CN109544181A - Product false proof verification method and system - Google Patents

Product false proof verification method and system Download PDF

Info

Publication number
CN109544181A
CN109544181A CN201811383058.3A CN201811383058A CN109544181A CN 109544181 A CN109544181 A CN 109544181A CN 201811383058 A CN201811383058 A CN 201811383058A CN 109544181 A CN109544181 A CN 109544181A
Authority
CN
China
Prior art keywords
alliance
identification number
chain
electronic tag
enterprise
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201811383058.3A
Other languages
Chinese (zh)
Inventor
孟凡富
王建新
吴祥富
白绍江
靳佩佩
马歆裕
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201811383058.3A priority Critical patent/CN109544181A/en
Publication of CN109544181A publication Critical patent/CN109544181A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
    • G06K17/0022Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products

Abstract

The present invention discloses a kind of product false proof verification method and system.Using the product false proof verification method and system, the predetermined prod primary data in electronic tag, in verifying, client validation tool first obtains the preset product primary data of electronic tag, is then transferred to alliance's platform chain;Owned enterprise and electronic tag identification number are first verified by the identification of predetermined alliance's chain node, carry out preliminary identification;Then, then enterprises end verification result is obtained by comparison related data by verification management system and generates enterprises end antiforge authentication data packet, and enterprises end antiforge authentication data packet is passed back into alliance's platform chain;After predetermined alliance's chain link point through alliance's platform chain carries out verifying signature, alliance's chain antiforge authentication data packet is fed back to requests verification side, and using the signature of alliance's chain antiforge authentication data packet described in predetermined public key verifications and export verification result.Product false proof verification method and system are proposed based on the combination of alliance's chain, electronic tag and cryptographic algorithm, with higher reliability.

