product false proof source tracing method, device, server and storage medium, acquisitions to pass through The Transaction Information that product identification code generates is scanned, is recorded at least one first block, and Transaction Information is breathed out It is recorded at least one second block after uncommon encryption, and at least one first block and at least one second block is linked at In the existing block chain of product identification code, according to finally formed block chain and product identification code carry out product the true and false and/or The inquiry for information of tracing to the source.Timely update block chain etc. when using the decentralization of block chain technology, Hash encryption, point-to-point transaction Feature, it is ensured that data it is true and reliable, can not distort, fake and forged commodity can not fundamentally be prevented using bar code is anti-fake by solving The problem of product, realizes the inquiry that scanning product identification code carries out authenticity of products and/or information of tracing to the source, improves authenticity of products And/or the accuracy and practicability for inquiry of tracing to the source.
Description of the drawings
In order to clearly illustrate the technical solution of exemplary embodiment of the present, below to required in description embodiment The attached drawing to be used does a simple introduction.Obviously, the attached drawing introduced is a part of the embodiment of the invention to be described Attached drawing, rather than whole attached drawings without creative efforts, may be used also for those of ordinary skill in the art To obtain other attached drawings according to these attached drawings.
Fig. 1 is photovoltaic module product bar code and coding rule schematic diagram in the prior art;
Fig. 2 is a kind of flow chart for product false proof source tracing method that the embodiment of the present invention one provides;
Fig. 3 be it is provided by Embodiment 2 of the present invention multiple Transaction Information is recorded after formed block chain schematic diagram;
Fig. 4 is a kind of flow chart for product false proof source tracing method that the embodiment of the present invention three provides;
Fig. 5 is the offer of the embodiment of the present invention three to the encryption of critical data progress Hash, record, the signal for forming block chain Figure;
Fig. 6 is that a kind of product false proof that the embodiment of the present invention four provides is traced to the source the flow chart of querying method;
Fig. 7 A-7D are that the product false proof that the embodiment of the present invention four provides is traced to the source query result schematic diagram;
Fig. 8 is that a kind of product false proof that the embodiment of the present invention five provides is traced to the source the structure diagram of device;
Fig. 9 is a kind of structural schematic diagram for server that the embodiment of the present invention six provides.
Specific implementation mode
The present invention is described in further detail with reference to the accompanying drawings and examples.It is understood that this place is retouched The specific embodiment stated is used only for explaining the present invention rather than limitation of the invention.It also should be noted that in order to just Only the parts related to the present invention are shown in description, attached drawing rather than entire infrastructure.
Embodiment one
Fig. 2 is a kind of flow chart for product false proof source tracing method that the embodiment of the present invention one provides, and the present embodiment is applicable In the anti-fake information of tracing to the source to product is inquired the case where, for example, for photovoltaic module product it is anti-fake trace to the source information into The case where row inquiry.This method can trace to the source device or server to execute by product false proof provided in an embodiment of the present invention, should Hardware can be used in device and/or the mode of software is realized, specifically comprises the following steps:
S201 obtains the Transaction Information generated by scanning product identification code, and is recorded at least one first block.
Wherein, product identification code be for identification product when used unique identification, for example, it may be product corresponds to Quick Response Code.Optionally, the identification code of product is corresponding with the block chain of record product relevant information, and block chain can be by multiple areas Block (block for being used to store information) links, and the relevant information of product is record in each block.As product title, Material, test data etc..
Transaction Information refers to product information (such as product quantity, product identification code that both parties generate in process of exchange Deng) and flow to information (such as flow directions of product trading both sides, transaction), the transaction in the present embodiment refers to based on scanning product mark Know code to be traded.It is traced back by product false proof specifically, the process of exchange of both parties can be transaction initiator (i.e. the seller) Product identification code on the dedicated client scan product in source initiates this transaction, is carried out successively to all products of this transaction After product identification code scanning transaction request is sent to transaction acceptance side (i.e. buyer);It traces back again by product false proof transaction acceptance side After the dedicated client in source receives the transaction request, it is traded confirmation, Transaction Information can be uploaded after confirming successfully. It can after transaction acceptance side uploads Transaction Information, directly acquire the Transaction Information, and recorded to obtain product trading information In at least one first block.It optionally,, can be by Transaction Information when recording Transaction Information in order to save memory space In the database, the mapping relations between Transaction Information and the database storage address for storing the Transaction Information are recorded in for storage In first block.
It should be noted that the first block is the memory block for store transaction information, handed over being recorded into the first block When easy information, since the memory space of each block is limited, after a block storage is full, it can continue next Unrecorded Transaction Information is stored in block.
The encrypted result of Transaction Information is recorded at least one second by S202 after carrying out Hash encryption to Transaction Information In block, and at least one first block will be recorded and at least one second block has been linked at product identification code Have in block chain.
Wherein, Hash encryption is a kind of One-way encryption algorithm, and encryption information can be treated by hash algorithm and generates one section Unique cryptographic Hash of specific length cannot but regain confidential information to be added by this cryptographic Hash.Just because of Hash is encrypted Algorithm have this irreversibility and uniqueness, to ensure that be-encrypted data authenticity and can not tamper.Has area Block chain refers to the already present corresponding block chain in the product identification code before this transaction occurs, no matter after the product export Process of exchange whether occurred, can all exist in product identification code and have block chain.If for example, the product did not carry out friendship Easily, existing block chain is critical data (such as product bar code number, bill of materials, the certification recorded in the process of producing product Data) block formed block chain.If the product carried out transaction, it is to record in the process of producing product to have block chain The block chain that the block of Transaction Information is formed before the block and record of critical data.
After the Transaction Information obtained in S201 is encrypted according to Hash Encryption Algorithm, encrypted result is recorded in In at least one second block, Transaction Information will be recorded at least one second block and S201 of recording of encrypted result again at this time At least one first block be linked in the existing block chain of the product identification code.
It should be noted that the second block is memory block for store transaction information encrypted result, to the second block When middle recording of encrypted result, since the memory space of each block is limited, after a block storage is full, it can continue Unrecorded encrypted result is stored in next block.
Optionally, the first block and the second block can be same blocks, can also be different block, that is to say, that extremely Few is that there may be repetition blocks between first block and at least one second block, for example, block is generally divided into area Build and block main body two parts by Transaction Information or can indicate that the mapping relations of Transaction Information are recorded in the block body of block In, Transaction Information encrypted result is recorded in the block head of block.
S203 carries out looking into for the true and false of product and/or information of tracing to the source according to the block chain and product identification code after link It askes.
Wherein, carry out authenticity of products inquiry and/or trace to the source information inquiry when, be based in product identification code and S202 The newest block chain formed after new block has been linked in having block chain.Optionally, it is according to product when the true and false is inquired At least one second block for recording Transaction Information encrypted result in identification code and block chain is inquired;Trace to the source information inquiry when It is to be inquired according at least one first block for recording Transaction Information in product identification code and block chain.
