CN108830617A - Super code anti-counterfeiting method and system based on block chain - Google Patents

Super code anti-counterfeiting method and system based on block chain Download PDF

Info

Publication number
CN108830617A
CN108830617A CN201810603327.6A CN201810603327A CN108830617A CN 108830617 A CN108830617 A CN 108830617A CN 201810603327 A CN201810603327 A CN 201810603327A CN 108830617 A CN108830617 A CN 108830617A
Authority
CN
China
Prior art keywords
product
dealer
user
information
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810603327.6A
Other languages
Chinese (zh)
Inventor
黑启栋
王健
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201810603327.6A priority Critical patent/CN108830617A/en
Publication of CN108830617A publication Critical patent/CN108830617A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • G06Q30/0185Product, service or business identity fraud
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/126Applying verification of the received information the source of the received data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1095Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0866Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Development Economics (AREA)
  • Accounting & Taxation (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Economics (AREA)
  • Finance (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Power Engineering (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

This application discloses a kind of super code anti-counterfeiting methods and system based on block chain.This method includes:Production time and the first quantity for receiving a collection of product of manufacturer's input, generate the number of each product, are stabbed according to private key, production time and number generates key, and the first quantity and production time stamp are broadcast to the node of block chain;The second quantity for receiving the product that the manufacturer that manufacturer inputs provides to dealer, according to dealer region by encryption key distribution to dealer;Receive being put in storage record and sales figure and the node that record and sales figure are broadcast to block chain being put in storage for dealer;With reception user to the verification information of at least one product in this batch of product.This method uses block chain technology, the true and false of product can be verified in production and sales overall process, it is ensured that the authenticity of information;Product in all processes from producing to using using encryption technology realize product information uniqueness and can not tamper.