Description

Product false proof verification method and system
Technical field
The present invention relates to product false proofs to verify field, more particularly to a kind of anti-in conjunction with electronic tag using block chain Pseudo- verification method and system.
Background technique
The personation of poor quality (anti-fake) that product is prevented by mode appropriate or means is modern product management and supply chain pipe A kind of important means of reason.Anti-counterfeiting technology is to the manufacture of containment fakement, promotion product image degree, guarantee company interest, Maintenance Market Justice plays very important effect.
The products antifake technique of current main-stream is broadly divided into physical security and two kinds of two-dimension code anti-counterfeit.Below below for this Two kinds of anti-counterfeiting technologies carry out principles and are simply introduced, and (loophole) progress simple analysis the problem of there is:
1. physical security
Physical security is the physical features with physical features present on antifalsification label or being specially arranged on antifalsification label As anti-counterfeiting mark.When carrying out fake certification, the anti-counterfeiting mark on antifalsification label is carried out with predetermined Datum identifier Comparison;If anti-counterfeiting mark is consistent with Datum identifier or is consistent, judge the product with the antifalsification label as certified products;If phase Instead, then judge the product with the antifalsification label as fakement.
By the way that the uniqueness of anti-counterfeiting mark may be implemented to the special setting as anti-counterfeiting mark physics feature;By right The processing of anti-counterfeiting mark physics feature can increase the difficulty of reproduction of anti-counterfeiting mark, and then realize the reliability of physical security.
Currently, different according to the mode of anti-counterfeiting mark, method is formed, there is that laser anti-counterfeit, chemical ink are anti-fake, texture is anti- The pseudo-, modes such as latent image is anti-fake.
2. two-dimension code anti-counterfeit
Two dimensional code is arranged in two-dimension code anti-counterfeit technology on antifalsification label, contains data relevant to product in two dimensional code.? When verifying, antifalsification label on product is attached to by scanning, identifies the related data of the available product of two dimensional code;Then it will obtain Access evidence is sent to and preset enterprise verification system;The product benchmark that enterprise verification system stores the data received with it Data compare, distinguished according to the consistency of comparing result or compatibility adhere to the antifalsification label product be certified products, also It is fakement.
Although existing anti-counterfeiting technology can realize the purpose for distinguishing certified products or fakement to a certain extent, with miniature , there is the risk being replicated in technology and reproduction technology development.
Using the method for physical security, a possibility that physical features as anti-counterfeiting mark are replicated, is increasing.It fakes Person can have the anti-counterfeiting mark of same physical feature by known reprography, and be formed counterfeit with same physical feature Product label.It is basic using existing verification mode by the fakement label as (be attached to or adhere in other ways) is on fakement It is unable to reach the purpose for distinguishing certified products and wild goose product.
Two dimensional code is in the way of fixed coding rule storing data.Fake producer is by taking pictures, duplicating or reading number The available fakement label completely the same with certified products two dimensional code on certified products antifalsification label of the means such as two dimensional code is regenerated after. When such fakement label can identify equipment scanning recognition by barcode scanning, fakement can be also identified as certified products, and then be unable to reach Distinguish the purpose of certified products and wild goose product.
Therefore, anti-fake reliability how is improved, is still the technical problem that those skilled in the art need to solve.
Summary of the invention
The present invention proposes a kind of method and system of the product false proof verifying of innovation for the pain spot of current anti-counterfeiting technology, System and method is verified in product false proof i.e. based on block chain, electronic tag and cryptographic algorithm, product false proof verifying Method and system has higher reliability.
Product false proof verification method provided by the invention, product to be verified are provided with electronic tag, and the electronic tag is pre- It is equipped with product primary data, the product primary data includes electronic tag identification number and enterprise's identification number;The electronic tag Identification number and enterprise's identification number all have uniqueness;
The product false proof verification method the following steps are included:
S210, client validation tool obtains the preset product primary data of electronic tag, and the product that will acquire is initial Data and Client identification data are transferred to predetermined alliance's chain node of predetermined alliance's platform chain;The Client identification data packet Containing client identification number, client certificate serial number;
S220, predetermined alliance's chain node identify enterprise's identification number in product primary data, and according to preset enterprise's base Calibration information database and scheduled strategy judge whether enterprise's identification number is legal;If it is, entering step S230;It is described Client identification data includes client identification number, client certificate serial number;
Whether S230, predetermined alliance's chain node are legal according to the electronic tag identification number that predetermined policy judgement receives;Such as Fruit is that the product primary data and Client identification data are then transmitted to scheduled verification management system according to preset strategy System, enters step S240;
S240, the production that scheduled verification management system is stored the received product primary data with it by predetermined policy Product reference data compares and generates enterprises end antiforge authentication data packet, and enterprises end antiforge authentication data packet is passed back to institute State alliance's platform chain;The enterprises end antiforge authentication data packet includes Client identification data and enterprises end verification result, utilizes Preset private key is to enterprises end verification result signature signed data obtained and electronic tag identification number;
S250, after predetermined alliance's chain link point of alliance's platform chain receives the enterprises end antiforge authentication data packet, benefit The signed data is verified with preset public key;If the verification passes, then enterprises end is verified using preset private key As a result it signs with Client identification data, and it is anti-fake that signed data, enterprises end verification result be saved in alliance's chain Authentication data packet enters step S260;
S260, client validation tool utilize the number of signature in alliance's chain antiforge authentication data packet described in predetermined public key verifications According to and export verification result.
In optimal technical scheme, the step S250 specifically includes the following steps:
S251, after predetermined alliance's chain link point of alliance's platform chain receives enterprises end antiforge authentication data packet, using pre- The public key set verifies signed data in the enterprises end antiforge authentication data packet;If the verification passes, then using preset Private key sign to the enterprises end verification result and Client identification data, and by signed data, enterprises end verifying knot Fruit is saved in alliance's chain antiforge authentication data packet, enters step S252;
S252, it is pre- that predetermined alliance's chain node judges whether the signed data in alliance's chain antiforge authentication data packet meets Provisioning request;If it is not, then S253 will be entered step;If it is, entering step S254;
S253, predetermined alliance's chain node is by alliance's chain antiforge authentication data packet and the enterprises end antiforge authentication data Packet is sent to another predetermined alliance's chain node, which executes step S251 and step S252;
S254 feeds back alliance's chain antiforge authentication data packet.
In further optional technical solution, in the step S252, judges that alliance's chain is anti-fake and recognize verify data packet In signed data is to fake certification data verification and whether alliance's chain node for signing meets pre-provisioning request, it is specifically following in One of hold:
(1) whether alliance's chain node that judgement forms the signed data reaches scheduled quantity;
(2) judgement forms whether alliance's chain node of the signed data includes scheduled alliance's chain node.
In further optional technical solution, enterprise's reference information database includes enterprise's identification number;
In the step S220, judge that enterprise identifies according to preset enterprise's reference information database and scheduled strategy Number legitimacy corresponding enterprise's identification number is specifically inquired in enterprise's reference information database;If inquiry It arrives, then judges enterprise's identification number to be legal.
In further optional technical solution, enterprise's reference information database further includes corresponding enterprise's identification number The predetermined attribute of the electronic tag identification number of storage;
In the step S230, whether the electronic tag identification number received according to predetermined policy judgement is legal, specifically It is to determine the predetermined of the electronic tag identification number of corresponding storage in enterprise's reference information database based on enterprise's identification number Attribute, and judge whether the electronic tag identification number meets the predetermined attribute, if it is, judging that electronic tag identification number closes Method.In further optional technical solution, the electronic tag identification number is product number, the electronic tag identification number it is pre- Determining attribute is electronic tag identification number ranges parameter;
In the step S230, it is pre- to judge whether electronic tag identification number described in the product primary data meets this Determine attribute, specifically, judges whether the product number meets the electronic tag identification number ranges parameter.
System is verified in product false proof provided by the invention, including electronic tag, client validation tool, alliance's platform chain and Verification management system:
Electronic tag, the electronic tag are attached on product to be certified, and preset product primary data, the product Primary data includes electronic tag identification number and enterprise's identification number;The electronic tag identification number and enterprise's identification number have There is uniqueness;
Client validation tool is provided with processor, output module and communication module;The processor is suitable for passing through institute It states communication module and obtains the product primary data from the electronic tag, and made a reservation for by the communication module to scheduled Product initial data packets and Client identification data described in alliance's chain node-node transmission of alliance's platform chain;The client identification number According to including client identification number, client certificate serial number;It applies also for flat from alliance's chain by the communication module After predetermined alliance's chain node of platform obtains alliance's chain antiforge authentication data packet of feedback, predetermined public key verifications anti-fake certificate is utilized The signature of data packet, and verification result is exported by the output module;
Alliance's platform chain, including the multiple alliance's chain nodes being connected by communication;
In multiple alliance's chain nodes, at least partly preset node verification program of alliance's chain node;The node verification program Suitable for being executed by processor as given an order: identifying enterprise's identification number described in the product primary data received and electronic tag mark Whether knowledge number closes according to enterprise's identification number that preset enterprise's reference information database and scheduled strategy judgement receive Method, if it is, judging the electronic tag mark received according to preset enterprise's reference information database and predetermined policy Whether knowledge number is legal;If it is, the product primary data and Client identification data be transmitted to according to preset strategy pre- Fixed verification management system;
In multiple alliance's chain nodes, at least partly preset verifying signature procedure of alliance's chain node;The verifying signature procedure Suitable for being executed by processor as given an order: being verified, tested using signed data of the preset public key to antiforge authentication data packet Demonstrate,prove the authenticity of signed data in antiforge authentication data packet;If the verification passes, then enterprises end is verified using preset private key As a result it signs with Client identification data, and signed data, enterprises end verification result is saved in alliance's chain anti-fake certificate Data packet, and alliance's chain antiforge authentication data packet is sent to the client validation tool by preset strategy;
Verification management system, including enterprises end communication module and data verifying program;The data verifying program is suitable for quilt Processor is executed and is such as given an order: the product benchmark data stored the received product primary data with it by predetermined policy into Row comparison obtains enterprises end verification result;Then enterprises end antiforge authentication data packet is formed, and by enterprises end antiforge authentication data Packet passes back to predetermined alliance's chain node of predetermined alliance's platform chain;The enterprises end antiforge authentication data packet includes client identification Data and enterprises end verification result sign signed data and electronics obtained to enterprises end verification result using preset private key Tag identification number.
In further technical solution, the verifying signature procedure is suitable for being executed by processor as given an order: utilizing preset Public key the signature of enterprises end antiforge authentication data packet is verified, verify antiforge authentication data packet in signed data it is true Property;If the verification passes, then it is signed, will be signed to enterprises end verification result and Client identification data using preset private key Name data, enterprises end verification result are saved in alliance's chain antiforge authentication data packet, and further judge that alliance's chain is anti-fake Whether signed data described in authentication data packet meets pre-provisioning request;If it is, by preset strategy that alliance's chain is anti-fake Authentication data packet feeds back to the client validation tool;If it is not, then pressing preset strategy for enterprises end antiforge authentication data packet Scheduled alliance's chain node is sent to alliance chain antiforge authentication data packet.
In further technical solution, enterprise's reference information database includes described in multiple enterprise's identification numbers and correspondence The predetermined attribute of the electronic tag identification number of enterprise's identification number storage;
The node verification program is executed by processor the legitimacy for judging enterprise's identification number, specifically, in the enterprise Corresponding enterprise's identification number is inquired in reference information database;If inquired, judge enterprise's identification number to be legal;
Whether the node verification program is executed by processor the electronic tag identification number that receives of judgement legal, specifically It is to determine the predetermined of the electronic tag identification number of corresponding storage in enterprise's reference information database based on enterprise's identification number Attribute, and judge whether electronic tag identification number described in the product primary data meets the predetermined attribute, if it is, sentencing It is legal to power off subtab identification number.
In further technical solution, it is product number that the electronic tag, which knows identification number,;
In enterprise's reference information database, the predetermined attribute of the electronic tag identification number is electronic tag identification number Range parameter;
The node verification program is executed by processor, and judges electronic tag identification number described in the product primary data Whether meet predetermined attribute, concrete operations are: judging whether the product number meets the electronic tag identification number ranges ginseng Number.
Using the said goods anti-counterfeit authentication method, electronic tag authenticity is guaranteed by multiple form, if fake producer is pseudo- Manufacturing enterprise or electronic tag identification number are made, is sentenced by the legitimacy of enterprise's identification number validity judgement and electronic tag identification number It is disconnected to distinguish fakement;If fake producer forges enterprises end (verification management system), also can not testing by alliance's platform chain Card;If really electronic tag be attached on fakement, by the verifying historical data in verification result, can also feed back to Verify the warning that product may be fakement.Therefore, anti-fake reliability can be improved using the product false proof verification method.
Detailed description of the invention
Fig. 1 is the flow diagram for the product false proof verification method that the embodiment of the present invention one provides.
Fig. 2 is that second embodiment of the present invention provides the method flow diagrams of product false proof verification method.
Fig. 3 is that system logic block diagram is verified in a kind of product false proof provided in an embodiment of the present invention.
Specific embodiment
With reference to the accompanying drawing, the present invention is described in further detail, but the specific embodiment is not used to limit Protection scope of the present invention.
In this document, " uniqueness " is the uniqueness in corresponding verifying system or during verification method.
Referring to FIG. 1, the figure is the flow diagram for the product false proof verification method that the embodiment of the present invention one provides.
In order to implement the above-mentioned product false proof verification method, electronic tag can be set in product to be verified.Electronic tag Can be attached in a suitable manner on product to be verified, can such as be attached in product itself to be verified, can also be attached to Verify product packing material on, can also be attached to product to be verified other on article.
Electronic tag presets product primary data, and the product primary data may include electronic tag identification number and enterprise Industry identification number;The electronic tag identification number and enterprise's identification number all have uniqueness;And electronic tag identification number and produce Product can have one-to-one relationship.In one embodiment, electronic tag identification number can be the production number of product.When So, according to actual needs, product primary data also may include other other informations relevant to product, and such as name of product produces Product number, keeping life and product status information etc..
Certainly, it in order to guarantee product primary data safety in electronic tag, prevents from arbitrarily being distorted, it can be provided read-only Data;Certainly, for the convenience of upgrading products primary data, also can be set into it is readable can WriteMode;It can also be by known formula Related technical measures are arranged in formula, guarantee that write-in, renewal authority are legal.
Based on the electronic tag, the product false proof verification method that the embodiment of the present invention one provides be may comprise steps of:
S210, client validation tool obtain product primary data preset in electronic tag, and at the beginning of the product that will acquire Beginning data and Client identification data are transferred to predetermined alliance's chain node of predetermined alliance's platform chain;The Client identification data Include client identification number, client certificate serial number.
It can use the product primary data in known way reading electronic tag, can such as be read using non-contacting mode Product primary data is taken, such as NFC (near-field communication, Near Field Communication) or RFID (radio frequency identification, Radio Frequency Identification) mode reads product primary data.
Obtaining client validation tool can be special equipment, installs the common apparatus for being suitble to software or program, can be with It is that the mobile phone for being suitble to APP is installed.
Client identification number can be preset in client validation tool in case of calling, can also be raw according to pre-defined rule At.Client certificate serial number is generated using counter, every once to be authenticated, and the numerical value of counter is made to add 1;Certainly, may be used To generate random unduplicated random number as client certificate serial number.
Enterprise's identification number in the predetermined alliance's chain node identification product primary data of S220, and according to scheduled strategy Judge whether enterprise's identification number is legal;If it is, entering step S230.