A kind of product false proof source tracing method is present embodiments provided, the transaction letter generated by scanning product identification code is obtained Breath, is recorded at least one first block, and is recorded at least one second after carrying out Hash encryption to Transaction Information In block, and at least one first block and at least one second block are linked in the existing block chain of product identification code, The inquiry of the true and false and/or information of tracing to the source of product is carried out according to finally formed block chain and product identification code.Utilize block chain The decentralization of technology, Hash encryption, point-to-point transaction timely update block chain the features such as, it is ensured that data it is true and reliable, no It can distort, solve the problems, such as fundamentally prevent counterfeit and shoddy goods using bar code is anti-fake, realize scanning product Identification code carries out the inquiry of authenticity of products and/or information of tracing to the source, and improves the accuracy and reality of authenticity of products and/or inquiry of tracing to the source The property used.
Further, initiator's manufacture counterfeit and shoddy goods of merchandising in order to prevent, which scan the initiation transaction of its product identification code, asks It asks, may be used when obtaining the Transaction Information by scanning product identification code generation:Product identification code is obtained to be authenticated;If Certification success is then obtained by scanning the product information and flow to information that product identification code generates.
Wherein, all product identification codes scanned when initiating transaction request to transaction initiator are verified, specifically Verification process can be stored in number when the corresponding all product identification codes of this transaction request and regular manufacturer are produced product It is compared verification according to the product identification code in library, if the corresponding all product identification codes of transaction request can look in the database To matching product identification code, then certification success, you can to obtain the Transaction Information of transaction acceptance side's upload.
Further, dealer carries out the imitation of counterfeit and shoddy goods after producer has purchased some products in order to prevent, It is sold again after genuine products from counterfeit products is mixed.After S201 is obtained by scanning the Transaction Information that product identification code generates, also wrap It includes:Transaction Information is sent to whole users in network in the form of the whole network is broadcasted.
Wherein, the whole use Transaction Information each time of both parties being all sent in the form of the whole network is broadcasted in network Family, optionally, user's dedicated client that can be traced to the source by product false proof receive the Transaction Information, specifically, user can be with It traces to the source in product false proof and the name of product of oneself concern is set in dedicated client, when such product is there are when process of exchange, Client will obtain the Transaction Information of the whole network broadcast transmission automatically so that all users can recognize the every of concern product Transaction Information, when oneself is bought it may determine that going out with the presence or absence of counterfeit and shoddy goods.For example, client 1 is wide from the whole network The Transaction Information for broadcasting middle acquisition client 2 and manufacturer is to have purchased 10 products, and in the transaction request that client 2 initiates to client 1 Including 20 products, client 1, which can determine, at this time wherein there will necessarily be counterfeit and shoddy goods, therefore, can directly refuse this Secondary transaction request.
Embodiment two
The present embodiment provides a kind of preferred embodiment on the basis of the various embodiments described above, is suitable for occurring repeatedly handing over When easy process, the case where multiple Transaction Information is recorded at least one block, and forms block chain.
In the present embodiment, it is assumed that have a collection of product, which has N casees, has M product, the transaction of this batch of product in every case Process is that product has first been sold to dealer A by manufacturer J, and dealer A is changed hands again is sold to dealer B by product, and dealer B finally will Product has been sold to client C.
As shown in figure 3, the first time transaction of this batch of product is the transaction of manufacturer J and dealer A, specific process of exchange is Manufacturer J imports product data by scanning the identification code of each product and initiates transaction request, after dealer A confirms transaction i.e. on Transaction Information is passed, the Transaction Information by this transaction is recorded in the first block 2 at this time, wherein the particular content of record is such as Shown in sash in Fig. 3 under the first block 2, include the product information of this batch of product:In the case number (CN) 1 of product to N, every case product The identification code 1 of each product arrives M;And this transaction flow to information:Manufacturer J to dealer A.When the transaction letter in block 2 After the completion of breath record, the first block 2 is linked at behind block 1, wherein block 1 is existing block chain in product identification code In the last one block.
Dealer A has carried out second with dealer B and has merchandised after having purchased this batch of product, specific process of exchange It is that dealer A imports product data initiation transaction request by scanning the identification code of each product, after dealer B confirms transaction, Dealer A and dealer B are ganged up and are faked in order to prevent, can be allowed when dealer A and dealer B carry out this transaction The seller before this batch of product, i.e. manufacturer J upload Transaction Information again after being reaffirmed, at this time by the transaction of this transaction Information is recorded in the first block 3, wherein the particular content of record is as shown in the sash under the first block 3 in Fig. 3, this batch The product information of product in the first block 2 as recorded;And that merchandises flows to information in manufacturer J to the basis of dealer A On be added to the process of dealer A to dealer B.After the completion of the Transaction Information record in the first block 3, by the first block 3 It is linked at behind the first block 2.
This batch of product has been sold to client C and has carried out third time transaction by last dealer B, and specific process of exchange is to sell Quotient B imports product data initiation transaction request by scanning the identification code of each product, after dealer C confirms transaction, in order to anti- Only dealer B and client C are ganged up and are faked, and can allow this batch of product when dealer B and dealer C carry out this transaction The seller before, i.e. manufacturer J and dealer A upload Transaction Information again after reaffirming, at this time by the friendship of this transaction Easy information is recorded in the first block 4, wherein the particular content of record as shown in the sash under the first block 4 in Fig. 3, this The product information of product is criticized as recorded in the first block 3;And the information that flows to merchandised adds on the basis of the first block 3 Add dealer B to the process of client C.After the completion of the Transaction Information record in the first block 4, the first block 4 is linked at Behind first block 3.
In the present embodiment when multiple process of exchange occurs for same a collection of product, process of exchange needs current both parties and it After preceding counterparty confirms, multiple Transaction Information is recorded at least one first block, and form block chain, is made Product point-to-point Transaction Information each time can clearly be inquired by obtaining user, improve authenticity of products and/or inquiry of tracing to the source Accuracy and practicability.
Embodiment three
Fig. 4 is a kind of flow chart for product false proof source tracing method that the embodiment of the present invention three provides, and Fig. 5 is that the present invention is implemented What example three provided carries out Hash encryption, record, the schematic diagram for forming block chain to critical data, and the present embodiment is in above-mentioned each implementation On the basis of example, further schematically illustrate to the product false proof source tracing method progress of Fig. 4 in conjunction with Fig. 5, this method includes:
S401, the critical data of extraction product in process of production.
Wherein, the critical data of product in process of production refers to the recording product information that product generates in process of production And the related data of performance, such as when product is photovoltaic module, the critical data of the product can be bar code number, bill of materials (Bill of Material, BOM), certification, the IV test datas test data of electric current and power (voltage), EL test pictures (photovoltaic products internal flaw monitoring photo), environmental data, the related datas such as product hierarchy.