Description

Super code anti-counterfeiting method and system based on block chain
Technical field
This application involves data encryption technology field, more particularly to a kind of super code anti-counterfeiting method based on block chain and System.
Background technique
Nowadays as the improvement of people's living standards, people are also higher and higher to product quality requirement, almost all of production Product have anti-fake demand, and the identification authenticity of products that can be convenient consumer protects the interests of manufacturer and consumer not to be damaged Evil.In face of the market of depth interconnection, the propagation and acquisition of information, unprecedented is extensive and convenient, simple to establish in technological layer It is anti-fake, it not can avoid and be counterfeited or counterfeit.Radium-shine mark is anti-fake to look for factory to make;Coating is anti-fake can also be such as method big gun System.So that the consumer of today is difficult to tell truth from falsehood by technological means, it is most it is anti-fake be like to take totally ineffective measures, not Consumer can be really solved the problems, such as, so that the risk and cost of selection commodity is very high.More ironically, product has arrived market On in addition producer oneself be all difficult to differentiate the difference of certified products and " mountain vallage goods ", right-safeguarding is even more difficult.So effective anti- Puppet is the problem for allowing consumer in the urgent need to address with commercial city is produced now.
Summary of the invention
Aiming to overcome that the above problem or at least being partially solved or extenuate for the application solves the above problems.
According to the one aspect of the application, a kind of method for anti-counterfeit based on block chain is provided, including:
Manufacturer's information handling step:Receive name of product, the production time stamp and the of a collection of product of manufacturer's input One quantity, wherein first quantity indicates the total amount of this batch of product, generates the number of each product of this batch of product, base It is generated and the product in private key, the name of product, the production time stamp of manufacturer and the number of each product Corresponding key, and the name of product, first quantity and the production time are stabbed to the node for being broadcast to block chain;
Product allocation step:Receive the supply of material instruction of manufacturer's input, wherein supply of material instruction is including manufacturer to warp The second quantity for selling the product that quotient provides, according to the dealer region by the key equal with second quantity The dealer is distributed to, and second quantity is broadcast to the node of block chain;
Distributor information processing step:Storage record and the sales figure of the dealer are received, and the storage is remembered Record and the sales figure are broadcast to the node of block chain;With
User's checking step:It receives the user to request the activation of at least one product in this batch of product, and is swashed Verifying living, the activation request includes the identification information of subscriber information message and dealer, and after activation is verified, updating should The quantity of activated product in batch product, and the result of activation verifying is broadcast to the node of block chain.
This method can be realized in production and sales overall process using block chain technology using block chain technology as bottom architecture Accurate validation is carried out to the true and false of verifying product, whole nodes participate in broadcast and ensure that the authenticity of information and quantity can not increase Property;The uniqueness of product information is realized using encryption technology in all processes from producing to using in product and can not be distorted Property.
Optionally, in manufacturer's information handling step, the private key based on manufacturer, production time stamp Generating key with the number of each product includes:When private key based on the manufacturer is to name of product, the production Between stamp and the number of each product encrypted, obtain ciphertext, the ciphertext be subjected to Hash operation, is obtained and described first The identical key of quantity.
Since number of keys is identical as product quantity, it is ensured that certified products in the market can be verified, and be contained in key Corresponding number, therefore it is conveniently distributed management.
Optionally, described to be counted with described second according to the dealer region in the product allocation step Equal encryption key distribution, which is measured, to the dealer includes:According to the region where the dealer, the key is divided into section, Wherein, the number of key is continuous in the section, and the quantity of key is equal to second quantity in the section.
Optionally, the user's checking step includes:
Activation instruction receiving step:The user is received to the activation instruction of at least one product, the activation refers to Order includes:Information, user information and the identification information of dealer of at least one product;With
Activation instruction verification step:According to the identification information of the dealer, the activation instruction is sent to the warp Quotient is sold, after the dealer confirms the activation instruction, after the confirmation message for receiving the dealer, to the use Family send activation successfully prompt and key corresponding at least one described product, so as to user according to the key check with The relevant information of described at least one product;
Product quantity updates step and updates activated product in this batch of product according to the quantity of user activated product Quantity, and the result of activation verifying is broadcast to the node of block chain.
Optionally, after the activation instruction receiving step, the user's checking step further includes:
Location information verification step:The location information that the activation instruction obtains the user is issued based on the user, In the case that the dealer region belonging to the location information and at least one described product is inconsistent, generate abnormal alert Accuse information.
According to further aspect of the application, a kind of anti-counterfeiting system based on block chain is additionally provided, including:
Manufacturer's message processing module is disposed for receiving name of product, the life of a collection of product of manufacturer's input Produce timestamp and the first quantity, wherein first quantity indicates the total amount of this batch of product, generates each production of this batch of product The number of the number of product, private key, the name of product, production time stamp and each product based on manufacturer is raw Area is broadcast at key corresponding with the product, and by the name of product, first quantity and the production time stamp The node of block chain;
Product distribution module is disposed for receiving the supply of material instruction of manufacturer's input, wherein the supply of material instruction packet The second quantity for including the product that manufacturer provides to dealer, will be with second number according to the dealer region Equal encryption key distribution is measured to the dealer, and second quantity is broadcast to the node of block chain;
Distributor information processing module is disposed for receiving the storage record of the dealer and sales figure, and The storage record and the sales figure are broadcast to the node of block chain;With
Subscriber authentication module is disposed for receiving the user and ask to the activation of at least one product in this batch of product It asks, line activating of going forward side by side verifying, the activation request includes the identification information of subscriber information message and dealer, logical in activation verifying Later, the quantity of activated product in this batch of product is updated, and the result of activation verifying is broadcast to the node of block chain.
The system can be realized in production and sales overall process using block chain technology using block chain technology as bottom architecture Accurate validation is carried out to the true and false of verifying product, whole nodes participate in broadcast and ensure that the authenticity of information and quantity can not increase Property;The uniqueness of product information is realized using encryption technology in all processes from producing to using in product and can not be distorted Property.
Optionally, the subscriber authentication module includes:
Activation instruction receiving module, is disposed for receiving the user and refers to the activation of at least one product It enables, the activation instruction includes:Information, user information and the identification information of dealer of at least one product;
Activation instruction confirmation module is disposed for the identification information according to the dealer, by the activation instruction It is sent to the dealer, after the dealer confirms the activation instruction, receives the confirmation letter of the dealer After breath, to the user send activation successfully prompt and key corresponding at least one described product, so as to user according to The key checks information relevant at least one described product;With
Product quantity update module is disposed for the quantity according to user activated product, updates in this batch of product The quantity of activated product, and the result of verifying will be activated to be broadcast to the node of block chain.
Optionally, the subscriber authentication module further includes location information verification module, the activation instruction receiving module with The location information verification module connection, the location information verification module are configured to refer to based on the user sending activation Enable the location information for obtaining the user, the dealer region belonging to the location information and at least one described product In the case where inconsistent, abnormality warnings information is generated.