After obtaining product primary data, these data are transferred to predetermined alliance's platform by known methods;It can be with Understand, in order to guarantee the safety of data transmission and complete, data transmission can carry out data by preparatory strategy and agreement corresponding Processing.
The specific alliance's chain node for receiving data can be determined by predetermined strategy or mode, for example, can be by alliance Currently the know together host node in period of platform chain receives, can also be by previously selected sequence to predetermined alliance's chain node-node transmission number According to;Alliance's chain node of data can also be received according to attribute (device type, position, APP are numbered) selection of uploading device;Also Suitable device can be set in alliance's platform chain, by alliance's chain that scheduled strategy is suitable to the selection of alliance's chain link dotted state Node receives data.
In the present embodiment, it is illustrated by taking alliance chain node A as an example.It should be noted that being verified in a product false proof In method implementation process, data processing can be handled by alliance's chain link point, can also be by different alliance's chain nodes Respective handling is carried out, no longer distinguishing property describes in this part.
In order to guarantee going on smoothly for product false proof verification method in embodiment one, need in at least portion of alliance's platform chain Divide preset basic data in alliance's chain node.Alliance chain node A can be produced with preset corresponding units, software or instruction set with identifying Enterprise's identification number in product primary data, and judge whether enterprise's identification number is legal according to scheduled strategy.This reality It applies in example, the enterprise of product to be verified can be registered in the corresponding entrance of alliance's platform chain, and upload corresponding company information. After through the audit of the predetermined mechanisms of alliance's platform chain, corresponding enterprise can upload business code or other data and enterprise identifies Number and the corresponding data of electronic tag identification number, and known block chain technology is pressed, according to default in multiple alliance's chain nodes Common recognition mechanism, corresponding data is synchronized in corresponding alliance's chain node, formed enterprise's reference information database;Multiple enterprises Enterprise's reference information database (including complete business data or business data abstract) of industry stores in block form and shape At block data chain, to provide data basis for the further data processing of corresponding alliance's chain link point.
Certainly, alliance's platform chain can also distribute or automatically generate according to actual needs corresponding enterprise to registered enterprise and mark Knowledge number.
It, can be according to predetermined after alliance chain node A identifies enterprise's identification number in product primary data in the step Strategy judge whether enterprise's identification number legal, that is, the enterprise for judging whether to belong on alliance's platform chain registration and passing through through audit Industry product carries out preliminary verifying.Scheduled strategy can be selected according to actual needs, as enterprise's identification number formats whether Identical as alliance's predetermined format of platform chain or be consistent, whether enterprise's identification number includes specific message field etc..
In the present embodiment, alliance chain node A presets enterprise's reference information database, enterprise's reference information database Including enterprise's identification number.In this way, alliance chain node A can inquire phase in enterprise's reference information database in step S220 Corresponding enterprise's identification number;If inquired, judge enterprise's identification number to be legal;If inquiry is less than can sentence Break the production enterprise be it is illegal, which, which is not registered and audited on alliance's platform chain, passes through, and directly feedback is illegal Prompt warns identifier, which is not the product that alliance's platform chain can be verified.It on the one hand can submit in this way On the other hand verification efficiency avoids redundancy process.
In the embodiment of the present invention, alliance's platform chain is used not only for verifying a certain enterprise product true and false, can be used for testing Demonstrate,prove the true and false of many enterprises' product;It therefore, can be more with parallel memorizing in enterprise's reference information database of corresponding alliance's chain node Enterprise's identification number of a enterprise.
Whether S230, predetermined alliance's chain node are legal according to the electronic tag identification number that predetermined policy judgement receives;Such as Fruit is that the product primary data and Client identification data are then transmitted to scheduled verification management system according to preset strategy System, and enter step S240.
In alliance chain node A, by the verifying of enterprise's identification number, only prove that product owned enterprise to be verified is the alliance Platform chain registers user, not can prove that the product to be verified is certified products or genuine piece;Therefore, it is necessary to further verify electronic tag Whether identification number is legal.
Identical as the verifying strategy of enterprise's identification number, the whether legal strategy of verifying electronic tag identification number can be according to reality Border is selected, and details are not described herein.
In the present embodiment, enterprise's reference information database of alliance chain node A further includes that corresponding enterprise's identification number is deposited The predetermined attribute of the electronic tag identification number of storage.In step S230, alliance chain node A can be based on enterprise's identification number described The predetermined attribute of the electronic tag identification number of corresponding storage is determined in enterprise's reference information database, and judges that the product is initial Whether electronic tag identification number described in data meets the predetermined attribute, if it is, judging that electronic tag identification number is legal.
Certainly, the predetermined attribute of electronic tag identification number can be scheduled field format according to actually being selected And the specific data of scheduled field, it is also possible to length, format etc..In the present embodiment, electronic tag identification number is product volume Number;The predetermined attribute of electronic tag identification number can be electronic tag identification number ranges parameter, i.e., corresponding enterprise can be to alliance Platform chain uploads product electronic tag identification number ranges;When judging whether electronic tag identification number is legal, it can be determined that product Whether the electronic tag identification number in primary data is within the electronic tag identification number ranges of upload.Such as the electronic tag of upload Identification number ranges parameter is 13456-34568.If the electronic tag identification number in fruit product primary data is within the scope of this, It may determine that the electronic tag identification number is legal;It otherwise, is exactly illegally.
If it is determined that electronic tag identification number be it is illegal, then can directly feed back illegal prompt, warn identifier, this is to be tested Card product belongs to fakement.
If it is determined that electronic tag identification number be it is legal, then by preset strategy by the product primary data and client mark Know the verification management system that data forwarding is controlled to scheduled enterprise, and enters step S240.Verification management system address can be with It is obtained by known technology, for example verification management corresponding with enterprise's identification number can be prestored in preset database systematically Location is looked into according to enterprise's identification number and takes verification management system address, and the product primary data received is transmitted to corresponding enterprise and is controlled The verification management system of system;It can also be using verification management system address as enterprise's identification number, in turn, just according to enterprise's identification number It can determine verification management system address.
S240, the production that scheduled verification management system is stored the received product primary data with it by predetermined policy Product reference data compares and generates enterprises end antiforge authentication data packet, and enterprises end antiforge authentication data packet is passed back to pre- Determine predetermined alliance's chain node of alliance's platform chain, the enterprises end antiforge authentication data packet may include Client identification data and Enterprises end verification result signs signed data obtained and electronic tag mark to enterprises end verification result using preset private key Knowledge number.Enterprises end antiforge authentication data packet includes that electronic tag identification number can provide conveniently for output verification result.
Verification management system can be the special equipment by enterprise's control or load the common apparatus for being suitble to software or instruction, The product benchmark data that the received product primary data is stored with it are compared and are compared by verification management system As a result strategy can be carried out according to known technology, and details are not described herein.
Enterprises end verification result can be generated according to comparing result in verification management system;It, can be in order to guarantee data security Ciphering signature is carried out with preset private key, forms signed data.It can be by Client identification data and enterprises end verification result, benefit Enterprises end anti-fake certificate is packed into signed data and electronic tag identification number of the preset private key to enterprises end verification result Data packet.Enterprises end antiforge authentication data packet can also include that product property to be verified judges, can also include verifying history number According to (previous verification time, number, position, mode and other information);Certain enterprises end antiforge authentication data packet can according to Verifying products characteristics, place industry situation are specifically set.
S250, after predetermined alliance's chain link point of alliance's platform chain receives enterprises end antiforge authentication data packet, using pre- The public key set verifies the signed data of enterprises end antiforge authentication data packet, verifies and signs in enterprises end antiforge authentication data packet The authenticity of name data;If the verification passes, then using preset private key to enterprises end verification result and from client certificate work Have the Client identification data that receives to sign, and it is anti-fake that signed data and enterprises end verification result be saved in alliance's chain Authentication data packet, and alliance's chain antiforge authentication data packet is fed back, enter step S260.
In the case where authentication failed, illustrate that enterprises end antiforge authentication data packet may be forged and distort, it is also possible to test Management system is demonstrate,proved as the control of illegal enterprise;At this point it is possible to feed back illegal prompt, it is of course also possible to carry out other respective handlings or Operation, the verification management system such as controlled to enterprise send error message, it is desirable that verification management system carries out confirmation or other phases It should operate.
It is appreciated that the verifying signature operation of predetermined alliance's chain node (such as alliance's chain node B) of alliance's platform chain (utilizes Preset public key can verify the signed data in the enterprises end antiforge authentication data packet, and enterprises end is anti-fake recognizes for verifying Demonstrate,prove the authenticity of signed data in data packet;If the verification passes, then using preset private key to enterprises end verification result and visitor Family end mark data is signed, and the signed data of formation, enterprises end verification result are saved in alliance's chain anti-fake certificate number According to packet, make the signed data in alliance's chain antiforge authentication data packet with multiple alliance's chain nodes) that alliance's chain can be improved is anti-fake Authentication data packet safety avoids or reduces the abduction to alliance's chain antiforge authentication data packet, forges and distort.Certainly, described The private key of preset public key and corresponding verification management system can form asymmetric key pair, and asymmetric key pair can be in enterprise It is generated in the registration of alliance's platform chain, can also be automatically generated or be regularly updated by predetermined mechanisms.
S260, client validation tool utilize the signed data of predetermined public key verifications alliance chain antiforge authentication data packet and defeated Verification result out.
After the alliance's chain antiforge authentication data packet for receiving feedback, it can be based on enterprises end verification result, and call currently Client identification data, using the signed data of predetermined public key verifications alliance chain antiforge authentication data packet and by verification result with suitable When mode export, allow identifier obtain verification result.The Client identification data for participating in signature verification should be recognized with client The Client identification data that card tool initially issues alliance's platform chain is identical.Enterprise can be determined by verifying signed data verifying Holding verification result, whether consistent and Client identification data is legal.
Corresponding with the process of signed data is formed, specific verification process is as follows:
(1) the client certificate tool alliance's chain node public key prestored restores the label in alliance's chain antiforge authentication data packet Name data, obtain the cryptographic Hash of data;
(2) client certificate tool is to the enterprise verification knot in Client identification data and alliance's chain antiforge authentication data packet Fruit carries out Hash operation, obtains cryptographic Hash and compared with the cryptographic Hash restored from signed data, if they are the same, is then verified, Otherwise, authentication failed.
The step can be carried out in terminal appropriate, can such as be operated on the mobile phone for installing appropriate APP.Certainly, Predetermined public key can have it is multiple, with on predetermined alliance's chain node encryption key formed asymmetric key pair, with verification management The private key of system forms asymmetric key pair;These asymmetric key pairs can be pre-generated by predetermined policy, can also be by pre- Determine mechanism to automatically generate or regularly update.
Using the said goods anti-counterfeit authentication method, electronic tag authenticity can be guaranteed by multiple form.If faked Person forges manufacturing enterprise or electronic tag identification number, passes through the legal of enterprise's identification number validity judgement and electronic tag identification number Property judgement can distinguish fakement and genuine piece;If fake producer forges verification management system, it can not also pass through alliance's platform chain Verifying;If real electronic tag is attached on fakement, pass through verifying historical data (enterprise's control terminal in verification result The verifying history of identical electronic label is saved, and includes verifying historical data in verification result), production to be verified can also be exported Product may be the warning of fakement;By the verifying for the signed data that client certificate tool returns to alliance's chain, can prevent pair The Replay Attack of alliance's chain antiforge authentication data packet;The data being signed are the dynamic numbers comprising client certificate serial number According to, can pass through client certificate serial number confirm authentication data reliability and authenticity.Therefore, it is tested using the product false proof Anti-fake reliability can be improved in card method.
Based on a kind of default mechanism of alliance's platform chain, in a common recognition period in office, as alliance's platform chain host node Alliance's chain node has randomness;The randomness is it is also ensured that verify the reliability of signature operation.There is difference for difference Alliance's platform chain of default mechanism, in order to avoid predetermined alliance's chain node attack to alliance's platform chain or is distorted, can be preset The election or specified mechanisms of corresponding alliance chain node elect or specify at random corresponding alliance's chain link point to carry out above-mentioned verifying signature behaviour Make.It is of course also possible to set predetermined condition, in the case where meeting pre-provisioning request, alliance's chain antiforge authentication data packet is fed back;Not Meet pre-provisioning request, does not feed back alliance's chain antiforge authentication data packet.Referring to FIG. 2, the figure is that second embodiment of the present invention provides productions The method flow diagram of product anti-counterfeit authentication method.
Compared with embodiment one, step S250 is further included steps of
S251, after predetermined alliance's chain link point of alliance's platform chain receives enterprises end antiforge authentication data packet, using pre- The public key set verifies the signed data of enterprises end antiforge authentication data packet, verifies and signs in enterprises end antiforge authentication data packet The authenticity of name data;If the verification passes, then using preset private key to enterprises end verification result and from client certificate work Have the Client identification data that receives to sign, signed data, enterprises end verification result be saved in alliance's chain is anti-fake to be recognized Data packet is demonstrate,proved, S252 is entered step.
S252, it is pre- that predetermined alliance's chain node judges whether the signed data in alliance's chain antiforge authentication data packet meets Provisioning request;If it is not, then S253 will be entered step;If it is, entering step S254.
Alliance's chain antiforge authentication data packet and enterprises end antiforge authentication data packet are sent to by S253, predetermined alliance's chain node Another predetermined alliance's chain node, another predetermined alliance's chain node execute step S251 and step S252, sign again, shape It at signed data, is saved in alliance's chain antiforge authentication data packet, updates the data of alliance's chain antiforge authentication data packet.
Above-mentioned steps are repeated, until alliance's chain node that alliance's chain antiforge authentication data packet is verified and signed meets Pre-provisioning request enters step S254.
S254 feeds back alliance's chain antiforge authentication data packet, it can to client validation tool feedback, alliance's chain is anti-fake recognizes Demonstrate,prove data packet.
In the embodiment of the present invention, judge whether alliance's chain node that enterprises end antiforge authentication data packet is verified and signed is full Whether sufficient pre-provisioning request, specifically, alliance's chain node that judgement forms signed data reach scheduled quantity.I.e. enterprises end is verified As a result it is signed by the verifying of how many a alliance's chain nodes.If reaching predetermined quantity by alliance's chain node of verifying signature, It can think, a possibility which is tampered is lower, may With higher credibility, the advantage of alliance's platform chain is played.
Whether alliance's chain node that judgement forms signed data, which reaches scheduled quantity, can adopt in a known manner.This reality It applies in example, pointer data N can be embedded in the message data for including enterprises end antiforge authentication data packet, often passes through an alliance The verifying of chain node is signed, and N=N+1 is made;And default predetermined quantity is M (M is not less than 2).The connection of signed data is formed in judgement When whether alliance's chain node reaches scheduled quantity, judge whether N is more than or equal to M;When N is more than or equal to M, judgement forms number of signature According to alliance's chain node reach scheduled quantity, execute step S254;When N is less than M, judgement forms alliance's chain of signed data Node is not up to scheduled quantity, executes step S253.
It is of course also possible to be determined according to (such as alliance's chain node number of signatures) the characteristics of conveying data between alliance's chain node The quantity of alliance's chain node of signed data is formed, and then the alliance's chain link point for judging whether there is predetermined quantity carries out verifying label Name.
Using above-mentioned steps S251 and step S252, if a certain alliance's chain node is anti-fake to enterprises end in alliance's platform chain Authentication data packet (such as enterprises end verification result) is distorted, and be will lead to alliance's chain node that other participate in verifying and is unable to complete Verify signature operation, at this time alliance's platform chain will return invalid information prompt, remind user's information be it is suspicious, in turn, benefit It can guarantee verification the verifying results with the product false proof verification method.
Certainly, whether alliance's chain node that judgement forms signed data meets pre-provisioning request, can also be predetermined using other Strategy, such as: alliance's chain node of specific (position, rank or predetermined) can be set on alliance's platform chain, only pass through the spy Determine just execute step S254 after the verifying signature of alliance's chain node.It is appreciated that predetermined alliance's chain node can be Product enterprise specifies alliance's chain node, is also possible to specially be provided with the higher alliance's chain node of rank, can also be by predetermined Alliance's chain node that mechanism is selected at random.Such mechanism improves product false proof verifying it is also ensured that verification result authenticity Reliability.
On the basis of providing the said goods anti-counterfeit authentication method, the embodiment of the present invention also provides a kind of product false proof verifying System.It should be noted that product false proof verification method provided by the invention is not limited to using product false proof provided by the invention Verifying system can also be implemented using other corresponding systems.
Referring to FIG. 3, the figure is a kind of product false proof verifying system logic block diagram provided in an embodiment of the present invention.
It includes electronic tag, client validation tool, alliance's platform chain and verification management system that system is verified in the product false proof System.
The electronic tag is attached on product to be verified, can have one-to-one relationship with product to be verified.Electronics Label presets product primary data, and the product primary data includes electronic tag identification number and enterprise's identification number;The electricity Subtab identification number and enterprise's identification number all have uniqueness.
Client validation tool is provided with processor, output module and communication module;The processor is suitable for passing through institute It states communication module and obtains the product primary data from the electronic tag, and made a reservation for by the communication module to scheduled Product initial data packets and Client identification data described in alliance's chain node-node transmission of alliance's platform chain;The client identification number According to including client identification number, client certificate serial number;It applies also for flat from alliance's chain by the communication module After predetermined alliance's chain node of platform obtains alliance's chain antiforge authentication data packet of feedback, predetermined public key verifications anti-fake certificate is utilized Signed data in data packet, and verification result is exported by the output module.
Client validation tool can be special equipment, install the common apparatus for being suitble to software or program, can also be peace Fill the mobile phone for being suitble to APP.When carrying out product false proof verification operation, client validation tool mainly executes that the said goods are anti-fake to be tested Step S210, S260 in card method, working method repeat no more.
Electronic tag and client validation tool should be mutually matched, to carry out data interaction.As electronic tag can wrap Include RFID label tag;RFID label tag may include circuit unit and antenna element, the preset product initial number of circuit unit According to.The communication module of client validation tool may include reading circuit unit and reading antenna unit;The reading antenna list When first antenna element with the RFID label tag couples, the available product primary data of client validation tool.
Alliance's platform chain may include the multiple alliance's chain nodes being connected by communication.
In multiple alliance's chain nodes, at least partly preset node verification program of alliance's chain node;The node verification program Suitable for being executed by processor as given an order: identifying enterprise's identification number described in the product primary data received and electronic tag mark Whether knowledge number closes according to enterprise's identification number that preset enterprise's reference information database and scheduled strategy judgement receive Method;If it is, whether legal according to the electronic tag identification number that predetermined policy judgement receives;If it is determined that the electricity Subtab identification number is legal, then is transmitted to the product primary data and Client identification data according to preset strategy scheduled Verification management system.
In multiple alliance's chain nodes, at least partly preset verifying signature procedure of alliance's chain node;The verifying signature procedure Suitable for being executed by processor as given an order: being verified, tested using signed data of the preset public key to antiforge authentication data packet Demonstrate,prove the authenticity of signed data;If the verification passes, then using preset private key to enterprises end verification result and client identification Data are signed, and signed data, enterprises end verification result are saved in alliance's chain antiforge authentication data packet, and by default plan Alliance's chain antiforge authentication data packet is slightly sent to the client validation tool.
According to foregoing description, it will be understood that the preset node verification program of any alliance's chain node and verifying can be allowed to sign Name program.When carrying out product false proof verification operation, scheduled alliance's chain node mainly executes the said goods anti-counterfeit authentication method In step S220, S230 and S250, working method repeat no more.
Verification management system can by the manufacturing enterprise of corresponding product control or hold, as enterprises end carry out using, with Guarantee that corresponding enterprise controls verify data.
Verification management system may include data verifying program;The data verifying program is suitable for being executed by processor as follows Instruction: the product benchmark data that the received product primary data is stored with it are compared by predetermined policy and obtain enterprise Hold verification result;Then enterprises end antiforge authentication data packet is formed, and enterprises end antiforge authentication data packet is passed back to described Predetermined alliance's chain node of alliance's platform chain;The enterprises end antiforge authentication data packet includes that Client identification data and enterprises end are tested Card is as a result, and carry out ciphering signature and electronic tag identification number by preset private key.
Certainly, verification management system may include corresponding communication module wirelessly or non-wirelessly, with alliance's platform chain into The transmission of row data.When carrying out product false proof verification operation, verification management system mainly executes the said goods anti-counterfeit authentication method In step S240, working method repeats no more.
It is corresponding with the said goods method for anti-counterfeit embodiment two, it is described in product false proof verifying system provided by the invention Verifying signature procedure can be further adapted for being executed by processor as given an order: using preset public key to enterprises end anti-fake certificate The signed data of data packet is verified, and the authenticity of signed data is verified;If the verification passes, then preset private key pair is utilized Enterprises end verification result and Client identification data are signed, and signed data, enterprises end verification result are saved in alliance In chain antiforge authentication data packet, and further judge alliance's chain node that signed data is formed in alliance's chain antiforge authentication data packet Whether pre-provisioning request is met;If it is, alliance's chain antiforge authentication data packet is fed back to the client by preset strategy Hold verification tool;If it is not, then enterprises end antiforge authentication data packet and alliance's chain antiforge authentication data packet are sent out by preset strategy Scheduled alliance's chain node is given, operation is updated to antiforge authentication data packet.When carrying out product false proof verification operation, test Card signature procedure mainly executes the step S251 to S254 in the said goods anti-counterfeit authentication method, and working method repeats no more.
In further embodiment, enterprise is preset in the product false proof verifying at least partly described alliance's chain node of system Industry reference information database, enterprise's reference information database include multiple enterprise's identification numbers and corresponding enterprise's identification number The predetermined attribute of the electronic tag identification number of storage.
Correspondingly, the node verification program is executed by processor, it, can be in institute when judging the legitimacy of enterprise's identification number It states and inquires corresponding enterprise's identification number in enterprise's reference information database.If inquired, enterprise's identification number is judged It is legal.
It is corresponding, it, can be based on enterprise's identification number in institute when whether the electronic tag identification number that judgement receives is legal The predetermined attribute that the electronic tag identification number of corresponding storage is determined in enterprise's reference information database is stated, and at the beginning of judging the product Whether electronic tag identification number described in beginning data meets the predetermined attribute, if it is, judging that electronic tag identification number is legal.
In product false proof verifying system embodiment provided by the invention, the electronic tag identification number can be product volume Number.In enterprise's reference information database, the predetermined attribute of the electronic tag identification number can be electronic tag identification number Range parameter.
Correspondingly, the node verification program is executed by processor, electronics mark described in the product primary data is judged When whether label identification number meets predetermined attribute, it can be and judge whether the product number meets the electronic tag identification number model Enclose parameter.
Judged using the said goods fake certification system, under judging result contrary circumstance, illegal prompt can be fed back; Illegal prompt can be exported by client validation tool.
Specifically used product false proof verifying system provided by the invention carries out the detailed process of product false proof verifying, Ke Yican It is admitted to the description stated to product false proof verification method process, details are not described herein.
The above content is only to combine further description made thereto of the embodiment of the present invention, and it cannot be said that of the invention Specific implementation is only limited to these instructions.For those of ordinary skill in the art to which the present invention belongs, this is not being departed from Under the premise of inventive concept, a number of simple deductions or replacements can also be made, all shall be regarded as belonging to protection scope of the present invention.

Claims (10)

1. a kind of product false proof verification method, which is characterized in that product to be verified is provided with electronic tag, and the electronic tag is pre- It is equipped with product primary data, the product primary data includes electronic tag identification number and enterprise's identification number;The electronic tag Identification number and enterprise's identification number all have uniqueness;
The product false proof verification method the following steps are included:
S210, client validation tool obtain the preset product primary data of electronic tag, and the product primary data that will acquire Predetermined alliance's chain node of predetermined alliance's platform chain is transferred to Client identification data;The Client identification data includes visitor Family end identification number, client certificate serial number;
S220, predetermined alliance's chain node identifies enterprise's identification number in product primary data, and is believed according to preset enterprise's benchmark Breath database and scheduled strategy judge whether enterprise's identification number is legal;If it is, entering step S230;
Whether S230, predetermined alliance's chain node are legal according to the electronic tag identification number that predetermined policy judgement receives;If so, The product primary data and Client identification data are then transmitted to by scheduled verification management system according to preset strategy, entered Step S240;
S240, the product base that scheduled verification management system is stored the received product primary data with it by predetermined policy Quasi- data compare and generate enterprises end antiforge authentication data packet, and enterprises end antiforge authentication data packet are passed back to described Alliance's platform chain;The enterprises end antiforge authentication data packet includes Client identification data and enterprises end verification result, using preset Private key sign signed data obtained and electronic tag identification number to the enterprises end verification result;
S250, after predetermined alliance's chain link point of alliance's platform chain receives the enterprises end antiforge authentication data packet, using pre- The public key set verifies the signed data;If the verification passes, then using preset private key to enterprises end verification result It signs with Client identification data, and signed data, enterprises end verification result is saved in alliance's chain anti-fake certificate Data packet enters step S260;
S260, client validation tool utilize the signed data in alliance's chain antiforge authentication data packet described in predetermined public key verifications simultaneously Export verification result.
2. product false proof verification method according to claim 1, which is characterized in that
The step S250 specifically includes the following steps:
S251, after predetermined alliance's chain link point of alliance's platform chain receives enterprises end antiforge authentication data packet, using preset Public key verifies signed data in the enterprises end antiforge authentication data packet;If the verification passes, then preset private is utilized Key signs to the enterprises end verification result and Client identification data, and signed data, enterprises end verification result are protected It is stored in alliance's chain antiforge authentication data packet, enters step S252;
S252, predetermined alliance's chain node judge whether the signed data in alliance's chain antiforge authentication data packet meets predetermined want It asks;If it is not, then S253 will be entered step;If it is, entering step S254;
S253, predetermined alliance's chain node send out alliance's chain antiforge authentication data packet and the enterprises end antiforge authentication data packet Another predetermined alliance's chain node is given, which executes step S251 and step S252;
S254 feeds back alliance's chain antiforge authentication data packet.
3. product false proof verification method according to claim 2, which is characterized in that
In the step S252, judge whether the signed data in alliance's chain antiforge authentication data packet meets pre-provisioning request, Specifically one of following content:
(1) whether alliance's chain node that judgement forms the signed data reaches scheduled quantity;
(2) judgement forms whether alliance's chain node of the signed data includes scheduled alliance's chain node.
4. product false proof verification method according to any one of claims 1 to 3, which is characterized in that
Enterprise's reference information database includes enterprise's identification number;
In the step S220, the legitimacy of enterprise's identification number is judged according to scheduled strategy, specifically, in enterprise's base Corresponding enterprise's identification number is inquired in calibration information database;If inquired, judge enterprise's identification number to be legal.
5. product false proof verification method according to claim 4, which is characterized in that
Enterprise's reference information database further includes the predetermined of the electronic tag identification number of corresponding enterprise's identification number storage Attribute;
In the step S230, whether the electronic tag identification number received according to predetermined policy judgement is legal, specifically, base The predetermined attribute of the electronic tag identification number of corresponding storage is determined in enterprise's reference information database in enterprise's identification number, And judge whether the electronic tag identification number meets the predetermined attribute, if it is, judging that electronic tag identification number is legal.
6. product false proof verification method according to claim 5, which is characterized in that
The electronic tag identification number is product number, and the predetermined attribute of the electronic tag identification number is electronic tag identification number Range parameter;
In the step S230, judge whether electronic tag identification number described in the product primary data meets the predetermined category Property, specifically, judge whether the product number meets the electronic tag identification number ranges parameter.
7. system is verified in a kind of product false proof, which is characterized in that including electronic tag, client validation tool, alliance's platform chain With verification management system:
Electronic tag, the electronic tag are attached on product to be certified, and preset product primary data, and the product is initial Data include electronic tag identification number and enterprise's identification number;The electronic tag identification number and enterprise's identification number all have only One property;
Client validation tool is provided with processor, output module and communication module;The processor is suitable for by described logical News module obtains the product primary data from the electronic tag, and passes through the communication module to predetermined alliance's platform chain Predetermined alliance's chain node-node transmission acquired in product initial data packets and Client identification data;The Client identification data Include client identification number, client certificate serial number;It applies also for passing through the communication module from alliance's platform chain Predetermined alliance's chain node obtain feedback alliance's chain antiforge authentication data packet after, utilize predetermined public key verifications anti-fake certificate number Verification result is exported according to the signed data in packet, and by the output module;
Alliance's platform chain, including the multiple alliance's chain nodes being connected by communication;
In multiple alliance's chain nodes, at least partly preset node verification program of alliance's chain node;The node verification program is suitable for It is executed by processor as given an order: identifying enterprise's identification number and electronic tag mark described in the product primary data received Whether knowledge number closes according to enterprise's identification number that preset enterprise's reference information database and scheduled strategy judgement receive Method;If it is, judging the electronic tag mark received according to preset enterprise's reference information database and predetermined policy Whether knowledge number is legal;If it is determined that the electronic tag identification number is legal, then according to preset strategy by the product primary data Scheduled verification management system is transmitted to Client identification data;
In multiple alliance's chain nodes, at least partly preset verifying signature procedure of alliance's chain node;The verifying signature procedure is suitable for It is executed by processor as given an order: being verified using signed data of the preset public key to antiforge authentication data packet, verifying label The authenticity of name data;If the verification passes, then using preset private key to the enterprises end verification result and client identification Data are signed, and signed data, enterprises end verification result are saved in alliance's chain antiforge authentication data packet, and by default plan Alliance's chain antiforge authentication data packet is slightly sent to the client validation tool;
Verification management system, including data verifying program;The data verifying program is suitable for being executed by processor as given an order: pressing Predetermined policy, which compares the product benchmark data that the received product primary data is stored with it, obtains enterprises end verifying As a result;Then enterprises end antiforge authentication data packet is formed, and the enterprises end antiforge authentication data packet is passed back into predetermined alliance's chain Predetermined alliance's chain node of platform;The enterprises end antiforge authentication data packet includes Client identification data and enterprises end verifying knot Fruit signs signed data obtained and electronic tag identification number to the enterprises end verification result using preset private key.
8. system is verified in product false proof according to claim 7, which is characterized in that
The verifying signature procedure is suitable for being executed by processor as given an order: using preset public key to enterprises end anti-fake certificate number It is verified according to the signed data of packet;If the verification passes, then using preset private key to enterprises end verification result and client Mark data is signed, and signed data, enterprises end verification result are saved in alliance's chain antiforge authentication data packet, and Further judge whether signed data described in alliance's chain antiforge authentication data packet meets pre-provisioning request;If it is, by default Alliance's chain antiforge authentication data packet is fed back to the client validation tool by strategy;It will if it is not, then pressing preset strategy Enterprises end antiforge authentication data packet and alliance's chain antiforge authentication data packet are sent to scheduled alliance's chain node.
9. system is verified in product false proof according to claim 7 or 8, which is characterized in that enterprise's reference information data Library includes the predetermined attribute of the electronic tag identification number of multiple enterprise's identification numbers and corresponding enterprise's identification number storage;
The node verification program is executed by processor the legitimacy for judging enterprise's identification number, specifically, in enterprise's benchmark Corresponding enterprise's identification number is inquired in information database;If inquired, judge enterprise's identification number to be legal;
Whether the node verification program is executed by processor the electronic tag identification number that receives of judgement legal, specifically, base The predetermined attribute of the electronic tag identification number of corresponding storage is determined in enterprise's reference information database in enterprise's identification number, And judge whether electronic tag identification number described in the product primary data meets the predetermined attribute, if it is, judgement electricity Subtab identification number is legal.
10. system is verified in product false proof according to claim 9, which is characterized in that
The electronic tag identification number is product number;
In enterprise's reference information database, the predetermined attribute of the electronic tag identification number is electronic tag identification number ranges Parameter;
The node verification program is executed by processor, and whether judges electronic tag identification number described in the product primary data It is to judge whether the product number meets the electronic tag identification number ranges parameter when meeting predetermined attribute.
CN201811383058.3A 2018-11-20 2018-11-20 Product false proof verification method and system Withdrawn CN109544181A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811383058.3A CN109544181A (en) 2018-11-20 2018-11-20 Product false proof verification method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811383058.3A CN109544181A (en) 2018-11-20 2018-11-20 Product false proof verification method and system

Publications (1)

Publication Number Publication Date
CN109544181A true CN109544181A (en) 2019-03-29

Family

ID=65848604

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811383058.3A Withdrawn CN109544181A (en) 2018-11-20 2018-11-20 Product false proof verification method and system

Country Status (1)

Country Link
CN (1) CN109544181A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113852628A (en) * 2021-09-23 2021-12-28 武汉众邦银行股份有限公司 Decentralized single sign-on method, decentralized single sign-on device and storage medium

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113852628A (en) * 2021-09-23 2021-12-28 武汉众邦银行股份有限公司 Decentralized single sign-on method, decentralized single sign-on device and storage medium
CN113852628B (en) * 2021-09-23 2023-09-05 武汉众邦银行股份有限公司 Decentralizing single sign-on method, device and storage medium

Similar Documents

Publication Publication Date Title
US11743054B2 (en) Method and system for creating and checking the validity of device certificates
CN108053001B (en) Information security authentication method and system for electronic warehouse receipt
JP5415266B2 (en) Workflow assurance and authentication system
CN104896305B (en) A kind of vehicle gas cylinder dynamic monitoring system and monitoring method
JP2009532792A (en) Product certification system
CN109522988B (en) Method and system for updating product anti-counterfeiting electronic label information
CN109360008B (en) Product anti-counterfeiting authentication updating method and system
CN104751337A (en) Product anti-fake method, device and system
JP5543328B2 (en) Communication terminal device, communication device, electronic card, method for communication terminal device, and method for communication device providing verification
CN108171019B (en) Anti-counterfeiting verification method, anti-counterfeiting verification system, anti-counterfeiting verification device and storage medium
CN111008366A (en) Copyright authorization method and device based on block chain
CN111259439B (en) Intangible asset management service platform based on block chain and implementation method thereof
CN111815321A (en) Transaction proposal processing method, device, system, storage medium and electronic device
CN111488372A (en) Data processing method, device and storage medium
CN114925141B (en) Cloud primary automation deployment management system and method based on block chain
CN111740841A (en) Method and device for generating and verifying tracing code
US20180205714A1 (en) System and Method for Authenticating Electronic Tags
CN109583555A (en) Product false proof electronic tag and electronic tag authentication method and system
CN108540335B (en) Management method and management device for equipment analysis report
CN109508560A (en) Electronic tag offline authentication system and method
CN109544181A (en) Product false proof verification method and system
CN109509007A (en) Product false proof electronic tag and electronic tag authentication method and system
CN111931230A (en) Data authorization method and device, storage medium and electronic device
CN109544182A (en) Product false proof verification method and system
CN109543791A (en) Product false proof electronic tag and product false proof verification method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication

Application publication date: 20190329

WW01 Invention patent application withdrawn after publication