Optionally, the method for extracting critical data can be the enterprise system (System in enterprises Applications and Products, SAP) manage system or Enterprise Resources Plan (Enterprise Resource Planning, ERP) extraction of critical data is carried out in management system.
The encrypted result of critical data is recorded at least one third by S402 after carrying out Hash encryption to critical data In block, and generate block chain.
Wherein, critical data is encrypted is also to encrypt to generate Merkel tree step by step with Hash Encryption Algorithm (Merkle Tree) ensure that the authenticity of product data can not distort well due to the encrypted irreversibility of Hash and uniqueness Property.Specific ciphering process is as shown in Figure 5:First to the critical data EL test pictures of S401 extractions, certification, environmental data, item Code number, bill of materials, IV test datas, product hierarchy and date of manufacture are arranged by hash algorithm for each critical data Unique cryptographic Hash (cryptographic Hash 01 in such as Fig. 5 arrives cryptographic Hash 08) of one specific length, then set by Hash Encryption Algorithm pair The cryptographic Hash two-by-two set carries out Hash encryption, obtains cryptographic Hash 11 and arrives cryptographic Hash 14, then again arrives encrypted cryptographic Hash 11 Cryptographic Hash 14 generates Merkel tree after cryptographic Hash carries out secondary encryption two-by-two, be respectively stored in the Tx_Root of third block 1 with And in the Tx_Root of third block 2.It should be noted that Tx_Root is to store depositing for encryption key data result in block Storage area domain.
Further, since the block for being stored with critical data will be linked into block chain, i.e. third block 1 and third block 2 carry out uplink operation, and third block 2 carries out uplink operation to form block chain with third block 3.In order in block chain The content of middle quick look-up record includes the encryption recorded in previous block in the block chain of generation in the latter block As a result.
Illustratively, it as shown in figure 5, including not only the memory blocks Tx_Root of storage encrypted result in each block, also wraps Previous block data memory block (for storing encrypted result in previous block), current block timestamp memory block is included (to be used for Current block is capped timestamp after being formed to current block) and current block number memory block.
It should be noted that third block is memory block for storing encryption key data result, to third block When middle recording of encrypted result, since the memory space of each block is limited, after a block storage is full, it can continue under Unrecorded encrypted result is stored in one block.For example, the memory of a block as shown in Figure 5 only has 2M, it can not be in third Encryption and the recording process of all critical datas are completed at the same time in block 1, therefore can be by all areas critical data Fen Liangge Record is encrypted in block (i.e. third block 1 and third block 2).
S403 generates product identification code according to the encrypted result in block chain.
Since product identification code is the unique identification of product for identification, it is possible to pass through the Hash obtained in S402 Encrypted result generates product identification code, irreversible because Hash encrypted result is unique, so the product identification code generated It is also unique, is not easy to be copied.
Specifically, it can first generate an identification code to generate the process of product identification code, it is arranged one accordingly for it Location, by the Hash encrypted result of critical data in block chain and the necessary information for generating product identification code (such as scanning identification code The information that display interface needs afterwards) it is stored in class, after the address of class and the identification code address are associated, the identification code is It is the identification code of the product.It should be noted that the product identification code generated is changeless, but with product trading The corresponding block chain of several increase product identification codes is updated constantly.
Optionally, the product identification code of generation can be printed and is affixed on product, convenient for both parties by scanning the product Identification code completes process of exchange, and user carries out authenticity of products by scanning the product identification code and traces to the source information inquiry.
S404 obtains the Transaction Information generated by scanning product identification code, and is recorded at least one first block.
The encrypted result of Transaction Information is recorded at least one second by S405 after carrying out Hash encryption to Transaction Information In block, and at least one first block will be recorded and at least one second block has been linked at product identification code Have in block chain.
Wherein, critical data is encrypted in the encryption of Transaction Information, record, the process for forming block chain and S402, Record, the process for forming block chain are the same, are repeated no more.
S406 carries out looking into for the true and false of product and/or information of tracing to the source according to the block chain and product identification code after link It askes.
Optionally, it is to record encryption key data result at least according in product identification code, block chain when the true and false is inquired One third block and at least one second block for recording Transaction Information encrypted result are inquired;Trace to the source information inquiry when It is to be inquired according at least one first block for recording Transaction Information in product identification code and block chain.
It should be noted that the first block, the second block and third block can be same blocks, can also be different Block, that is to say, that being between at least one first block, at least one second block and at least one third block can be with In the presence of repetition block.For example, after having recorded Transaction Information encrypted result in some block, also larger remaining storage is empty Between, space waste, can continue the encrypted result for recording critical data in the block residual memory space in order to prevent, this When, which is both the second block and third block.
Product false proof source tracing method provided in this embodiment is carried out by obtaining the critical data of product in process of production Hash encryption after being recorded in third block, generates block chain and product identification code;Product trading information and Hash are encrypted again Transaction Information afterwards is separately recorded in by product identification code in the first block and the second block, and will be recorded in process of exchange Block, which is linked at product identification code, to be had in block chain, and the true of product is carried out according to finally formed block chain and product identification code Pseudo- and/or information of tracing to the source inquiry.It encrypts to form Merkel tree, point-to-point friendship using the decentralization of block chain technology, Hash Easily timely update block chain the features such as, it is ensured that data it is true and reliable, can not distort, solve using bar code is anti-fake can not be from The problem of fundamentally preventing counterfeit and shoddy goods realizes scanning product identification code and carries out authenticity of products and/or information of tracing to the source Inquiry, improves the accuracy and practicability of authenticity of products and/or inquiry of tracing to the source.
Example IV
Fig. 6 is that a kind of product false proof that provides of the embodiment of the present invention four is traced to the source the flow chart of querying method, and the present embodiment exists On the basis of the various embodiments described above, a kind of preferred embodiment that product false proof is traced to the source is provided, with reference to the product of Fig. 7 A-7D Anti-fake query result schematic diagram of tracing to the source is illustrated the product false proof source tracing method of Fig. 6, and this method includes:
S601, the critical data of extraction product in process of production.
The encrypted result of critical data is recorded at least one third by S602 after carrying out Hash encryption to critical data In block, and generate block chain.
S603 generates product identification code according to the encrypted result in block chain.
S604 obtains the Transaction Information generated by scanning product identification code, and is recorded at least one first block.
Transaction Information is sent to whole users in network by S605 in the form of the whole network is broadcasted.
The encrypted result of Transaction Information is recorded at least one second by S606 after carrying out Hash encryption to Transaction Information In block, and at least one first block will be recorded and at least one second block is linked at the existing block chain of product identification code In.
S607 obtains the corresponding product identification code of true and false inquiry instruction, to product mark in response to authenticity of products inquiry instruction The block chain data for knowing code carry out Hash verification, to judge the true and false of product;And/or it in response to product traceability inquiry instruction, obtains The corresponding product identification code of inquiry instruction of tracing to the source is taken, the Transaction Information of record is searched in the block chain of product identification code, with aobvious Show the information of tracing to the source of product.