According to further aspect of the application, a kind of calculating equipment is additionally provided, including memory, processor and be stored in In the memory and the computer program that can be run by the processor, wherein the processor execution computer journey Method as described above is realized when sequence.
According to further aspect of the application, a kind of computer readable storage medium is additionally provided, it is preferably non-volatile Readable storage medium storing program for executing, is stored with computer program, and the computer program is realized as described above when executed by the processor Method.
According to the accompanying drawings to the detailed description of the specific embodiment of the application, those skilled in the art will be more Above-mentioned and other purposes, the advantages and features of the application are illustrated.
Detailed description of the invention
Some specific embodiments of the application are described in detail by way of example and not limitation with reference to the accompanying drawings hereinafter. Identical appended drawing reference denotes same or similar part or part in attached drawing.It should be appreciated by those skilled in the art that these What attached drawing was not necessarily drawn to scale.In attached drawing:
Fig. 1 is the schematic flow chart according to one embodiment of the method for anti-counterfeit based on block chain technology of the application;
Fig. 2 is the production circulation sale link schematic diagram according to the present processes;
Fig. 3 is that the present processes is utilized to realize the schematic of anti-string goods;
Fig. 4 is according to the schematic block diagram of one embodiment of the anti-counterfeiting system based on block chain technology of the application;
Fig. 5 is the block diagram of one embodiment of the calculating equipment of the application;
Fig. 6 is the block diagram of one embodiment of the computer readable storage medium of the application.
Specific embodiment
According to the accompanying drawings to the detailed description of the specific embodiment of the application, those skilled in the art will be more Above-mentioned and other purposes, the advantages and features of the application are illustrated.
Embodiment of the invention discloses a kind of method for anti-counterfeit based on block chain.Fig. 1 is according to the application based on area The schematic flow chart of one embodiment of the method for anti-counterfeit of block chain technology.This method includes:
S100 manufacturer's information handling step:Receive name of product, the production time stamp of a collection of product of manufacturer's input With the first quantity, wherein first quantity indicates the total amount of this batch of product, generates the volume of each product of this batch of product Number, the number of private key, the name of product, production time stamp and each product based on manufacturer generates and should The corresponding key of product, and the name of product, first quantity and the production time stamp are broadcast to block chain Node.
S200 product allocation step:Receive the supply of material instruction of manufacturer's input, wherein the supply of material instruction includes manufacturer Second quantity of the product provided to dealer, will be equal with second quantity according to the dealer region Encryption key distribution gives the dealer, and second quantity is broadcast to the node of block chain.
S300 distributor information processing step:Receive the dealer storage record and sales figure, and by it is described enter Library record and the sales figure are broadcast to the node of block chain.
S400 user's checking step:It receives the user to request the activation of at least one product in this batch of product, go forward side by side Line activating verifying, the activation request include the identification information of subscriber information message and dealer, after activation is verified, more The quantity of activated product in new this batch of product, and the result of verifying will be activated to be broadcast to the node of block chain.
This method can be realized in production and sales overall process using block chain technology using block chain technology as bottom architecture Accurate validation is carried out to the true and false of verifying product, whole nodes participate in the authenticity that broadcast ensures information, and quantity can not increase Property;The uniqueness of product information is realized using encryption technology in all processes from producing to using in product and can not be distorted Property.
The application innovates anti-fake mode, and all participants is enable to reach benign common recognition, broadcasts by the whole network complete The mode of verifying is netted, while solving trust and anti-pseudo problem, gets rid of the anti-fake mode of technology of " arms race " formula, fundamentally Solves consumption and the difficulties of manufacturer.
Optionally, in the S100 manufacturer information handling step, when the private key based on manufacturer, the production Between stamp and each product number generate key include:Private key based on the manufacturer is to name of product, the life The number for producing timestamp and each product is encrypted, and ciphertext is obtained, and the ciphertext is carried out Hash operation, obtain with it is described The identical key of first quantity.Wherein, the number containing the key in each key.
So-called key is by information relevant to product, for example, name of product, product number, quantity, life in the application Timestamp etc. is produced, carries out the result obtained after Hash operation using obtaining ciphertext after asymmetric encryption, then by ciphertext.
Manufacturer obtains " private key " identity after the completion of login account on block chain, which uniquely determines.
It is alternatively possible to generate several public keys based on the private key, production time stamp and the first quantity.System it is super Administrator holds the private key of product, and the administrator of system holds the public key of product.The public key can be unlocked for checking that key is compiled Code is convenient for tracking and managing.
Key of the step based on asymmetric encryption techniques encrypts the product information and number using private key, utilizes Private key generation is more key, and key can check encrypted content, but can not modify.Anti- private key can not be released according to ciphertext, thus So that the identity of product is had uniqueness, can not be tampered or copied.The key is also referred to as DNA key.Fig. 2 is according to the application Method production circulation sale link schematic diagram.For example, manufacturer is on April 15th, 2018 production A product population 2000, After the completion of generation, each product is encoded, for example, format can be A001.The product coding is encrypted by private key, is obtained To ciphertext:The ciphertext is calculated by hash function, obtains cryptographic Hash, as the A001 product is close by 2332ed2ud ... Key.Using this method, be based on this batch of product, system can generate 2000 DNA keys, the number of these DNA keys be 1 to 2000.System broadcasts the information such as production quantity, batch and timestamp to the whole network.The administrator of system can will hold encryption key distribution To dealer, and further, after user buys product and activates successfully, by encryption key distribution to user, the management of system Member can use the public key held and check all keys.
This encryption system is known as " super code " herein, super code is established on the basis of existing product production procedure, can It is again full of vitality to allow backward tissue to produce mechanism.As long as by data inputs such as the time of product, batch, quantity to super Code system background, and synchronization is broadcasted on publicly-owned chain.Super code background management system, can automatically generate the product of corresponding number DNA key.Key is encrypted using asymmetric encryption mode, can only be unlocked with public key, other people take public key and also can not reversely drill Private key is calculated, full-range trackability and safety are improved.
Optionally, in the S200 product allocation step, it is described will be with described according to the dealer region The equal encryption key distribution of two quantity includes to the dealer:According to the region where the dealer, the key is divided into Section, wherein the number of key is continuous in the section, and the quantity of key is equal to second number in the section Amount.
Manufacturer allots product and gives various regions dealer in this step, and typing corresponding information in systems.System according to Different delivery regions, auto-partition configure different section coded key.For example, Shandong is the first section 001 to 500, extensively East is the second section 501 to 1000, to do foundation for kinds of goods regionality and channel management.Referring to fig. 2, for example, manufacturer 200 in this batch of product are supplied into some dealer X on April 18th, 2018, by the product dna of number 1 to 200 in system Encryption key distribution gives the dealer X.Meanwhile the information such as quantity of dealer's identity identification information, timestamp, distribution are uploaded into area Block chain.
In S300 distributor information processing step, storage record is inserted super code and prevented by dealer after receiving product Antiforge system is carrying out that sales figure is also inserted to super code anti-fake system post sales.Super code anti-fake system records the storage With the node of the sales figure synchronized broadcast to block chain.According to these information, can carry out tracking of products, acquire, summarize, Inquiry, management etc., to establish Product Information Management data-link and entire process of circulation supervisory systems.
Optionally, the S400 user's checking step includes activation instruction receiving step, activation instruction verification step and production Product quantity updates step.
Activation instruction receiving step:The user is received to the activation instruction of at least one product, the activation refers to Order includes:Information, user information and the identification information of dealer of at least one product.
Activation instruction verification step:According to the identification information of the dealer, the activation instruction is sent to the warp Quotient is sold, after the dealer confirms the activation instruction, after the confirmation message for receiving the dealer, to the use Family send activation successfully prompt and key corresponding at least one described product, so as to user according to the key check with The relevant information of described at least one product.
Product quantity updates step:According to the quantity of user activated product, activated product in this batch of product is updated Quantity, and the result of activation verifying is broadcast to the node of block chain.
User, also referred to as consumer can log in super code anti-fake system, example after buying product by scan operation Such as, user can use smart phone or other terminal device scans pictures, packaging, picture in kind or two dimensional code as login The entrance of super code anti-fake system.Activation operation is carried out first, and the information for needing to fill in systems includes:Subscriber data letter It ceases, the identification information (ID) of dealer, wherein subscriber information message includes one or more of following information:Name, mobile phone Number, age, the relevant informations such as address.User can be manually entered the ID of dealer or user can be by scanning dealer's The ID of dealer is input to super code anti-fake system by two dimensional code.Super code anti-fake system receives the activation request of user, push The information of user confirms to dealer, after dealer receives activation request, if it is confirmed that the information truth of the user, then click same Meaning activation, super code anti-fake system will activate successfully instruction to be sent to user, deny activation failure, successful sending activation While instruction, the corresponding key of product that user buys is also sent to user by super code anti-fake system.User can after activation With production information, logistics information, the time of making the product, batch, the distributor information etc. for checking the product of purchase on the terminal device, produce All information list nothing lefts of product, and all can not really distort, it seem that the DNA of product is the same, from birth, each link is complete Journey is recorded in detail, convenient to transfer verifying at any time.The synchronous activation situation to the whole network broadcasting user of super code anti-fake system.
Referring to fig. 2, for example, user has purchased a product on April 22nd, 2018, by activating the DNA of the product close Key binds terminal device, passes through transmission activation request and can obtain the key of the product after activating successfully, for example, number is 1 Key, thus verify the product be certified products.By user bound, user is enabled to be given for change according to the relevant information filled in close Key, meanwhile, automatic bound device can limit bound device quantity, avoid abusing or usurp.
User is exactly the safety in support, maintenance and hardened system in the process of verifying activation.More users participates in Verifying, the data of system are more safe and reliable, so that the pirate space that do not survive of malice.Even if occurring fake products in kind on the market to produce Product, but since code key has uniqueness, total amount not can increase.Fake products product can not activate cochain, therefore user can differentiate at a glance, It will not have dust thrown into the eyes.Counterfeiter also can eliminate malicious motive because can not therefrom make a profit.
Optionally, after the activation instruction receiving step, the S400 user's checking step further includes:
Location information verification step:The location information that the activation instruction obtains the user is issued based on the user, In the case that the dealer region belonging to the location information and at least one described product is inconsistent, generate abnormal alert Accuse information.
The step can prevent string goods.Fig. 3 is that the present processes is utilized to realize the schematic of anti-string goods.For example, selling The key coding of the product of the sale of quotient A is 001 to 500, and the key coding of the product of the sale of dealer B is 501 to 1000, The key coding of the product of the sale of dealer C is 1001 to 1500.What the user of the region dealer A used in activation Key 001 then passes through the confirmation of dealer A, user's normal Activate success.It is assumed that the dealer C string goods in Shandong arrives Liaoning Dealer B is sold region, and user activates in the region dealer B, obtains activation code to system, the activation code Cipher key number is 1002, and being located at cipher key number is the section 1001-1500, and system judges the key point of the product according to encoded information The dealer matched is C, but in active information under geographical location and the unmatched situation of above- mentioned information, it is different that system judges transaction Often, system manager and related dealer is notified to confirm.It is possible thereby to identify whether to be implicitly present in the malice such as string goods in violation of rules and regulations It disrupts the market situation, protects the equity of related operator without damage.
This method prevents intercepting thinking as strict as possible, is changed into and increases income and decreases expenditure, and controls and changes benefit sharing structure, and remodeling production is closed System snipes pirate and malice and disrupts the market behavior, directly reduction production cost, by interests Pu Hui in the form of token or integral in Each link in industry motivates manufacturer, dealer, and user participates in enthusiasm, while simple and easy-to-use participation threshold, so that mutually beneficial Ecological chain is possibly realized, and is inherently eliminated the motivation of manufacturing and marketing the fake, so that Cleaning market, guarantees the development of industry environmental health, And dynamics of strengthening intellectual property protection, power-assisted country is from " made in China " to " Created in China " strategic transformation.
It is to be appreciated that location information verification step can occur after activation instruction receiving step, or activation refers to After enabling verification step, there is no the differentiations of sequencing between each step.
It is certified products identity that user, which activates the product for successfully showing to demonstrate purchase, is by that can reinforce to the whole network broadcast System.User not only can verify certified products by system, moreover it is possible to the additional clothes checked all information relevant to product, enjoy product Business or value-added service are rewarded by completion task, the activity that enjoys privileges etc..
For example, system can be set and upgrade according to the contribution margin of user the identity of user, user identity can be with sharp Quantity upgrading living, that is to say, that as user activates amount of action to increase, the contribution margin for verifying positive edition system increases, can To be embodied by token or integral, user identity rank can promote rank therewith;Different ranks corresponds to different equity, can also be with Exchange corresponding product or service.While obtaining value-added service, moreover it is possible to obtain identity, such as intellectual property protection is big Make identity etc., this identity also with the contribution margin Synchronous lifting, harvests the sense of accomplishment of spirit level.It, can using this method Transfer and excite user to be actively engaged in the enthusiasm of verifying.
Super code provided by the present application has the following advantages that, first, without hard cost, it is any special not need to do product Processing, for example, labeling, stamp, the operation of patch code etc, therefore without any actual hard cost, so that it may realize anti-fake, prevent The function of string goods;Second, it is easy to operate, as long as one terminal device of user, small routine or application program are opened whenever and wherever possible (app), so that it may realize and exclude fake products, contribute for intellectual property protection.Third, practical, super code anti-fake system is in original Seamless implantation in some industry links does not need to increase new equipment, and all operations are completed in terminal device.The super anti-fake system of code The information of links is uploaded to block chain by system, is participated in broadcasting and be verified good based on P2P technology the whole network using block chain Property common recognition mechanism, by verifying broadcast big multinode, so that information be prevented to be tampered.Manufacturer, dealer, user are operating It, can will be in product information synchronized broadcast to chain during use.Due to product population be it is fixed, the broadcast of links is dynamic Synchronizing realizes, the whether legal effect of verifying source-information.Realize verifying node more higher good of multisystem safety Property circulation.Different with other block chain projects, it is existing industrial chain amount body that super code, which is established on original industrial chain basis, Customization, is the block chain application for meeting very much Vehicles Collected from Market environment.
The application makes manufacturer, dealer, the common recognition of user and interests reach an agreement.
Manufacturer:The problems such as wishing in the market without piracy, fake products, string goods, encroaches on the interests of oneself, then dynamic to make With the system, participates in and moving system lands.
Dealer:It is desirable to verify that the legitimacy and authority of oneself agency, consolidates self-employed regional benefit and do not invaded Evil, while the relationship of longer-term can be established with user again, dynamic participation broadcast and verifying.