Wherein, it is special can be that user is traced to the source by product false proof for authenticity of products inquiry instruction and product traceability inquiry instruction The instruction that sends out of client.For example, it may be user will be inquired by product false proof dedicated client scan of tracing to the source Product identification code, click the instruction that the related key of true-false inquiring and/or information of tracing to the source is sent out.
Specifically, when receiving the authenticity of products inquiry instruction that user sends out, the corresponding product of the inquiry instruction is obtained Identification code (the namely identification code of the product to be inquired of user) finds its corresponding block chain, from this by the identification code At least one second block and record encryption key data knot of record Transaction Information Hash encrypted result are searched in block chain At least one third block of fruit, will be in Transaction Information Hash encrypted result therein and encryption key data result and database The correct Transaction Information Hash encrypted result of the product of storage is made whether consistent comparison with encryption key data result, if Unanimously, then illustrate that the product is true, if inconsistent, illustrate that the product is false, and show query result.
When receiving the product traceability inquiry instruction that user sends out, the corresponding product identification code of the inquiry instruction is obtained (the namely identification code of the product to be inquired of user) finds its corresponding block chain, from the block chain by the identification code Middle at least one first block for searching record Transaction Information, the Transaction Information recorded in block is shown.
Optionally, user can only inquire the true and false information of product, can also only to product trace to the source information into Row inquiry can also simultaneously inquire the true and false information of product and information of tracing to the source.
Illustratively, as shown in Figure 7 A, user is traced to the source dedicated client scan product by mobile terminal product false proof After identification code (such as Quick Response Code), the true and false checking information of the product will be shown in the terminal, and Fig. 7 A are shown if false product The block chain verification result figure on middle the right;The block chain verification result figure that the left side in Fig. 7 A is shown if certified products, wherein containing Some essential informations of the product, such as bar code number, model, grade, size and the product can also be carried out below the interface The inquiry of specific data.
Specifically, as shown in Figure 7 B, user clicks the authentication button below the block chain verification interface of certified products, into Fig. 7 B In authentication interface, user by click the certification attachment specifically to be checked (TUV certifications or UL certifications) may occur in which in Fig. 7 B Certification credential interface, show the certification certificate to be checked of user.As seen in figure 7 c, user clicks the block chain verification of certified products BOM buttons below interface show the specific bill of materials of the product into the interfaces BOM in Fig. 7 C.As illustrated in fig. 7d, it uses The testing button below the block chain verification interface of certified products is clicked at family, and the test interface into Fig. 7 D shows the EL of the product Test pictures and the corresponding test data of the picture, such as insulation pressure resistance, grade, maximum power (Pmax).User clicks just Client's button (button for sending out product traceability inquiry instruction) below the block chain verification interface of product enters in Fig. 7 D at this time Customer interface, show the information for the both parties that the All Activity of the product is related to.
Product false proof source tracing method provided in this embodiment is carried out by obtaining the critical data of product in process of production Hash encryption after being recorded in third block, generates block chain and product identification code;Product trading information and Hash are encrypted again Transaction Information afterwards is separately recorded in by product identification code in the first block and the second block, and will be recorded in process of exchange Block, which is linked at product identification code, to be had in block chain, and the true of product is carried out according to finally formed block chain and product identification code Pseudo- and/or information of tracing to the source inquiry.It encrypts to form Merkel tree, point-to-point friendship using the decentralization of block chain technology, Hash Easily timely update block chain the features such as, it is ensured that data it is true and reliable, can not distort, solve using bar code is anti-fake can not be from The problem of fundamentally preventing counterfeit and shoddy goods realizes scanning product identification code and carries out authenticity of products and/or information of tracing to the source Inquiry, improves the accuracy and practicability of authenticity of products and/or inquiry of tracing to the source.
Embodiment five
Fig. 8 is that a kind of product false proof that provides of the embodiment of the present invention five is traced to the source the structure diagram of device, and the device is executable The product false proof source tracing method that any embodiment of the present invention is provided has the corresponding function module of execution method and beneficial to effect Fruit.As shown in figure 8, the device includes:
Data obtaining module 801 for obtaining the Transaction Information generated by scanning product identification code, and is recorded at least In one the first block;
Encrypted link module 802 records the encrypted result of Transaction Information after carrying out Hash encryption to Transaction Information It is linked at product identification code at least one second block, and by least one first block and at least one second block Have in block chain;
The true and false is traced to the source enquiry module 803, for according to the block chain and product identification code after link, carrying out the true and false of product And/or the inquiry for information of tracing to the source.
It present embodiments provides a kind of product false proof to trace to the source device, obtains the transaction letter generated by scanning product identification code Breath, is recorded at least one first block, and is recorded at least one second after carrying out Hash encryption to Transaction Information In block, and at least one first block and at least one second block are linked in the existing block chain of product identification code, The inquiry of the true and false and/or information of tracing to the source of product is carried out according to finally formed block chain and product identification code.Utilize block chain The decentralization of technology, Hash encryption, point-to-point transaction timely update block chain the features such as, it is ensured that data it is true and reliable, no It can distort, solve the problems, such as fundamentally prevent counterfeit and shoddy goods using bar code is anti-fake, realize scanning product Identification code carries out the inquiry of authenticity of products and/or information of tracing to the source, and improves the accuracy and reality of authenticity of products and/or inquiry of tracing to the source The property used.
Further, initiator's manufacture counterfeit and shoddy goods of merchandising in order to prevent, which scan the initiation transaction of its product identification, asks It asks, above- mentioned information acquisition module 801 includes:
Identification code authentication unit is authenticated for obtaining product identification code;
Information acquisition unit, in the case of successful certification, obtaining the product generated by scanning product identification code Information and flow to information.
Further, above-mentioned apparatus further includes:
Data extraction module, for extracting the critical data of product in process of production;
Encrypted link module 802 is additionally operable to after carrying out Hash encryption to critical data, the encrypted result of critical data is remembered Record generates block chain at least one third block;
Identification code generating module, for generating product identification code according to the encrypted result in block chain;
Wherein, in the block chain of generation, the encrypted result recorded in previous block is included in the latter block.
Further, dealer carries out the imitation of counterfeit and shoddy goods after producer has purchased some products in order to prevent, It is sold again after genuine products from counterfeit products is mixed, above-mentioned apparatus further includes:
Transaction Information sending module, whole use for being sent to Transaction Information in the form of the whole network is broadcasted in network Family.
Further, above-mentioned true and false enquiry module 803 of tracing to the source includes:
True and false query unit, in response to authenticity of products inquiry instruction, obtaining the corresponding product mark of true and false inquiry instruction Know code, Hash verification is carried out to the block chain data of product identification code, to judge the true and false of product;And/or
It traces to the source query unit, in response to product traceability inquiry instruction, acquisition is traced to the source the corresponding product mark of inquiry instruction Know code, the Transaction Information of record is searched in the block chain of product identification code, to show the information of tracing to the source of product.