User:Wish that the product oneself bought genuine goods at a fair price, equity maximize.It is legal that product cochain can solve product Problem;The design of user's honor system meets the needs of user's spirit level, verifies reward mechanism, in proportion by the value of generation It makes concessions to user, user's right is made to obtain maximum satisfaction.
Being actively engaged in of user, which directly results in pirate products, to be unable to cochain by verifying link.So that it is pirate and Legal copy pulls open the wide gap that can not go beyond together.Super code, by the way that verifying supervision is delegated power to the lower levels to users, product institute There is link information publicity the whole network, user forces industrial chain link, has accurately sniped pirate and violation operation.Interests are returned simultaneously It is grouped into the node of each honesty of industry, user is allowed to benefit, service provider benefits.Polygon interests are balanced, remodeling industry is completed Good ecological relationship.
Embodiments herein also discloses a kind of anti-counterfeiting system based on block chain technology.Fig. 4 is according to the base of the application In the schematic block diagram of one embodiment of the anti-counterfeiting system of block chain.The device includes:
Manufacturer's message processing module 100, be disposed for receive manufacturer input a collection of product name of product, Production time stamp and the first quantity, wherein first quantity indicates the total amount of this batch of product, generates this batch of product each The number of product, the number of private key, the name of product, the production time stamp and each product based on manufacturer Key corresponding with the product is generated, and the name of product, first quantity and the production time stamp are broadcast to The node of block chain;
Product distribution module 200 is disposed for receiving the supply of material instruction of manufacturer's input, wherein the supply of material refers to Enabling includes the second quantity of the product that manufacturer provides to dealer, will be with described the according to the dealer region The equal encryption key distribution of two quantity gives the dealer, and second quantity is broadcast to the node of block chain;
Distributor information processing module 300 is disposed for receiving the storage record of the dealer and sales figure, And the storage record and the sales figure are broadcast to the node of block chain;
Subscriber authentication module 400 is disposed for receiving the user and swash at least one product in this batch of product Request living, line activating of going forward side by side verifying, the activation request include the identification information of subscriber information message and dealer, are tested in activation After card passes through, the quantity of activated product in this batch of product is updated, and the result of activation verifying is broadcast to the section of block chain Point.
The system can be realized in production and sales overall process using block chain technology using block chain technology as bottom architecture Accurate validation is carried out to the true and false of verifying product, whole nodes participate in broadcast and ensure that the authenticity of information and quantity can not increase Property;The uniqueness of product information is realized using encryption technology in all processes from producing to using in product and can not be distorted Property.
Optionally, in manufacturer's message processing module 100, private key, production time stamp and institute based on manufacturer The number for stating each product generates key and includes:Private key based on the manufacturer stabs name of product, the production time It is encrypted with the number of each product, obtains ciphertext, the ciphertext is subjected to Hash operation, is obtained and first quantity Identical key.
Optionally, in product distribution module 200, it is described will be with second quantity according to the dealer region Equal encryption key distribution includes to the dealer:According to the region where the dealer, the key is divided into section, In, the number of key is continuous in the section, and the quantity of key is equal to second quantity in the section.
Optionally, the subscriber authentication module 400 includes activation instruction receiving module and activation instruction confirmation module.
Activation instruction receiving module, is disposed for receiving the user and refers to the activation of at least one product It enables, the activation instruction includes:Information, user information and the identification information of dealer of at least one product.
Activation instruction confirmation module is disposed for the identification information according to the dealer, by the activation instruction It is sent to the dealer, after the dealer confirms the activation instruction, receives the confirmation letter of the dealer After breath, activation successfully prompt and key corresponding at least one described product are sent to the user, so that user checks Information relevant at least one described product.
Product quantity update module is disposed for the quantity according to user activated product, updates in this batch of product The quantity of activated product, and the result of verifying will be activated to be broadcast to the node of block chain.
Optionally, the subscriber authentication module further includes location information verification module, the activation instruction receiving module with The location information verification module connection, the location information verification module are configured to refer to based on the user sending activation Enable the location information for obtaining the user, the dealer region belonging to the location information and at least one described product In the case where inconsistent, abnormality warnings information is generated.
The activation instruction receiving module can be connect with the location information verification module, can also be connect with activation instruction Receive module connection.
Embodiments herein additionally provides a kind of calculating equipment, referring to Fig. 5, the calculating equipment include memory 1120, Processor 1110 and it is stored in the computer program that can be run in the memory 1120 and by the processor 1110, the calculating Machine program is stored in the space 1130 for program code in memory 1120, which holds by processor 1110 It is realized when row for executing any one steps of a method in accordance with the invention 1131.
Embodiments herein additionally provides a kind of computer readable storage medium.Referring to Fig. 6, the computer-readable storage Medium includes the storage unit for program code, which is provided with for executing steps of a method in accordance with the invention Program 1131 ', the program are executed by processor.
The embodiment of the present application also provides a kind of computer program products comprising instruction.When the computer program product.
In the above-described embodiments, can come wholly or partly by software, hardware, firmware or any combination thereof real It is existing.When implemented in software, it can entirely or partly realize in the form of a computer program product.The computer program Product includes one or more computer instructions.When computer loads and executes the computer program instructions, whole or portion Ground is divided to generate according to process or function described in the embodiment of the present application.The computer can be general purpose computer, dedicated computing Machine, computer network obtain other programmable devices.The computer instruction can store in computer readable storage medium In, or from a computer readable storage medium to the transmission of another computer readable storage medium, for example, the computer Instruction can pass through wired (such as coaxial cable, optical fiber, number from a web-site, computer, server or data center User's line (DSL)) or wireless (such as infrared, wireless, microwave etc.) mode to another web-site, computer, server or Data center is transmitted.The computer readable storage medium can be any usable medium that computer can access or It is comprising data storage devices such as one or more usable mediums integrated server, data centers.The usable medium can be with It is magnetic medium, (for example, floppy disk, hard disk, tape), optical medium (for example, DVD) or semiconductor medium (such as solid state hard disk Solid State Disk (SSD)) etc..
Professional should further appreciate that, described in conjunction with the examples disclosed in the embodiments of the present disclosure Unit and algorithm steps, can be realized with electronic hardware, computer software, or a combination of the two, hard in order to clearly demonstrate The interchangeability of part and software generally describes each exemplary composition and step according to function in the above description. These functions are implemented in hardware or software actually, the specific application and design constraint depending on technical solution. Professional technician can use different methods to achieve the described function each specific application, but this realization It is not considered that exceeding scope of the present application.
Those of ordinary skill in the art will appreciate that implement the method for the above embodiments be can be with By program come instruction processing unit completion, the program be can store in computer readable storage medium, and the storage is situated between Matter is non-transitory (English:Non-transitory) medium, such as random access memory, read-only memory, flash Device, hard disk, solid state hard disk, tape (English:Magnetic tape), floppy disk (English:Floppy disk), CD (English: Optical disc) and any combination thereof.
The preferable specific embodiment of the above, only the application, but the protection scope of the application is not limited thereto, Within the technical scope of the present application, any changes or substitutions that can be easily thought of by anyone skilled in the art, Should all it cover within the scope of protection of this application.Therefore, the protection scope of the application should be with scope of protection of the claims Subject to.

Claims (10)

1. a kind of method for anti-counterfeit based on block chain technology, including:
Manufacturer's information handling step:Receive the name of product, production time stamp and the first number of a collection of product of manufacturer's input Amount, wherein first quantity indicates the total amount of this batch of product, generates the number of each product of this batch of product, based on life The private key of business men, the name of product, the production time stabs and the generation of the number of each product is corresponding with the product Key, and the name of product, first quantity and the production time stamp are broadcast to the node of block chain;
Product allocation step:Receive the supply of material instruction of manufacturer's input, wherein supply of material instruction is including manufacturer to dealer Second quantity of the product provided, according to the dealer region by the encryption key distribution equal with second quantity To the dealer, and second quantity is broadcast to the node of block chain;
Distributor information processing step:Receive the dealer storage record and sales figure, and by the storage record with The sales figure is broadcast to the node of block chain;With
User's checking step:It receives the user to request the activation of at least one product in this batch of product, line activating of going forward side by side is tested Card, the activation request includes the identification information of subscriber information message and dealer, after activation is verified, updates this batch production The quantity of activated product in product, and the result of verifying will be activated to be broadcast to the node of block chain.
2. described to be based on the method according to claim 1, wherein in manufacturer's information handling step The number of the private key of manufacturer, production time stamp and each product generates key:
Private key based on the manufacturer encrypts the number of name of product, production time stamp and each product, Ciphertext is obtained, the ciphertext is subjected to Hash operation, obtains key identical with first quantity.
3. described according to the warp according to the method described in claim 2, it is characterized in that, in the product allocation step The encryption key distribution equal with second quantity is included by pin quotient region to the dealer:According to where the dealer Region, the key is divided into section, wherein the number of key is continuous in the section, and close in the section The quantity of key is equal to second quantity.
4. according to the method in any one of claims 1 to 3, which is characterized in that the user's checking step includes:
Activation instruction receiving step:The user is received to the activation instruction of at least one product, the activation instruction packet It includes:Information, user information and the identification information of dealer of at least one product;With
Activation instruction verification step:According to the identification information of the dealer, the activation instruction is sent to the dealer, After the dealer confirms the activation instruction, after the confirmation message for receiving the dealer, sent out to the user Send activation successfully prompt and key corresponding at least one described product, so as to user according to the key check with it is described The relevant information of at least one product;With
Product quantity updates step:According to the quantity of user activated product, the number of activated product in this batch of product is updated Amount, and the result of verifying will be activated to be broadcast to the node of block chain.
5. according to the method described in claim 4, it is characterized in that, after the activation instruction receiving step, the user Verification step further includes:
Location information verification step:The location information that the activation instruction obtains the user is issued based on the user, in institute State dealer region belonging to location information and at least one described product it is inconsistent in the case where, generate abnormality warnings letter Breath.
6. a kind of anti-counterfeiting system based on block chain technology, including:
Manufacturer's message processing module, when being disposed for receiving name of product, the production of a collection of product of manufacturer's input Between stamp and the first quantity, wherein first quantity indicates the total amount of this batch of product, generates each product of this batch of product Number, the number of private key, the name of product based on manufacturer, production time stamp and each product generate with The corresponding key of the product, and the name of product, first quantity and the production time stamp are broadcast to block chain Node;
Product distribution module is disposed for receiving the supply of material instruction of manufacturer's input, wherein the supply of material instruction includes life Second quantity of the product that business men is provided to dealer, will be with the second quantity phase according to the dealer region Deng encryption key distribution give the dealer, and second quantity is broadcast to the node of block chain;
Distributor information processing module, is disposed for receiving storage record and the sales figure of the dealer, and by institute It states storage record and the sales figure is broadcast to the node of block chain;With
Subscriber authentication module is disposed for receiving activation request of the user at least one product in this batch of product, Line activating of going forward side by side verifying, the activation request include the identification information of subscriber information message and dealer, are verified in activation Afterwards, the quantity of activated product in this batch of product is updated, and the result of activation verifying is broadcast to the node of block chain.
7. system according to claim 6, which is characterized in that the subscriber authentication module includes:
Activation instruction receiving module is disposed for receiving the user to the activation instruction of at least one product, institute Stating activation instruction includes:Information, user information and the identification information of dealer of at least one product;With
Activation instruction confirmation module is disposed for the identification information according to the dealer, and the activation instruction is sent To the dealer, after the dealer confirms the activation instruction, after the confirmation message for receiving the dealer, Activation successfully prompt and key corresponding at least one described product are sent to the user, so that user is according to described close Key checks information relevant at least one described product;With
Product quantity update module is disposed for the quantity according to user activated product, updates and has swashed in this batch of product The quantity of product living, and the result of verifying will be activated to be broadcast to the node of block chain.
8. system according to claim 7, which is characterized in that the subscriber authentication module further includes location information verification mould Block, the activation instruction receiving module are connect with the location information verification module, and the location information verification module is configured to The location information that the activation instruction obtains the user is issued based on the user, in the location information and described at least one In the case that dealer region belonging to a product is inconsistent, abnormality warnings information is generated.
9. a kind of calculating equipment, including memory, processor and storage can be run in the memory and by the processor Computer program, wherein the processor is realized when executing the computer program such as any one of claims 1 to 5 institute The method stated.
10. a kind of computer readable storage medium, preferably non-volatile readable storage medium, are stored with computer journey Sequence, the computer program realize the method as described in any one of claims 1 to 5 when executed by the processor.
CN201810603327.6A 2018-06-12 2018-06-12 Super code anti-counterfeiting method and system based on block chain Pending CN108830617A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810603327.6A CN108830617A (en) 2018-06-12 2018-06-12 Super code anti-counterfeiting method and system based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810603327.6A CN108830617A (en) 2018-06-12 2018-06-12 Super code anti-counterfeiting method and system based on block chain