It is worth noting that, in the embodiment of the anti-fake device of tracing to the source of the said goods, included each unit and module are only It is divided according to function logic, but is not limited to above-mentioned division, as long as corresponding function can be realized;Example Such as, which can only include communication module and processing module, and communication module realizes that the acquisition of critical data, Transaction Information obtain It takes and sends;The correlations such as encryption, record, the link of block and the anti-fake inquiry traced to the source of processing modules implement information and data Function.In addition, the specific name of each functional unit is also only to facilitate mutually distinguish, the protection being not intended to restrict the invention Range.
Embodiment six
Fig. 9 is a kind of structural schematic diagram for server that the embodiment of the present invention six provides.Fig. 9 is shown suitable for being used for realizing The block diagram of the exemplary servers 90 of embodiment of the present invention.The server 90 that Fig. 9 is shown is only an example, should not be to this The function and use scope of inventive embodiments bring any restrictions.As shown in figure 9, the server 90 is with the shape of universal computing device Formula shows.The component of the server 90 can include but is not limited to:One or more processor or processing unit 901 are System memory 902, the bus 903 of connection different system component (including system storage 902 and processing unit 901).
Bus 903 indicates one or more in a few class bus structures, including memory bus or Memory Controller, Peripheral bus, graphics acceleration port, processor or the local bus using the arbitrary bus structures in a variety of bus structures.It lifts For example, these architectures include but not limited to industry standard architecture (ISA) bus, microchannel architecture (MAC) Bus, enhanced isa bus, Video Electronics Standards Association (VESA) local bus and peripheral component interconnection (PCI) bus.
Server 90 typically comprises a variety of computer system readable media.These media can any can be serviced The usable medium that device 90 accesses, including volatile and non-volatile media, moveable and immovable medium.
System storage 902 may include the computer system readable media of form of volatile memory, such as deposit at random Access to memory (RAM) 904 and/or cache memory 905.Server 90 may further include it is other it is removable/can not Mobile, volatile/non-volatile computer system storage medium.Only as an example, storage system 906 can be used for reading and writing not Movably, non-volatile magnetic media (Fig. 9 do not show, commonly referred to as " hard disk drive ").It, can be with although being not shown in Fig. 9 It provides for the disc driver to moving non-volatile magnetic disk (such as " floppy disk ") read-write, and to removable non-volatile The CD drive of CD (such as CD-ROM, DVD-ROM or other optical mediums) read-write.In these cases, each driving Device can be connected by one or more data media interfaces with bus 903.System storage 902 may include at least one There is one group of (for example, at least one) program module, these program modules to be configured to perform this for program product, the program product Invent the function of each embodiment.
Program/utility 908 with one group of (at least one) program module 907 can be stored in such as system and deposit In reservoir 902, such program module 907 includes but not limited to operating system, one or more application program, other programs Module and program data may include the realization of network environment in each or certain combination in these examples.Program mould Block 907 usually executes function and/or method in embodiment described in the invention.
Server 90 can also be with one or more external equipments 906 (such as keyboard, sensing equipment, display 910 etc.) Communication, can also be enabled a user to one or more equipment interact with the equipment communicate, and/or with make the server 90 Any equipment (such as network interface card, modem etc.) communication that can be communicated with one or more of the other computing device.This Kind communication can be carried out by input/output (I/O) interface 911.Also, server 90 can also pass through network adapter 912 With one or more network (such as LAN (LAN), wide area network (WAN) and/or public network, such as internet) communication. As shown in figure 9, network adapter 912 is communicated by bus 903 with other modules of server 90.Although should be understood that in figure It is not shown, other hardware and/or software module can be used in conjunction with server 90, including but not limited to:Microcode, device drives Device, redundant processing unit, external disk drive array, RAID system, tape drive and data backup storage system etc..
Processing unit 901 is stored in program in system storage 902 by operation, to perform various functions using with And data processing, such as realize the product false proof source tracing method that the embodiment of the present invention is provided.
Embodiment seven
The embodiment of the present invention seven additionally provides a kind of computer readable storage medium, is stored thereon with computer program, should Program can realize the product false proof source tracing method described in above-described embodiment when being executed by processor.
The arbitrary of one or more computer-readable media may be used in the computer storage media of the embodiment of the present invention Combination.Computer-readable medium can be computer-readable signal media or computer readable storage medium.It is computer-readable Storage medium can be for example but not limited to:System, device or the device of electricity, magnetic, optical, electromagnetic, infrared ray or semiconductor, or The arbitrary above combination of person.The more specific example (non exhaustive list) of computer readable storage medium includes:There are one tools Or the electrical connections of multiple conducting wires, portable computer diskette, hard disk, random access memory (RAM), read-only memory (ROM), Erasable programmable read only memory (EPROM or flash memory), optical fiber, portable compact disc read-only memory (CD-ROM), light Memory device, magnetic memory device or above-mentioned any appropriate combination.In this document, computer readable storage medium can With to be any include or the tangible medium of storage program, the program can be commanded execution system, device or device use or Person is in connection.
Computer-readable signal media may include in a base band or as the data-signal that a carrier wave part is propagated, Wherein carry computer-readable program code.Diversified forms may be used in the data-signal of this propagation, including but unlimited In electromagnetic signal, optical signal or above-mentioned any appropriate combination.Computer-readable signal media can also be that computer can Any computer-readable medium other than storage medium is read, which can send, propagates or transmit and be used for By instruction execution system, device either device use or program in connection.
The program code for including on computer-readable medium can transmit with any suitable medium, including but not limited to: Wirelessly, electric wire, optical cable, RF etc. or above-mentioned any appropriate combination.
It can be write with one or more programming languages or combinations thereof for executing the computer that operates of the present invention Program code, described program design language include object oriented program language, such as Java, Smalltalk, C++, also Including conventional procedural programming language-such as " C " language or similar programming language.Program code can be complete It executes, partly executed on the user computer on the user computer entirely, being executed as an independent software package, part Part executes or executes on a remote computer or server completely on the remote computer on the user computer.It is relating to And in the situation of remote computer, remote computer can pass through the network of any kind, including LAN (LAN) or wide area network (WAN), it is connected to subscriber computer, or, it may be connected to outer computer (such as led to using ISP Cross internet connection).
Above-described embodiment serial number is for illustration only, can not represent the quality of embodiment.
Will be appreciated by those skilled in the art that each module of the above-mentioned embodiment of the present invention or each operation can be used and lead to Computing device realizes that they can be concentrated on single computing device, or be distributed in multiple computing devices and formed Network on, optionally, they can be realized with the program code that computer installation can perform, so as to storing them Be performed by computing device in the storage device, either they are fabricated to each integrated circuit modules or by they In multiple modules or operation be fabricated to single integrated circuit module to realize.In this way, the present invention is not limited to any specific The combination of hardware and software.
Each embodiment in this specification is described in a progressive manner, the highlights of each of the examples are with The difference of other embodiment, just to refer each other for the same or analogous part between each embodiment.
The foregoing is merely the preferred embodiment of the present invention, are not intended to restrict the invention, for those skilled in the art For, the present invention can have various modifications and changes.It is all within spirit and principles of the present invention made by any modification, equivalent Replace, improve etc., it should all be included in the protection scope of the present invention.