Publications (1)

Publication Number Publication Date
CN108830617A true CN108830617A (en) 2018-11-16

Family

ID=64144692

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810603327.6A Pending CN108830617A (en) 2018-06-12 2018-06-12 Super code anti-counterfeiting method and system based on block chain

Country Status (1)

Country Link
CN (1) CN108830617A (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109472604A (en) * 2018-12-07 2019-03-15 芯链(北京)科技有限公司 Antifake method for products and system based on real name block chain
CN110020824A (en) * 2019-04-09 2019-07-16 张�浩 Product stream information management system and method
CN110232574A (en) * 2019-05-07 2019-09-13 中国平安财产保险股份有限公司 Product Validation method, apparatus, equipment and storage medium based on block chain
CN110335051A (en) * 2019-07-03 2019-10-15 烟台市同翔网络科技有限责任公司 A kind of unique code publication of food labelling based on block chain major-minor chain technology and circulation source tracing method
CN110601815A (en) * 2019-09-17 2019-12-20 腾讯科技(深圳)有限公司 Block chain data processing method and equipment
CN110597836A (en) * 2019-09-19 2019-12-20 腾讯科技(深圳)有限公司 Information query request response method and device based on block chain network
CN111127037A (en) * 2019-12-19 2020-05-08 盐城工学院 Commodity universal anti-counterfeiting method based on block chain account system
CN111392303A (en) * 2020-03-18 2020-07-10 浙江冒个泡电子商务有限公司 Intelligent warehouse management method and system
CN111464499A (en) * 2020-03-06 2020-07-28 深圳壹账通智能科技有限公司 Electronic warehouse receipt tracing method and device, computer equipment and storage medium
WO2020223905A1 (en) * 2019-05-07 2020-11-12 林晖 Method for tracking product history
CN113393293A (en) * 2021-06-08 2021-09-14 深圳本地宝新媒体技术有限公司 Distribution method, authentication method, terminal and system of travel product