Claims (10)

1. a kind of product false proof source tracing method, which is characterized in that including:
The Transaction Information generated by scanning product identification code is obtained, and is recorded at least one first block;
After carrying out Hash encryption to the Transaction Information, the encrypted result of the Transaction Information is recorded at least one secondth area In block, and at least one first block and at least one second block are linked at having for the product identification code In block chain;
Block chain after foundation link and the product identification code, carry out the inquiry of the true and false of the product and/or information of tracing to the source.
2. according to the method described in claim 1, it is characterized in that, obtaining the Transaction Information generated by scanning product identification code Before, further include:
Extract the critical data of the product in process of production;
After carrying out Hash encryption to the critical data, the encrypted result of the critical data is recorded at least one third area In block, and generate block chain;
The product identification code is generated according to the encrypted result in the block chain;
Wherein, in the block chain of generation, the encrypted result recorded in previous block is included in the latter block.
3. according to the method described in claim 1, it is characterized in that, obtaining the transaction letter generated by scanning product identification code Breath, including:
The product identification code is obtained to be authenticated;
If certification success is obtained by scanning the product information and flow to information that product identification code generates.
4. according to the method described in claim 1, it is characterized in that, obtaining the Transaction Information generated by scanning product identification code Later, further include:
The Transaction Information is sent to whole users in network in the form of the whole network is broadcasted.
5. according to the method described in claim 1, it is characterized in that, according to after link block chain and the product identification code, The inquiry of the true and false of the product and/or information of tracing to the source is carried out, including:
In response to the authenticity of products inquiry instruction, the corresponding product identification code of the true and false inquiry instruction is obtained, to the production The block chain data of product identification code carry out Hash verification, to judge the true and false of the product;And/or
In response to the product traceability inquiry instruction, the corresponding product identification code of inquiry instruction of tracing to the source described in acquisition, in the production The Transaction Information that record is searched in the block chain of product identification code, to show the information of tracing to the source of the product.
The device 6. a kind of product false proof is traced to the source, which is characterized in that including:
Data obtaining module for obtaining the Transaction Information by scanning product identification code generation, and is recorded at least one the In one block;
Encrypted link module remembers the encrypted result of the Transaction Information after carrying out Hash encryption to the Transaction Information Record is linked at institute at least one second block, and by least one first block and at least one second block In the existing block chain for stating product identification code;
The true and false is traced to the source enquiry module, for according to after link block chain and the product identification code, carry out the true of the product Pseudo- and/or information of tracing to the source inquiry.
7. device according to claim 6, which is characterized in that further include:
Data extraction module, for extracting the critical data of the product in process of production;
The encrypted link module is additionally operable to after carrying out Hash encryption to the critical data, by the encryption of the critical data As a result it is recorded at least one third block, and generates block chain;
Identification code generating module, for generating the product identification code according to the encrypted result in the block chain;
Wherein, in the block chain of generation, the encrypted result recorded in previous block is included in the latter block.
8. device according to claim 6, which is characterized in that true and false enquiry module of tracing to the source includes:
True and false query unit, in response to the authenticity of products inquiry instruction, obtaining the corresponding production of the true and false inquiry instruction Product identification code carries out Hash verification, to judge the true and false of the product to the block chain data of the product identification code;And/or
It traces to the source query unit, for the corresponding production of inquiry instruction of in response to the product traceability inquiry instruction, tracing to the source described in acquisition Product identification code searches the Transaction Information of record in the block chain of the product identification code, to show the letter of tracing to the source of the product Breath.
9. a kind of server, which is characterized in that including:
One or more processors;
Storage device, for storing one or more programs;
When one or more of programs are executed by one or more of processors so that one or more of processors are real The now product false proof source tracing method as described in any in claim 1-5.
10. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the program is by processor The product false proof source tracing method as described in any in claim 1-5 is realized when execution.
CN201810288309.3A 2018-04-03 2018-04-03 A kind of product false proof source tracing method, device, server and storage medium Pending CN108520293A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810288309.3A CN108520293A (en) 2018-04-03 2018-04-03 A kind of product false proof source tracing method, device, server and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810288309.3A CN108520293A (en) 2018-04-03 2018-04-03 A kind of product false proof source tracing method, device, server and storage medium

Publications (1)

Publication Number Publication Date
CN108520293A true CN108520293A (en) 2018-09-11

Family

ID=63431815

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810288309.3A Pending CN108520293A (en) 2018-04-03 2018-04-03 A kind of product false proof source tracing method, device, server and storage medium

Country Status (1)

Country Link
CN (1) CN108520293A (en)

Cited By (34)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109088734A (en) * 2018-09-17 2018-12-25 杭州推点科技发展有限公司 A kind of coding method and system
CN109492880A (en) * 2018-10-18 2019-03-19 平安科技(深圳)有限公司 Roduction track method and terminal device based on block chain technology
CN109522683A (en) * 2018-09-26 2019-03-26 百度在线网络技术(北京)有限公司 Software source tracing method, system, computer equipment and storage medium
CN109544189A (en) * 2018-11-28 2019-03-29 杭州复杂美科技有限公司 A kind of method for anti-counterfeit, equipment and storage medium
CN109784945A (en) * 2018-12-27 2019-05-21 广州安食通信息科技有限公司 Foodstuff traceability method, system and storage medium based on big data and block chain
CN109785132A (en) * 2018-12-21 2019-05-21 众安信息技术服务有限公司 A kind of anti-fake source tracing method, device and storage medium based on block chain
CN109949059A (en) * 2019-03-29 2019-06-28 烟台市首诺智能装备有限公司 Case code association anti-fake traceability system, method and computer equipment based on block chain
CN110097380A (en) * 2019-04-30 2019-08-06 上海循康建筑科技有限公司 Trace to the source information architecture method and system and the source tracing method of household building material product
CN110163751A (en) * 2019-04-15 2019-08-23 广州致链科技有限公司 Block chain access system and its implementation towards alliance's chain
CN110471929A (en) * 2019-07-11 2019-11-19 深圳市中农网有限公司 Product information retroactive method, device and computer equipment
CN110516459A (en) * 2019-08-29 2019-11-29 上海梓兆科技发展有限公司 A kind of product data retroactive method and system based on block chain
CN110691079A (en) * 2019-09-25 2020-01-14 东北大学 Multi-copy reliability verification method based on block chain encryption
CN110826087A (en) * 2019-11-01 2020-02-21 腾讯科技(深圳)有限公司 Block chain-based decoration material management method, device, terminal and medium
IT201800010008A1 (en) * 2018-11-02 2020-05-02 Francesco Michetti COMPUTERIZED METHOD AND SYSTEM FOR THE CERTIFICATION OF THE AUTHENTICITY OF GOODS AND SERVICES THROUGH THE BLOCKCHAIN NETWORK
CN111178477A (en) * 2019-12-03 2020-05-19 福建自贸试验区厦门片区益客联信息科技有限公司 Commodity two-dimensional code generation method
CN111325564A (en) * 2020-03-17 2020-06-23 河南佼荣网络科技有限公司 Method and system for tracing supply chain by using block chain
CN111325293A (en) * 2018-12-14 2020-06-23 北京京东尚科信息技术有限公司 Monitoring method, system, device, equipment and computer readable medium
CN111368953A (en) * 2020-03-10 2020-07-03 大仝智能科技有限公司 Product anti-counterfeiting traceability system and method
CN111429146A (en) * 2018-12-24 2020-07-17 阿里巴巴集团控股有限公司 Tracing processing method, system, service platform and electronic equipment
CN111445269A (en) * 2020-03-30 2020-07-24 深圳前海量子云码科技有限公司 Industrial hemp traceability supervision method, system, equipment and storage medium
CN111476326A (en) * 2020-04-01 2020-07-31 深圳前海量子云码科技有限公司 Method, device, equipment and storage medium for marking anti-counterfeiting mark on automobile toughened glass
CN111553767A (en) * 2020-04-29 2020-08-18 天网互联科技(深圳)有限公司 Shared house leasing system, method and storage medium based on block chain
CN111582885A (en) * 2020-05-06 2020-08-25 中国计量大学 Block chain-based vaccine management method and storage medium
CN111833071A (en) * 2019-03-26 2020-10-27 财团法人亚洲大学 Method for establishing and inquiring production and marketing histories for quality assurance of agricultural products
CN112070516A (en) * 2020-09-18 2020-12-11 北京京东振世信息技术有限公司 Product tracing method and device and block chain system
CN112488728A (en) * 2019-08-22 2021-03-12 佛山市顺德区美的饮水机制造有限公司 Anti-counterfeiting identification method and device for consumable and electronic equipment
CN112800313A (en) * 2021-01-25 2021-05-14 吉林省吉科软信息技术有限公司 Intelligent information tracing system based on cloud platform
CN112981853A (en) * 2019-12-13 2021-06-18 青岛海尔洗衣机有限公司 Washing control method and device
CN113095815A (en) * 2021-04-15 2021-07-09 北京佰宸讯高新技术有限公司 Commodity transaction method and system, storage medium and platform
CN113139202A (en) * 2020-01-19 2021-07-20 浙江爱多特大健康科技有限公司 Information processing method and device, electronic equipment and computer storage medium
CN113487337A (en) * 2021-07-13 2021-10-08 中国联合网络通信集团有限公司 Product information storage method, tracing method and block chain platform
CN113570384A (en) * 2021-07-26 2021-10-29 大连民族大学 Agricultural product tracing method and system based on block chain
CN113938491A (en) * 2021-09-02 2022-01-14 中国科学院信息工程研究所 Instruction data traceable tamper-proof method and system based on block chain technology
CN114548331A (en) * 2020-11-18 2022-05-27 鲍勃斯脱梅克斯股份有限公司 Method for providing authenticity information

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107220837A (en) * 2017-05-31 2017-09-29 北京汇通金财信息科技有限公司 A kind of destination object source tracing method and device
CN107316239A (en) * 2017-07-14 2017-11-03 众安信息技术服务有限公司 A kind of authentification of message and source tracing method and system based on block chain
CN107704493A (en) * 2017-08-23 2018-02-16 中链科技有限公司 It is a kind of to be used to provide the method and system that product is traced to the source
CN107748994A (en) * 2017-10-31 2018-03-02 杭州趣链科技有限公司 A kind of anti-fake traceability system based on block chain

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107220837A (en) * 2017-05-31 2017-09-29 北京汇通金财信息科技有限公司 A kind of destination object source tracing method and device
CN107316239A (en) * 2017-07-14 2017-11-03 众安信息技术服务有限公司 A kind of authentification of message and source tracing method and system based on block chain
CN107704493A (en) * 2017-08-23 2018-02-16 中链科技有限公司 It is a kind of to be used to provide the method and system that product is traced to the source
CN107748994A (en) * 2017-10-31 2018-03-02 杭州趣链科技有限公司 A kind of anti-fake traceability system based on block chain

Cited By (42)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109088734A (en) * 2018-09-17 2018-12-25 杭州推点科技发展有限公司 A kind of coding method and system
CN109088734B (en) * 2018-09-17 2022-04-12 广州推点科技发展有限公司 Coding method and system
CN109522683A (en) * 2018-09-26 2019-03-26 百度在线网络技术(北京)有限公司 Software source tracing method, system, computer equipment and storage medium
CN109492880A (en) * 2018-10-18 2019-03-19 平安科技(深圳)有限公司 Roduction track method and terminal device based on block chain technology
IT201800010008A1 (en) * 2018-11-02 2020-05-02 Francesco Michetti COMPUTERIZED METHOD AND SYSTEM FOR THE CERTIFICATION OF THE AUTHENTICITY OF GOODS AND SERVICES THROUGH THE BLOCKCHAIN NETWORK
CN109544189A (en) * 2018-11-28 2019-03-29 杭州复杂美科技有限公司 A kind of method for anti-counterfeit, equipment and storage medium
CN111325293A (en) * 2018-12-14 2020-06-23 北京京东尚科信息技术有限公司 Monitoring method, system, device, equipment and computer readable medium
CN109785132A (en) * 2018-12-21 2019-05-21 众安信息技术服务有限公司 A kind of anti-fake source tracing method, device and storage medium based on block chain
CN111429146B (en) * 2018-12-24 2023-05-02 阿里巴巴集团控股有限公司 Tracing processing method, tracing processing system, service platform and electronic equipment
CN111429146A (en) * 2018-12-24 2020-07-17 阿里巴巴集团控股有限公司 Tracing processing method, system, service platform and electronic equipment
CN109784945A (en) * 2018-12-27 2019-05-21 广州安食通信息科技有限公司 Foodstuff traceability method, system and storage medium based on big data and block chain
CN111833071A (en) * 2019-03-26 2020-10-27 财团法人亚洲大学 Method for establishing and inquiring production and marketing histories for quality assurance of agricultural products
CN109949059A (en) * 2019-03-29 2019-06-28 烟台市首诺智能装备有限公司 Case code association anti-fake traceability system, method and computer equipment based on block chain
CN110163751A (en) * 2019-04-15 2019-08-23 广州致链科技有限公司 Block chain access system and its implementation towards alliance's chain
CN110097380A (en) * 2019-04-30 2019-08-06 上海循康建筑科技有限公司 Trace to the source information architecture method and system and the source tracing method of household building material product
CN110471929A (en) * 2019-07-11 2019-11-19 深圳市中农网有限公司 Product information retroactive method, device and computer equipment
CN112488728A (en) * 2019-08-22 2021-03-12 佛山市顺德区美的饮水机制造有限公司 Anti-counterfeiting identification method and device for consumable and electronic equipment
CN110516459A (en) * 2019-08-29 2019-11-29 上海梓兆科技发展有限公司 A kind of product data retroactive method and system based on block chain
CN110691079A (en) * 2019-09-25 2020-01-14 东北大学 Multi-copy reliability verification method based on block chain encryption
CN110691079B (en) * 2019-09-25 2021-07-13 东北大学 Multi-copy reliability verification method based on block chain encryption
CN110826087A (en) * 2019-11-01 2020-02-21 腾讯科技(深圳)有限公司 Block chain-based decoration material management method, device, terminal and medium
CN110826087B (en) * 2019-11-01 2023-07-25 腾讯科技(深圳)有限公司 Decoration material management method, device, terminal and medium based on block chain
CN111178477A (en) * 2019-12-03 2020-05-19 福建自贸试验区厦门片区益客联信息科技有限公司 Commodity two-dimensional code generation method
CN112981853B (en) * 2019-12-13 2024-01-16 青岛海尔洗衣机有限公司 Washing control method and device
CN112981853A (en) * 2019-12-13 2021-06-18 青岛海尔洗衣机有限公司 Washing control method and device
CN113139202A (en) * 2020-01-19 2021-07-20 浙江爱多特大健康科技有限公司 Information processing method and device, electronic equipment and computer storage medium
CN111368953A (en) * 2020-03-10 2020-07-03 大仝智能科技有限公司 Product anti-counterfeiting traceability system and method
CN111325564B (en) * 2020-03-17 2024-02-02 河南佼荣网络科技有限公司 Method and system for realizing supply chain tracing by using block chain
CN111325564A (en) * 2020-03-17 2020-06-23 河南佼荣网络科技有限公司 Method and system for tracing supply chain by using block chain
CN111445269A (en) * 2020-03-30 2020-07-24 深圳前海量子云码科技有限公司 Industrial hemp traceability supervision method, system, equipment and storage medium
CN111476326A (en) * 2020-04-01 2020-07-31 深圳前海量子云码科技有限公司 Method, device, equipment and storage medium for marking anti-counterfeiting mark on automobile toughened glass
CN111553767B (en) * 2020-04-29 2023-04-18 天网互联科技(深圳)有限公司 Shared house leasing system, method and storage medium based on block chain
CN111553767A (en) * 2020-04-29 2020-08-18 天网互联科技(深圳)有限公司 Shared house leasing system, method and storage medium based on block chain
CN111582885A (en) * 2020-05-06 2020-08-25 中国计量大学 Block chain-based vaccine management method and storage medium
CN112070516A (en) * 2020-09-18 2020-12-11 北京京东振世信息技术有限公司 Product tracing method and device and block chain system
CN114548331A (en) * 2020-11-18 2022-05-27 鲍勃斯脱梅克斯股份有限公司 Method for providing authenticity information
CN112800313A (en) * 2021-01-25 2021-05-14 吉林省吉科软信息技术有限公司 Intelligent information tracing system based on cloud platform
CN113095815A (en) * 2021-04-15 2021-07-09 北京佰宸讯高新技术有限公司 Commodity transaction method and system, storage medium and platform
CN113487337A (en) * 2021-07-13 2021-10-08 中国联合网络通信集团有限公司 Product information storage method, tracing method and block chain platform
CN113487337B (en) * 2021-07-13 2024-02-09 中国联合网络通信集团有限公司 Product information storage method, tracing method and blockchain platform
CN113570384A (en) * 2021-07-26 2021-10-29 大连民族大学 Agricultural product tracing method and system based on block chain
CN113938491A (en) * 2021-09-02 2022-01-14 中国科学院信息工程研究所 Instruction data traceable tamper-proof method and system based on block chain technology

Similar Documents

Publication Publication Date Title
CN108520293A (en) A kind of product false proof source tracing method, device, server and storage medium
JP6990197B2 (en) Safe and traceable manufacturing parts
WO2021175023A1 (en) Electronic warehouse receipt source tracing method and apparatus, computer device, and storage medium
CN111316279A (en) Computer-implemented system and method for connecting a blockchain with a digital twin set
WO2020182005A1 (en) Method for information processing in digital asset certificate inheritance transfer, and related device
US20200374131A1 (en) Method and system for generalized provenance solution for blockchain supply chain applications
CN107209787A (en) Improve the search capability of dedicated encrypted data
CN109255622A (en) A kind of back-tracing anti-fake data-storage system
CN111445272A (en) Agricultural product traceability information processing system and method based on block chain
CN104798052B (en) The matched method and apparatus of consumer
CN105096134A (en) Security scheme for authenticating digital entities and aggregate object origins
CN109377363B (en) Block chain-based Internet of things data transaction architecture and transaction security method thereof
CN109102340A (en) Service evaluation method, apparatus, electronic equipment and medium based on block chain
WO2019246399A1 (en) Digital ledger for unique item ids with ownership
CN104574122A (en) Two-dimensional code anti-counterfeit and random product packaging goods-fleeing preventing method
WO2011026326A1 (en) Tracing and recalling system for managing commodity circulation based on internet
CN103218723B (en) Product anti-fake system and method by means of machine vision and on basis of two-dimensional figure
CN112801827A (en) Intellectual property management system based on block chain
CN111461751A (en) Block chain-based house property information chain organization method, historical state tracing method and device
CN110162722A (en) Products Show method, server and storage medium based on two dimensional code
CN113420049A (en) Data circulation method and device, electronic equipment and storage medium
CN115204873A (en) Block chain-based open big data transaction matching method and system
CN117240605B (en) Data transaction method, device, equipment and storage medium
US11516014B2 (en) Methods, systems, and apparatuses for cryptographic wireless detection and authentication of fluids
CN110545262A (en) block chain data transmission platform convenient for region accuracy

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20180911