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102004986A (en) * 2010-10-26 2011-04-06 梁庆生 Product anti-counterfeiting method based on digital signature and public key system and verifying method
CN107220836A (en) * 2017-05-31 2017-09-29 无锡井通网络科技有限公司 A kind of block chain logistics based on Quick Response Code is traced to the source tracking method for anti-counterfeit
CN107341676A (en) * 2017-07-17 2017-11-10 深圳天净喔溯源科技有限公司 False proof mark and the method for tracing to the source
CN107679877A (en) * 2017-10-18 2018-02-09 上海唯链信息科技有限公司 A kind of cosmetics based on block chain technology are false proof and traceability system
US20180130050A1 (en) * 2016-11-07 2018-05-10 LedgerDomain, LLC Extended blockchains for event tracking and management

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102004986A (en) * 2010-10-26 2011-04-06 梁庆生 Product anti-counterfeiting method based on digital signature and public key system and verifying method
US20180130050A1 (en) * 2016-11-07 2018-05-10 LedgerDomain, LLC Extended blockchains for event tracking and management
CN107220836A (en) * 2017-05-31 2017-09-29 无锡井通网络科技有限公司 A kind of block chain logistics based on Quick Response Code is traced to the source tracking method for anti-counterfeit
CN107341676A (en) * 2017-07-17 2017-11-10 深圳天净喔溯源科技有限公司 False proof mark and the method for tracing to the source
CN107679877A (en) * 2017-10-18 2018-02-09 上海唯链信息科技有限公司 A kind of cosmetics based on block chain technology are false proof and traceability system

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109472604A (en) * 2018-12-07 2019-03-15 芯链(北京)科技有限公司 Antifake method for products and system based on real name block chain
CN110020824A (en) * 2019-04-09 2019-07-16 张�浩 Product stream information management system and method
WO2020223905A1 (en) * 2019-05-07 2020-11-12 林晖 Method for tracking product history
CN110232574A (en) * 2019-05-07 2019-09-13 中国平安财产保险股份有限公司 Product Validation method, apparatus, equipment and storage medium based on block chain
CN110335051A (en) * 2019-07-03 2019-10-15 烟台市同翔网络科技有限责任公司 A kind of unique code publication of food labelling based on block chain major-minor chain technology and circulation source tracing method
CN110335051B (en) * 2019-07-03 2023-12-19 烟台市同翔网络科技有限责任公司 Food tag unique code release and circulation tracing method based on block chain main and auxiliary chain technology
CN110601815A (en) * 2019-09-17 2019-12-20 腾讯科技(深圳)有限公司 Block chain data processing method and equipment
CN110597836A (en) * 2019-09-19 2019-12-20 腾讯科技(深圳)有限公司 Information query request response method and device based on block chain network
CN110597836B (en) * 2019-09-19 2023-10-27 腾讯科技(深圳)有限公司 Information inquiry request response method and device based on block chain network
CN111127037A (en) * 2019-12-19 2020-05-08 盐城工学院 Commodity universal anti-counterfeiting method based on block chain account system
CN111127037B (en) * 2019-12-19 2024-01-05 盐城工学院 Commodity universal anti-counterfeiting method based on blockchain account system
CN111464499A (en) * 2020-03-06 2020-07-28 深圳壹账通智能科技有限公司 Electronic warehouse receipt tracing method and device, computer equipment and storage medium
CN111392303A (en) * 2020-03-18 2020-07-10 浙江冒个泡电子商务有限公司 Intelligent warehouse management method and system
CN113393293A (en) * 2021-06-08 2021-09-14 深圳本地宝新媒体技术有限公司 Distribution method, authentication method, terminal and system of travel product

Similar Documents

Publication Publication Date Title
CN108830617A (en) Super code anti-counterfeiting method and system based on block chain
CN114902195B (en) Application program cooperation method, computer-readable storage medium, and application program cooperation system
US20230214792A1 (en) Computer implemented systems and methods
CN109819443B (en) Registration authentication method, device and system based on block chain
CN107979585B (en) Data processing method, application client and system
US20230004970A1 (en) Distributed Ledgers with Ledger Entries Containing Redactable Payloads
JP2020522927A (en) Blockchain for general calculation
CN107480964B (en) Directional transfer method for digital asset, central server and storage medium
WO2020015635A1 (en) Distributed voting system, method and apparatus, and computer device and readable storage medium
CN107679045A (en) Copyright authorization management method and system
CN106897902A (en) Service transacting method, system and trading server based on block chain technology
EP3763078B1 (en) Methods of electing leader nodes in a blockchain network using a role-based consensus protocol
US11533166B2 (en) Method for controlling distribution of a product in a computer network and system
CN111177800A (en) Data processing method and device based on block chain and electronic equipment
US11908273B2 (en) Playing card with electronic authenticator
CN112908442A (en) Medical data sharing method, device, equipment and computer readable medium
Daraghmi et al. A Blockchain‐Based Editorial Management System
Augusto et al. SoK: Security and Privacy of Blockchain Interoperability [Extended Version]
RU2707700C1 (en) Method of remote verification of documents
CN111931230A (en) Data authorization method and device, storage medium and electronic device
WO2023159203A2 (en) Systems and methods for abuse safeguards in nft-directed environments
CN112734455A (en) Prize exchanging result generating method, device and equipment and readable storage medium
CN112862466A (en) Resource transfer method, account settling terminal and server node
CN117061089B (en) Voting management method, device, equipment and storage medium
KR102309024B1 (en) Data Privacy-Preserving Distributed Knowledge Discovery system based on the Blockchain and Method thereof

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination