CN109544181A - Product false proof verification method and system - Google Patents
Product false proof verification method and system Download PDFInfo
- Publication number
- CN109544181A CN109544181A CN201811383058.3A CN201811383058A CN109544181A CN 109544181 A CN109544181 A CN 109544181A CN 201811383058 A CN201811383058 A CN 201811383058A CN 109544181 A CN109544181 A CN 109544181A
- Authority
- CN
- China
- Prior art keywords
- alliance
- identification number
- chain
- electronic tag
- enterprise
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K17/00—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
- G06K17/0022—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/018—Certifying business or products
Abstract
The present invention discloses a kind of product false proof verification method and system.Using the product false proof verification method and system, the predetermined prod primary data in electronic tag, in verifying, client validation tool first obtains the preset product primary data of electronic tag, is then transferred to alliance's platform chain;Owned enterprise and electronic tag identification number are first verified by the identification of predetermined alliance's chain node, carry out preliminary identification;Then, then enterprises end verification result is obtained by comparison related data by verification management system and generates enterprises end antiforge authentication data packet, and enterprises end antiforge authentication data packet is passed back into alliance's platform chain;After predetermined alliance's chain link point through alliance's platform chain carries out verifying signature, alliance's chain antiforge authentication data packet is fed back to requests verification side, and using the signature of alliance's chain antiforge authentication data packet described in predetermined public key verifications and export verification result.Product false proof verification method and system are proposed based on the combination of alliance's chain, electronic tag and cryptographic algorithm, with higher reliability.
Description
Technical field
The present invention relates to product false proofs to verify field, more particularly to a kind of anti-in conjunction with electronic tag using block chain
Pseudo- verification method and system.
Background technique
The personation of poor quality (anti-fake) that product is prevented by mode appropriate or means is modern product management and supply chain pipe
A kind of important means of reason.Anti-counterfeiting technology is to the manufacture of containment fakement, promotion product image degree, guarantee company interest, Maintenance Market
Justice plays very important effect.
The products antifake technique of current main-stream is broadly divided into physical security and two kinds of two-dimension code anti-counterfeit.Below below for this
Two kinds of anti-counterfeiting technologies carry out principles and are simply introduced, and (loophole) progress simple analysis the problem of there is:
1. physical security
Physical security is the physical features with physical features present on antifalsification label or being specially arranged on antifalsification label
As anti-counterfeiting mark.When carrying out fake certification, the anti-counterfeiting mark on antifalsification label is carried out with predetermined Datum identifier
Comparison;If anti-counterfeiting mark is consistent with Datum identifier or is consistent, judge the product with the antifalsification label as certified products;If phase
Instead, then judge the product with the antifalsification label as fakement.
By the way that the uniqueness of anti-counterfeiting mark may be implemented to the special setting as anti-counterfeiting mark physics feature;By right
The processing of anti-counterfeiting mark physics feature can increase the difficulty of reproduction of anti-counterfeiting mark, and then realize the reliability of physical security.
Currently, different according to the mode of anti-counterfeiting mark, method is formed, there is that laser anti-counterfeit, chemical ink are anti-fake, texture is anti-
The pseudo-, modes such as latent image is anti-fake.
2. two-dimension code anti-counterfeit
Two dimensional code is arranged in two-dimension code anti-counterfeit technology on antifalsification label, contains data relevant to product in two dimensional code.?
When verifying, antifalsification label on product is attached to by scanning, identifies the related data of the available product of two dimensional code;Then it will obtain
Access evidence is sent to and preset enterprise verification system;The product benchmark that enterprise verification system stores the data received with it
Data compare, distinguished according to the consistency of comparing result or compatibility adhere to the antifalsification label product be certified products, also
It is fakement.
Although existing anti-counterfeiting technology can realize the purpose for distinguishing certified products or fakement to a certain extent, with miniature
, there is the risk being replicated in technology and reproduction technology development.
Using the method for physical security, a possibility that physical features as anti-counterfeiting mark are replicated, is increasing.It fakes
Person can have the anti-counterfeiting mark of same physical feature by known reprography, and be formed counterfeit with same physical feature
Product label.It is basic using existing verification mode by the fakement label as (be attached to or adhere in other ways) is on fakement
It is unable to reach the purpose for distinguishing certified products and wild goose product.
Two dimensional code is in the way of fixed coding rule storing data.Fake producer is by taking pictures, duplicating or reading number
The available fakement label completely the same with certified products two dimensional code on certified products antifalsification label of the means such as two dimensional code is regenerated after.
When such fakement label can identify equipment scanning recognition by barcode scanning, fakement can be also identified as certified products, and then be unable to reach
Distinguish the purpose of certified products and wild goose product.
Therefore, anti-fake reliability how is improved, is still the technical problem that those skilled in the art need to solve.
Summary of the invention
The present invention proposes a kind of method and system of the product false proof verifying of innovation for the pain spot of current anti-counterfeiting technology,
System and method is verified in product false proof i.e. based on block chain, electronic tag and cryptographic algorithm, product false proof verifying
Method and system has higher reliability.
Product false proof verification method provided by the invention, product to be verified are provided with electronic tag, and the electronic tag is pre-
It is equipped with product primary data, the product primary data includes electronic tag identification number and enterprise's identification number;The electronic tag
Identification number and enterprise's identification number all have uniqueness;
The product false proof verification method the following steps are included:
S210, client validation tool obtains the preset product primary data of electronic tag, and the product that will acquire is initial
Data and Client identification data are transferred to predetermined alliance's chain node of predetermined alliance's platform chain;The Client identification data packet
Containing client identification number, client certificate serial number;
S220, predetermined alliance's chain node identify enterprise's identification number in product primary data, and according to preset enterprise's base
Calibration information database and scheduled strategy judge whether enterprise's identification number is legal;If it is, entering step S230;It is described
Client identification data includes client identification number, client certificate serial number;
Whether S230, predetermined alliance's chain node are legal according to the electronic tag identification number that predetermined policy judgement receives;Such as
Fruit is that the product primary data and Client identification data are then transmitted to scheduled verification management system according to preset strategy
System, enters step S240;
S240, the production that scheduled verification management system is stored the received product primary data with it by predetermined policy
Product reference data compares and generates enterprises end antiforge authentication data packet, and enterprises end antiforge authentication data packet is passed back to institute
State alliance's platform chain;The enterprises end antiforge authentication data packet includes Client identification data and enterprises end verification result, utilizes
Preset private key is to enterprises end verification result signature signed data obtained and electronic tag identification number;
S250, after predetermined alliance's chain link point of alliance's platform chain receives the enterprises end antiforge authentication data packet, benefit
The signed data is verified with preset public key;If the verification passes, then enterprises end is verified using preset private key
As a result it signs with Client identification data, and it is anti-fake that signed data, enterprises end verification result be saved in alliance's chain
Authentication data packet enters step S260;
S260, client validation tool utilize the number of signature in alliance's chain antiforge authentication data packet described in predetermined public key verifications
According to and export verification result.
In optimal technical scheme, the step S250 specifically includes the following steps:
S251, after predetermined alliance's chain link point of alliance's platform chain receives enterprises end antiforge authentication data packet, using pre-
The public key set verifies signed data in the enterprises end antiforge authentication data packet;If the verification passes, then using preset
Private key sign to the enterprises end verification result and Client identification data, and by signed data, enterprises end verifying knot
Fruit is saved in alliance's chain antiforge authentication data packet, enters step S252;
S252, it is pre- that predetermined alliance's chain node judges whether the signed data in alliance's chain antiforge authentication data packet meets
Provisioning request;If it is not, then S253 will be entered step;If it is, entering step S254;
S253, predetermined alliance's chain node is by alliance's chain antiforge authentication data packet and the enterprises end antiforge authentication data
Packet is sent to another predetermined alliance's chain node, which executes step S251 and step S252;
S254 feeds back alliance's chain antiforge authentication data packet.
In further optional technical solution, in the step S252, judges that alliance's chain is anti-fake and recognize verify data packet
In signed data is to fake certification data verification and whether alliance's chain node for signing meets pre-provisioning request, it is specifically following in
One of hold:
(1) whether alliance's chain node that judgement forms the signed data reaches scheduled quantity;
(2) judgement forms whether alliance's chain node of the signed data includes scheduled alliance's chain node.
In further optional technical solution, enterprise's reference information database includes enterprise's identification number;
In the step S220, judge that enterprise identifies according to preset enterprise's reference information database and scheduled strategy
Number legitimacy corresponding enterprise's identification number is specifically inquired in enterprise's reference information database;If inquiry
It arrives, then judges enterprise's identification number to be legal.
In further optional technical solution, enterprise's reference information database further includes corresponding enterprise's identification number
The predetermined attribute of the electronic tag identification number of storage;
In the step S230, whether the electronic tag identification number received according to predetermined policy judgement is legal, specifically
It is to determine the predetermined of the electronic tag identification number of corresponding storage in enterprise's reference information database based on enterprise's identification number
Attribute, and judge whether the electronic tag identification number meets the predetermined attribute, if it is, judging that electronic tag identification number closes
Method.In further optional technical solution, the electronic tag identification number is product number, the electronic tag identification number it is pre-
Determining attribute is electronic tag identification number ranges parameter;
In the step S230, it is pre- to judge whether electronic tag identification number described in the product primary data meets this
Determine attribute, specifically, judges whether the product number meets the electronic tag identification number ranges parameter.
System is verified in product false proof provided by the invention, including electronic tag, client validation tool, alliance's platform chain and
Verification management system:
Electronic tag, the electronic tag are attached on product to be certified, and preset product primary data, the product
Primary data includes electronic tag identification number and enterprise's identification number;The electronic tag identification number and enterprise's identification number have
There is uniqueness;
Client validation tool is provided with processor, output module and communication module;The processor is suitable for passing through institute
It states communication module and obtains the product primary data from the electronic tag, and made a reservation for by the communication module to scheduled
Product initial data packets and Client identification data described in alliance's chain node-node transmission of alliance's platform chain;The client identification number
According to including client identification number, client certificate serial number;It applies also for flat from alliance's chain by the communication module
After predetermined alliance's chain node of platform obtains alliance's chain antiforge authentication data packet of feedback, predetermined public key verifications anti-fake certificate is utilized
The signature of data packet, and verification result is exported by the output module;
Alliance's platform chain, including the multiple alliance's chain nodes being connected by communication;
In multiple alliance's chain nodes, at least partly preset node verification program of alliance's chain node;The node verification program
Suitable for being executed by processor as given an order: identifying enterprise's identification number described in the product primary data received and electronic tag mark
Whether knowledge number closes according to enterprise's identification number that preset enterprise's reference information database and scheduled strategy judgement receive
Method, if it is, judging the electronic tag mark received according to preset enterprise's reference information database and predetermined policy
Whether knowledge number is legal;If it is, the product primary data and Client identification data be transmitted to according to preset strategy pre-
Fixed verification management system;
In multiple alliance's chain nodes, at least partly preset verifying signature procedure of alliance's chain node;The verifying signature procedure
Suitable for being executed by processor as given an order: being verified, tested using signed data of the preset public key to antiforge authentication data packet
Demonstrate,prove the authenticity of signed data in antiforge authentication data packet;If the verification passes, then enterprises end is verified using preset private key
As a result it signs with Client identification data, and signed data, enterprises end verification result is saved in alliance's chain anti-fake certificate
Data packet, and alliance's chain antiforge authentication data packet is sent to the client validation tool by preset strategy;
Verification management system, including enterprises end communication module and data verifying program;The data verifying program is suitable for quilt
Processor is executed and is such as given an order: the product benchmark data stored the received product primary data with it by predetermined policy into
Row comparison obtains enterprises end verification result;Then enterprises end antiforge authentication data packet is formed, and by enterprises end antiforge authentication data
Packet passes back to predetermined alliance's chain node of predetermined alliance's platform chain;The enterprises end antiforge authentication data packet includes client identification
Data and enterprises end verification result sign signed data and electronics obtained to enterprises end verification result using preset private key
Tag identification number.
In further technical solution, the verifying signature procedure is suitable for being executed by processor as given an order: utilizing preset
Public key the signature of enterprises end antiforge authentication data packet is verified, verify antiforge authentication data packet in signed data it is true
Property;If the verification passes, then it is signed, will be signed to enterprises end verification result and Client identification data using preset private key
Name data, enterprises end verification result are saved in alliance's chain antiforge authentication data packet, and further judge that alliance's chain is anti-fake
Whether signed data described in authentication data packet meets pre-provisioning request;If it is, by preset strategy that alliance's chain is anti-fake
Authentication data packet feeds back to the client validation tool;If it is not, then pressing preset strategy for enterprises end antiforge authentication data packet
Scheduled alliance's chain node is sent to alliance chain antiforge authentication data packet.
In further technical solution, enterprise's reference information database includes described in multiple enterprise's identification numbers and correspondence
The predetermined attribute of the electronic tag identification number of enterprise's identification number storage;
The node verification program is executed by processor the legitimacy for judging enterprise's identification number, specifically, in the enterprise
Corresponding enterprise's identification number is inquired in reference information database;If inquired, judge enterprise's identification number to be legal;
Whether the node verification program is executed by processor the electronic tag identification number that receives of judgement legal, specifically
It is to determine the predetermined of the electronic tag identification number of corresponding storage in enterprise's reference information database based on enterprise's identification number
Attribute, and judge whether electronic tag identification number described in the product primary data meets the predetermined attribute, if it is, sentencing
It is legal to power off subtab identification number.
In further technical solution, it is product number that the electronic tag, which knows identification number,;
In enterprise's reference information database, the predetermined attribute of the electronic tag identification number is electronic tag identification number
Range parameter;
The node verification program is executed by processor, and judges electronic tag identification number described in the product primary data
Whether meet predetermined attribute, concrete operations are: judging whether the product number meets the electronic tag identification number ranges ginseng
Number.
Using the said goods anti-counterfeit authentication method, electronic tag authenticity is guaranteed by multiple form, if fake producer is pseudo-
Manufacturing enterprise or electronic tag identification number are made, is sentenced by the legitimacy of enterprise's identification number validity judgement and electronic tag identification number
It is disconnected to distinguish fakement;If fake producer forges enterprises end (verification management system), also can not testing by alliance's platform chain
Card;If really electronic tag be attached on fakement, by the verifying historical data in verification result, can also feed back to
Verify the warning that product may be fakement.Therefore, anti-fake reliability can be improved using the product false proof verification method.
Detailed description of the invention
Fig. 1 is the flow diagram for the product false proof verification method that the embodiment of the present invention one provides.
Fig. 2 is that second embodiment of the present invention provides the method flow diagrams of product false proof verification method.
Fig. 3 is that system logic block diagram is verified in a kind of product false proof provided in an embodiment of the present invention.
Specific embodiment
With reference to the accompanying drawing, the present invention is described in further detail, but the specific embodiment is not used to limit
Protection scope of the present invention.
In this document, " uniqueness " is the uniqueness in corresponding verifying system or during verification method.
Referring to FIG. 1, the figure is the flow diagram for the product false proof verification method that the embodiment of the present invention one provides.
In order to implement the above-mentioned product false proof verification method, electronic tag can be set in product to be verified.Electronic tag
Can be attached in a suitable manner on product to be verified, can such as be attached in product itself to be verified, can also be attached to
Verify product packing material on, can also be attached to product to be verified other on article.
Electronic tag presets product primary data, and the product primary data may include electronic tag identification number and enterprise
Industry identification number;The electronic tag identification number and enterprise's identification number all have uniqueness;And electronic tag identification number and produce
Product can have one-to-one relationship.In one embodiment, electronic tag identification number can be the production number of product.When
So, according to actual needs, product primary data also may include other other informations relevant to product, and such as name of product produces
Product number, keeping life and product status information etc..
Certainly, it in order to guarantee product primary data safety in electronic tag, prevents from arbitrarily being distorted, it can be provided read-only
Data;Certainly, for the convenience of upgrading products primary data, also can be set into it is readable can WriteMode;It can also be by known formula
Related technical measures are arranged in formula, guarantee that write-in, renewal authority are legal.
Based on the electronic tag, the product false proof verification method that the embodiment of the present invention one provides be may comprise steps of:
S210, client validation tool obtain product primary data preset in electronic tag, and at the beginning of the product that will acquire
Beginning data and Client identification data are transferred to predetermined alliance's chain node of predetermined alliance's platform chain;The Client identification data
Include client identification number, client certificate serial number.
It can use the product primary data in known way reading electronic tag, can such as be read using non-contacting mode
Product primary data is taken, such as NFC (near-field communication, Near Field Communication) or RFID (radio frequency identification, Radio
Frequency Identification) mode reads product primary data.
Obtaining client validation tool can be special equipment, installs the common apparatus for being suitble to software or program, can be with
It is that the mobile phone for being suitble to APP is installed.
Client identification number can be preset in client validation tool in case of calling, can also be raw according to pre-defined rule
At.Client certificate serial number is generated using counter, every once to be authenticated, and the numerical value of counter is made to add 1;Certainly, may be used
To generate random unduplicated random number as client certificate serial number.
Enterprise's identification number in the predetermined alliance's chain node identification product primary data of S220, and according to scheduled strategy
Judge whether enterprise's identification number is legal;If it is, entering step S230.
After obtaining product primary data, these data are transferred to predetermined alliance's platform by known methods;It can be with
Understand, in order to guarantee the safety of data transmission and complete, data transmission can carry out data by preparatory strategy and agreement corresponding
Processing.
The specific alliance's chain node for receiving data can be determined by predetermined strategy or mode, for example, can be by alliance
Currently the know together host node in period of platform chain receives, can also be by previously selected sequence to predetermined alliance's chain node-node transmission number
According to;Alliance's chain node of data can also be received according to attribute (device type, position, APP are numbered) selection of uploading device;Also
Suitable device can be set in alliance's platform chain, by alliance's chain that scheduled strategy is suitable to the selection of alliance's chain link dotted state
Node receives data.
In the present embodiment, it is illustrated by taking alliance chain node A as an example.It should be noted that being verified in a product false proof
In method implementation process, data processing can be handled by alliance's chain link point, can also be by different alliance's chain nodes
Respective handling is carried out, no longer distinguishing property describes in this part.
In order to guarantee going on smoothly for product false proof verification method in embodiment one, need in at least portion of alliance's platform chain
Divide preset basic data in alliance's chain node.Alliance chain node A can be produced with preset corresponding units, software or instruction set with identifying
Enterprise's identification number in product primary data, and judge whether enterprise's identification number is legal according to scheduled strategy.This reality
It applies in example, the enterprise of product to be verified can be registered in the corresponding entrance of alliance's platform chain, and upload corresponding company information.
After through the audit of the predetermined mechanisms of alliance's platform chain, corresponding enterprise can upload business code or other data and enterprise identifies
Number and the corresponding data of electronic tag identification number, and known block chain technology is pressed, according to default in multiple alliance's chain nodes
Common recognition mechanism, corresponding data is synchronized in corresponding alliance's chain node, formed enterprise's reference information database;Multiple enterprises
Enterprise's reference information database (including complete business data or business data abstract) of industry stores in block form and shape
At block data chain, to provide data basis for the further data processing of corresponding alliance's chain link point.
Certainly, alliance's platform chain can also distribute or automatically generate according to actual needs corresponding enterprise to registered enterprise and mark
Knowledge number.
It, can be according to predetermined after alliance chain node A identifies enterprise's identification number in product primary data in the step
Strategy judge whether enterprise's identification number legal, that is, the enterprise for judging whether to belong on alliance's platform chain registration and passing through through audit
Industry product carries out preliminary verifying.Scheduled strategy can be selected according to actual needs, as enterprise's identification number formats whether
Identical as alliance's predetermined format of platform chain or be consistent, whether enterprise's identification number includes specific message field etc..
In the present embodiment, alliance chain node A presets enterprise's reference information database, enterprise's reference information database
Including enterprise's identification number.In this way, alliance chain node A can inquire phase in enterprise's reference information database in step S220
Corresponding enterprise's identification number;If inquired, judge enterprise's identification number to be legal;If inquiry is less than can sentence
Break the production enterprise be it is illegal, which, which is not registered and audited on alliance's platform chain, passes through, and directly feedback is illegal
Prompt warns identifier, which is not the product that alliance's platform chain can be verified.It on the one hand can submit in this way
On the other hand verification efficiency avoids redundancy process.
In the embodiment of the present invention, alliance's platform chain is used not only for verifying a certain enterprise product true and false, can be used for testing
Demonstrate,prove the true and false of many enterprises' product;It therefore, can be more with parallel memorizing in enterprise's reference information database of corresponding alliance's chain node
Enterprise's identification number of a enterprise.
Whether S230, predetermined alliance's chain node are legal according to the electronic tag identification number that predetermined policy judgement receives;Such as
Fruit is that the product primary data and Client identification data are then transmitted to scheduled verification management system according to preset strategy
System, and enter step S240.
In alliance chain node A, by the verifying of enterprise's identification number, only prove that product owned enterprise to be verified is the alliance
Platform chain registers user, not can prove that the product to be verified is certified products or genuine piece;Therefore, it is necessary to further verify electronic tag
Whether identification number is legal.
Identical as the verifying strategy of enterprise's identification number, the whether legal strategy of verifying electronic tag identification number can be according to reality
Border is selected, and details are not described herein.
In the present embodiment, enterprise's reference information database of alliance chain node A further includes that corresponding enterprise's identification number is deposited
The predetermined attribute of the electronic tag identification number of storage.In step S230, alliance chain node A can be based on enterprise's identification number described
The predetermined attribute of the electronic tag identification number of corresponding storage is determined in enterprise's reference information database, and judges that the product is initial
Whether electronic tag identification number described in data meets the predetermined attribute, if it is, judging that electronic tag identification number is legal.
Certainly, the predetermined attribute of electronic tag identification number can be scheduled field format according to actually being selected
And the specific data of scheduled field, it is also possible to length, format etc..In the present embodiment, electronic tag identification number is product volume
Number;The predetermined attribute of electronic tag identification number can be electronic tag identification number ranges parameter, i.e., corresponding enterprise can be to alliance
Platform chain uploads product electronic tag identification number ranges;When judging whether electronic tag identification number is legal, it can be determined that product
Whether the electronic tag identification number in primary data is within the electronic tag identification number ranges of upload.Such as the electronic tag of upload
Identification number ranges parameter is 13456-34568.If the electronic tag identification number in fruit product primary data is within the scope of this,
It may determine that the electronic tag identification number is legal;It otherwise, is exactly illegally.
If it is determined that electronic tag identification number be it is illegal, then can directly feed back illegal prompt, warn identifier, this is to be tested
Card product belongs to fakement.
If it is determined that electronic tag identification number be it is legal, then by preset strategy by the product primary data and client mark
Know the verification management system that data forwarding is controlled to scheduled enterprise, and enters step S240.Verification management system address can be with
It is obtained by known technology, for example verification management corresponding with enterprise's identification number can be prestored in preset database systematically
Location is looked into according to enterprise's identification number and takes verification management system address, and the product primary data received is transmitted to corresponding enterprise and is controlled
The verification management system of system;It can also be using verification management system address as enterprise's identification number, in turn, just according to enterprise's identification number
It can determine verification management system address.
S240, the production that scheduled verification management system is stored the received product primary data with it by predetermined policy
Product reference data compares and generates enterprises end antiforge authentication data packet, and enterprises end antiforge authentication data packet is passed back to pre-
Determine predetermined alliance's chain node of alliance's platform chain, the enterprises end antiforge authentication data packet may include Client identification data and
Enterprises end verification result signs signed data obtained and electronic tag mark to enterprises end verification result using preset private key
Knowledge number.Enterprises end antiforge authentication data packet includes that electronic tag identification number can provide conveniently for output verification result.
Verification management system can be the special equipment by enterprise's control or load the common apparatus for being suitble to software or instruction,
The product benchmark data that the received product primary data is stored with it are compared and are compared by verification management system
As a result strategy can be carried out according to known technology, and details are not described herein.
Enterprises end verification result can be generated according to comparing result in verification management system;It, can be in order to guarantee data security
Ciphering signature is carried out with preset private key, forms signed data.It can be by Client identification data and enterprises end verification result, benefit
Enterprises end anti-fake certificate is packed into signed data and electronic tag identification number of the preset private key to enterprises end verification result
Data packet.Enterprises end antiforge authentication data packet can also include that product property to be verified judges, can also include verifying history number
According to (previous verification time, number, position, mode and other information);Certain enterprises end antiforge authentication data packet can according to
Verifying products characteristics, place industry situation are specifically set.
S250, after predetermined alliance's chain link point of alliance's platform chain receives enterprises end antiforge authentication data packet, using pre-
The public key set verifies the signed data of enterprises end antiforge authentication data packet, verifies and signs in enterprises end antiforge authentication data packet
The authenticity of name data;If the verification passes, then using preset private key to enterprises end verification result and from client certificate work
Have the Client identification data that receives to sign, and it is anti-fake that signed data and enterprises end verification result be saved in alliance's chain
Authentication data packet, and alliance's chain antiforge authentication data packet is fed back, enter step S260.
In the case where authentication failed, illustrate that enterprises end antiforge authentication data packet may be forged and distort, it is also possible to test
Management system is demonstrate,proved as the control of illegal enterprise;At this point it is possible to feed back illegal prompt, it is of course also possible to carry out other respective handlings or
Operation, the verification management system such as controlled to enterprise send error message, it is desirable that verification management system carries out confirmation or other phases
It should operate.
It is appreciated that the verifying signature operation of predetermined alliance's chain node (such as alliance's chain node B) of alliance's platform chain (utilizes
Preset public key can verify the signed data in the enterprises end antiforge authentication data packet, and enterprises end is anti-fake recognizes for verifying
Demonstrate,prove the authenticity of signed data in data packet;If the verification passes, then using preset private key to enterprises end verification result and visitor
Family end mark data is signed, and the signed data of formation, enterprises end verification result are saved in alliance's chain anti-fake certificate number
According to packet, make the signed data in alliance's chain antiforge authentication data packet with multiple alliance's chain nodes) that alliance's chain can be improved is anti-fake
Authentication data packet safety avoids or reduces the abduction to alliance's chain antiforge authentication data packet, forges and distort.Certainly, described
The private key of preset public key and corresponding verification management system can form asymmetric key pair, and asymmetric key pair can be in enterprise
It is generated in the registration of alliance's platform chain, can also be automatically generated or be regularly updated by predetermined mechanisms.
S260, client validation tool utilize the signed data of predetermined public key verifications alliance chain antiforge authentication data packet and defeated
Verification result out.
After the alliance's chain antiforge authentication data packet for receiving feedback, it can be based on enterprises end verification result, and call currently
Client identification data, using the signed data of predetermined public key verifications alliance chain antiforge authentication data packet and by verification result with suitable
When mode export, allow identifier obtain verification result.The Client identification data for participating in signature verification should be recognized with client
The Client identification data that card tool initially issues alliance's platform chain is identical.Enterprise can be determined by verifying signed data verifying
Holding verification result, whether consistent and Client identification data is legal.
Corresponding with the process of signed data is formed, specific verification process is as follows:
(1) the client certificate tool alliance's chain node public key prestored restores the label in alliance's chain antiforge authentication data packet
Name data, obtain the cryptographic Hash of data;
(2) client certificate tool is to the enterprise verification knot in Client identification data and alliance's chain antiforge authentication data packet
Fruit carries out Hash operation, obtains cryptographic Hash and compared with the cryptographic Hash restored from signed data, if they are the same, is then verified,
Otherwise, authentication failed.
The step can be carried out in terminal appropriate, can such as be operated on the mobile phone for installing appropriate APP.Certainly,
Predetermined public key can have it is multiple, with on predetermined alliance's chain node encryption key formed asymmetric key pair, with verification management
The private key of system forms asymmetric key pair;These asymmetric key pairs can be pre-generated by predetermined policy, can also be by pre-
Determine mechanism to automatically generate or regularly update.
Using the said goods anti-counterfeit authentication method, electronic tag authenticity can be guaranteed by multiple form.If faked
Person forges manufacturing enterprise or electronic tag identification number, passes through the legal of enterprise's identification number validity judgement and electronic tag identification number
Property judgement can distinguish fakement and genuine piece;If fake producer forges verification management system, it can not also pass through alliance's platform chain
Verifying;If real electronic tag is attached on fakement, pass through verifying historical data (enterprise's control terminal in verification result
The verifying history of identical electronic label is saved, and includes verifying historical data in verification result), production to be verified can also be exported
Product may be the warning of fakement;By the verifying for the signed data that client certificate tool returns to alliance's chain, can prevent pair
The Replay Attack of alliance's chain antiforge authentication data packet;The data being signed are the dynamic numbers comprising client certificate serial number
According to, can pass through client certificate serial number confirm authentication data reliability and authenticity.Therefore, it is tested using the product false proof
Anti-fake reliability can be improved in card method.
Based on a kind of default mechanism of alliance's platform chain, in a common recognition period in office, as alliance's platform chain host node
Alliance's chain node has randomness;The randomness is it is also ensured that verify the reliability of signature operation.There is difference for difference
Alliance's platform chain of default mechanism, in order to avoid predetermined alliance's chain node attack to alliance's platform chain or is distorted, can be preset
The election or specified mechanisms of corresponding alliance chain node elect or specify at random corresponding alliance's chain link point to carry out above-mentioned verifying signature behaviour
Make.It is of course also possible to set predetermined condition, in the case where meeting pre-provisioning request, alliance's chain antiforge authentication data packet is fed back;Not
Meet pre-provisioning request, does not feed back alliance's chain antiforge authentication data packet.Referring to FIG. 2, the figure is that second embodiment of the present invention provides productions
The method flow diagram of product anti-counterfeit authentication method.
Compared with embodiment one, step S250 is further included steps of
S251, after predetermined alliance's chain link point of alliance's platform chain receives enterprises end antiforge authentication data packet, using pre-
The public key set verifies the signed data of enterprises end antiforge authentication data packet, verifies and signs in enterprises end antiforge authentication data packet
The authenticity of name data;If the verification passes, then using preset private key to enterprises end verification result and from client certificate work
Have the Client identification data that receives to sign, signed data, enterprises end verification result be saved in alliance's chain is anti-fake to be recognized
Data packet is demonstrate,proved, S252 is entered step.
S252, it is pre- that predetermined alliance's chain node judges whether the signed data in alliance's chain antiforge authentication data packet meets
Provisioning request;If it is not, then S253 will be entered step;If it is, entering step S254.
Alliance's chain antiforge authentication data packet and enterprises end antiforge authentication data packet are sent to by S253, predetermined alliance's chain node
Another predetermined alliance's chain node, another predetermined alliance's chain node execute step S251 and step S252, sign again, shape
It at signed data, is saved in alliance's chain antiforge authentication data packet, updates the data of alliance's chain antiforge authentication data packet.
Above-mentioned steps are repeated, until alliance's chain node that alliance's chain antiforge authentication data packet is verified and signed meets
Pre-provisioning request enters step S254.
S254 feeds back alliance's chain antiforge authentication data packet, it can to client validation tool feedback, alliance's chain is anti-fake recognizes
Demonstrate,prove data packet.
In the embodiment of the present invention, judge whether alliance's chain node that enterprises end antiforge authentication data packet is verified and signed is full
Whether sufficient pre-provisioning request, specifically, alliance's chain node that judgement forms signed data reach scheduled quantity.I.e. enterprises end is verified
As a result it is signed by the verifying of how many a alliance's chain nodes.If reaching predetermined quantity by alliance's chain node of verifying signature,
It can think, a possibility which is tampered is lower, may
With higher credibility, the advantage of alliance's platform chain is played.
Whether alliance's chain node that judgement forms signed data, which reaches scheduled quantity, can adopt in a known manner.This reality
It applies in example, pointer data N can be embedded in the message data for including enterprises end antiforge authentication data packet, often passes through an alliance
The verifying of chain node is signed, and N=N+1 is made;And default predetermined quantity is M (M is not less than 2).The connection of signed data is formed in judgement
When whether alliance's chain node reaches scheduled quantity, judge whether N is more than or equal to M;When N is more than or equal to M, judgement forms number of signature
According to alliance's chain node reach scheduled quantity, execute step S254;When N is less than M, judgement forms alliance's chain of signed data
Node is not up to scheduled quantity, executes step S253.
It is of course also possible to be determined according to (such as alliance's chain node number of signatures) the characteristics of conveying data between alliance's chain node
The quantity of alliance's chain node of signed data is formed, and then the alliance's chain link point for judging whether there is predetermined quantity carries out verifying label
Name.
Using above-mentioned steps S251 and step S252, if a certain alliance's chain node is anti-fake to enterprises end in alliance's platform chain
Authentication data packet (such as enterprises end verification result) is distorted, and be will lead to alliance's chain node that other participate in verifying and is unable to complete
Verify signature operation, at this time alliance's platform chain will return invalid information prompt, remind user's information be it is suspicious, in turn, benefit
It can guarantee verification the verifying results with the product false proof verification method.
Certainly, whether alliance's chain node that judgement forms signed data meets pre-provisioning request, can also be predetermined using other
Strategy, such as: alliance's chain node of specific (position, rank or predetermined) can be set on alliance's platform chain, only pass through the spy
Determine just execute step S254 after the verifying signature of alliance's chain node.It is appreciated that predetermined alliance's chain node can be
Product enterprise specifies alliance's chain node, is also possible to specially be provided with the higher alliance's chain node of rank, can also be by predetermined
Alliance's chain node that mechanism is selected at random.Such mechanism improves product false proof verifying it is also ensured that verification result authenticity
Reliability.
On the basis of providing the said goods anti-counterfeit authentication method, the embodiment of the present invention also provides a kind of product false proof verifying
System.It should be noted that product false proof verification method provided by the invention is not limited to using product false proof provided by the invention
Verifying system can also be implemented using other corresponding systems.
Referring to FIG. 3, the figure is a kind of product false proof verifying system logic block diagram provided in an embodiment of the present invention.
It includes electronic tag, client validation tool, alliance's platform chain and verification management system that system is verified in the product false proof
System.
The electronic tag is attached on product to be verified, can have one-to-one relationship with product to be verified.Electronics
Label presets product primary data, and the product primary data includes electronic tag identification number and enterprise's identification number;The electricity
Subtab identification number and enterprise's identification number all have uniqueness.
Client validation tool is provided with processor, output module and communication module;The processor is suitable for passing through institute
It states communication module and obtains the product primary data from the electronic tag, and made a reservation for by the communication module to scheduled
Product initial data packets and Client identification data described in alliance's chain node-node transmission of alliance's platform chain;The client identification number
According to including client identification number, client certificate serial number;It applies also for flat from alliance's chain by the communication module
After predetermined alliance's chain node of platform obtains alliance's chain antiforge authentication data packet of feedback, predetermined public key verifications anti-fake certificate is utilized
Signed data in data packet, and verification result is exported by the output module.
Client validation tool can be special equipment, install the common apparatus for being suitble to software or program, can also be peace
Fill the mobile phone for being suitble to APP.When carrying out product false proof verification operation, client validation tool mainly executes that the said goods are anti-fake to be tested
Step S210, S260 in card method, working method repeat no more.
Electronic tag and client validation tool should be mutually matched, to carry out data interaction.As electronic tag can wrap
Include RFID label tag;RFID label tag may include circuit unit and antenna element, the preset product initial number of circuit unit
According to.The communication module of client validation tool may include reading circuit unit and reading antenna unit;The reading antenna list
When first antenna element with the RFID label tag couples, the available product primary data of client validation tool.
Alliance's platform chain may include the multiple alliance's chain nodes being connected by communication.
In multiple alliance's chain nodes, at least partly preset node verification program of alliance's chain node;The node verification program
Suitable for being executed by processor as given an order: identifying enterprise's identification number described in the product primary data received and electronic tag mark
Whether knowledge number closes according to enterprise's identification number that preset enterprise's reference information database and scheduled strategy judgement receive
Method;If it is, whether legal according to the electronic tag identification number that predetermined policy judgement receives;If it is determined that the electricity
Subtab identification number is legal, then is transmitted to the product primary data and Client identification data according to preset strategy scheduled
Verification management system.
In multiple alliance's chain nodes, at least partly preset verifying signature procedure of alliance's chain node;The verifying signature procedure
Suitable for being executed by processor as given an order: being verified, tested using signed data of the preset public key to antiforge authentication data packet
Demonstrate,prove the authenticity of signed data;If the verification passes, then using preset private key to enterprises end verification result and client identification
Data are signed, and signed data, enterprises end verification result are saved in alliance's chain antiforge authentication data packet, and by default plan
Alliance's chain antiforge authentication data packet is slightly sent to the client validation tool.
According to foregoing description, it will be understood that the preset node verification program of any alliance's chain node and verifying can be allowed to sign
Name program.When carrying out product false proof verification operation, scheduled alliance's chain node mainly executes the said goods anti-counterfeit authentication method
In step S220, S230 and S250, working method repeat no more.
Verification management system can by the manufacturing enterprise of corresponding product control or hold, as enterprises end carry out using, with
Guarantee that corresponding enterprise controls verify data.
Verification management system may include data verifying program;The data verifying program is suitable for being executed by processor as follows
Instruction: the product benchmark data that the received product primary data is stored with it are compared by predetermined policy and obtain enterprise
Hold verification result;Then enterprises end antiforge authentication data packet is formed, and enterprises end antiforge authentication data packet is passed back to described
Predetermined alliance's chain node of alliance's platform chain;The enterprises end antiforge authentication data packet includes that Client identification data and enterprises end are tested
Card is as a result, and carry out ciphering signature and electronic tag identification number by preset private key.
Certainly, verification management system may include corresponding communication module wirelessly or non-wirelessly, with alliance's platform chain into
The transmission of row data.When carrying out product false proof verification operation, verification management system mainly executes the said goods anti-counterfeit authentication method
In step S240, working method repeats no more.
It is corresponding with the said goods method for anti-counterfeit embodiment two, it is described in product false proof verifying system provided by the invention
Verifying signature procedure can be further adapted for being executed by processor as given an order: using preset public key to enterprises end anti-fake certificate
The signed data of data packet is verified, and the authenticity of signed data is verified;If the verification passes, then preset private key pair is utilized
Enterprises end verification result and Client identification data are signed, and signed data, enterprises end verification result are saved in alliance
In chain antiforge authentication data packet, and further judge alliance's chain node that signed data is formed in alliance's chain antiforge authentication data packet
Whether pre-provisioning request is met;If it is, alliance's chain antiforge authentication data packet is fed back to the client by preset strategy
Hold verification tool;If it is not, then enterprises end antiforge authentication data packet and alliance's chain antiforge authentication data packet are sent out by preset strategy
Scheduled alliance's chain node is given, operation is updated to antiforge authentication data packet.When carrying out product false proof verification operation, test
Card signature procedure mainly executes the step S251 to S254 in the said goods anti-counterfeit authentication method, and working method repeats no more.
In further embodiment, enterprise is preset in the product false proof verifying at least partly described alliance's chain node of system
Industry reference information database, enterprise's reference information database include multiple enterprise's identification numbers and corresponding enterprise's identification number
The predetermined attribute of the electronic tag identification number of storage.
Correspondingly, the node verification program is executed by processor, it, can be in institute when judging the legitimacy of enterprise's identification number
It states and inquires corresponding enterprise's identification number in enterprise's reference information database.If inquired, enterprise's identification number is judged
It is legal.
It is corresponding, it, can be based on enterprise's identification number in institute when whether the electronic tag identification number that judgement receives is legal
The predetermined attribute that the electronic tag identification number of corresponding storage is determined in enterprise's reference information database is stated, and at the beginning of judging the product
Whether electronic tag identification number described in beginning data meets the predetermined attribute, if it is, judging that electronic tag identification number is legal.
In product false proof verifying system embodiment provided by the invention, the electronic tag identification number can be product volume
Number.In enterprise's reference information database, the predetermined attribute of the electronic tag identification number can be electronic tag identification number
Range parameter.
Correspondingly, the node verification program is executed by processor, electronics mark described in the product primary data is judged
When whether label identification number meets predetermined attribute, it can be and judge whether the product number meets the electronic tag identification number model
Enclose parameter.
Judged using the said goods fake certification system, under judging result contrary circumstance, illegal prompt can be fed back;
Illegal prompt can be exported by client validation tool.
Specifically used product false proof verifying system provided by the invention carries out the detailed process of product false proof verifying, Ke Yican
It is admitted to the description stated to product false proof verification method process, details are not described herein.
The above content is only to combine further description made thereto of the embodiment of the present invention, and it cannot be said that of the invention
Specific implementation is only limited to these instructions.For those of ordinary skill in the art to which the present invention belongs, this is not being departed from
Under the premise of inventive concept, a number of simple deductions or replacements can also be made, all shall be regarded as belonging to protection scope of the present invention.
Claims (10)
1. a kind of product false proof verification method, which is characterized in that product to be verified is provided with electronic tag, and the electronic tag is pre-
It is equipped with product primary data, the product primary data includes electronic tag identification number and enterprise's identification number;The electronic tag
Identification number and enterprise's identification number all have uniqueness;
The product false proof verification method the following steps are included:
S210, client validation tool obtain the preset product primary data of electronic tag, and the product primary data that will acquire
Predetermined alliance's chain node of predetermined alliance's platform chain is transferred to Client identification data;The Client identification data includes visitor
Family end identification number, client certificate serial number;
S220, predetermined alliance's chain node identifies enterprise's identification number in product primary data, and is believed according to preset enterprise's benchmark
Breath database and scheduled strategy judge whether enterprise's identification number is legal;If it is, entering step S230;
Whether S230, predetermined alliance's chain node are legal according to the electronic tag identification number that predetermined policy judgement receives;If so,
The product primary data and Client identification data are then transmitted to by scheduled verification management system according to preset strategy, entered
Step S240;
S240, the product base that scheduled verification management system is stored the received product primary data with it by predetermined policy
Quasi- data compare and generate enterprises end antiforge authentication data packet, and enterprises end antiforge authentication data packet are passed back to described
Alliance's platform chain;The enterprises end antiforge authentication data packet includes Client identification data and enterprises end verification result, using preset
Private key sign signed data obtained and electronic tag identification number to the enterprises end verification result;
S250, after predetermined alliance's chain link point of alliance's platform chain receives the enterprises end antiforge authentication data packet, using pre-
The public key set verifies the signed data;If the verification passes, then using preset private key to enterprises end verification result
It signs with Client identification data, and signed data, enterprises end verification result is saved in alliance's chain anti-fake certificate
Data packet enters step S260;
S260, client validation tool utilize the signed data in alliance's chain antiforge authentication data packet described in predetermined public key verifications simultaneously
Export verification result.
2. product false proof verification method according to claim 1, which is characterized in that
The step S250 specifically includes the following steps:
S251, after predetermined alliance's chain link point of alliance's platform chain receives enterprises end antiforge authentication data packet, using preset
Public key verifies signed data in the enterprises end antiforge authentication data packet;If the verification passes, then preset private is utilized
Key signs to the enterprises end verification result and Client identification data, and signed data, enterprises end verification result are protected
It is stored in alliance's chain antiforge authentication data packet, enters step S252;
S252, predetermined alliance's chain node judge whether the signed data in alliance's chain antiforge authentication data packet meets predetermined want
It asks;If it is not, then S253 will be entered step;If it is, entering step S254;
S253, predetermined alliance's chain node send out alliance's chain antiforge authentication data packet and the enterprises end antiforge authentication data packet
Another predetermined alliance's chain node is given, which executes step S251 and step S252;
S254 feeds back alliance's chain antiforge authentication data packet.
3. product false proof verification method according to claim 2, which is characterized in that
In the step S252, judge whether the signed data in alliance's chain antiforge authentication data packet meets pre-provisioning request,
Specifically one of following content:
(1) whether alliance's chain node that judgement forms the signed data reaches scheduled quantity;
(2) judgement forms whether alliance's chain node of the signed data includes scheduled alliance's chain node.
4. product false proof verification method according to any one of claims 1 to 3, which is characterized in that
Enterprise's reference information database includes enterprise's identification number;
In the step S220, the legitimacy of enterprise's identification number is judged according to scheduled strategy, specifically, in enterprise's base
Corresponding enterprise's identification number is inquired in calibration information database;If inquired, judge enterprise's identification number to be legal.
5. product false proof verification method according to claim 4, which is characterized in that
Enterprise's reference information database further includes the predetermined of the electronic tag identification number of corresponding enterprise's identification number storage
Attribute;
In the step S230, whether the electronic tag identification number received according to predetermined policy judgement is legal, specifically, base
The predetermined attribute of the electronic tag identification number of corresponding storage is determined in enterprise's reference information database in enterprise's identification number,
And judge whether the electronic tag identification number meets the predetermined attribute, if it is, judging that electronic tag identification number is legal.
6. product false proof verification method according to claim 5, which is characterized in that
The electronic tag identification number is product number, and the predetermined attribute of the electronic tag identification number is electronic tag identification number
Range parameter;
In the step S230, judge whether electronic tag identification number described in the product primary data meets the predetermined category
Property, specifically, judge whether the product number meets the electronic tag identification number ranges parameter.
7. system is verified in a kind of product false proof, which is characterized in that including electronic tag, client validation tool, alliance's platform chain
With verification management system:
Electronic tag, the electronic tag are attached on product to be certified, and preset product primary data, and the product is initial
Data include electronic tag identification number and enterprise's identification number;The electronic tag identification number and enterprise's identification number all have only
One property;
Client validation tool is provided with processor, output module and communication module;The processor is suitable for by described logical
News module obtains the product primary data from the electronic tag, and passes through the communication module to predetermined alliance's platform chain
Predetermined alliance's chain node-node transmission acquired in product initial data packets and Client identification data;The Client identification data
Include client identification number, client certificate serial number;It applies also for passing through the communication module from alliance's platform chain
Predetermined alliance's chain node obtain feedback alliance's chain antiforge authentication data packet after, utilize predetermined public key verifications anti-fake certificate number
Verification result is exported according to the signed data in packet, and by the output module;
Alliance's platform chain, including the multiple alliance's chain nodes being connected by communication;
In multiple alliance's chain nodes, at least partly preset node verification program of alliance's chain node;The node verification program is suitable for
It is executed by processor as given an order: identifying enterprise's identification number and electronic tag mark described in the product primary data received
Whether knowledge number closes according to enterprise's identification number that preset enterprise's reference information database and scheduled strategy judgement receive
Method;If it is, judging the electronic tag mark received according to preset enterprise's reference information database and predetermined policy
Whether knowledge number is legal;If it is determined that the electronic tag identification number is legal, then according to preset strategy by the product primary data
Scheduled verification management system is transmitted to Client identification data;
In multiple alliance's chain nodes, at least partly preset verifying signature procedure of alliance's chain node;The verifying signature procedure is suitable for
It is executed by processor as given an order: being verified using signed data of the preset public key to antiforge authentication data packet, verifying label
The authenticity of name data;If the verification passes, then using preset private key to the enterprises end verification result and client identification
Data are signed, and signed data, enterprises end verification result are saved in alliance's chain antiforge authentication data packet, and by default plan
Alliance's chain antiforge authentication data packet is slightly sent to the client validation tool;
Verification management system, including data verifying program;The data verifying program is suitable for being executed by processor as given an order: pressing
Predetermined policy, which compares the product benchmark data that the received product primary data is stored with it, obtains enterprises end verifying
As a result;Then enterprises end antiforge authentication data packet is formed, and the enterprises end antiforge authentication data packet is passed back into predetermined alliance's chain
Predetermined alliance's chain node of platform;The enterprises end antiforge authentication data packet includes Client identification data and enterprises end verifying knot
Fruit signs signed data obtained and electronic tag identification number to the enterprises end verification result using preset private key.
8. system is verified in product false proof according to claim 7, which is characterized in that
The verifying signature procedure is suitable for being executed by processor as given an order: using preset public key to enterprises end anti-fake certificate number
It is verified according to the signed data of packet;If the verification passes, then using preset private key to enterprises end verification result and client
Mark data is signed, and signed data, enterprises end verification result are saved in alliance's chain antiforge authentication data packet, and
Further judge whether signed data described in alliance's chain antiforge authentication data packet meets pre-provisioning request;If it is, by default
Alliance's chain antiforge authentication data packet is fed back to the client validation tool by strategy;It will if it is not, then pressing preset strategy
Enterprises end antiforge authentication data packet and alliance's chain antiforge authentication data packet are sent to scheduled alliance's chain node.
9. system is verified in product false proof according to claim 7 or 8, which is characterized in that enterprise's reference information data
Library includes the predetermined attribute of the electronic tag identification number of multiple enterprise's identification numbers and corresponding enterprise's identification number storage;
The node verification program is executed by processor the legitimacy for judging enterprise's identification number, specifically, in enterprise's benchmark
Corresponding enterprise's identification number is inquired in information database;If inquired, judge enterprise's identification number to be legal;
Whether the node verification program is executed by processor the electronic tag identification number that receives of judgement legal, specifically, base
The predetermined attribute of the electronic tag identification number of corresponding storage is determined in enterprise's reference information database in enterprise's identification number,
And judge whether electronic tag identification number described in the product primary data meets the predetermined attribute, if it is, judgement electricity
Subtab identification number is legal.
10. system is verified in product false proof according to claim 9, which is characterized in that
The electronic tag identification number is product number;
In enterprise's reference information database, the predetermined attribute of the electronic tag identification number is electronic tag identification number ranges
Parameter;
The node verification program is executed by processor, and whether judges electronic tag identification number described in the product primary data
It is to judge whether the product number meets the electronic tag identification number ranges parameter when meeting predetermined attribute.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811383058.3A CN109544181A (en) | 2018-11-20 | 2018-11-20 | Product false proof verification method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811383058.3A CN109544181A (en) | 2018-11-20 | 2018-11-20 | Product false proof verification method and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109544181A true CN109544181A (en) | 2019-03-29 |
Family
ID=65848604
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811383058.3A Withdrawn CN109544181A (en) | 2018-11-20 | 2018-11-20 | Product false proof verification method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109544181A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113852628A (en) * | 2021-09-23 | 2021-12-28 | 武汉众邦银行股份有限公司 | Decentralized single sign-on method, decentralized single sign-on device and storage medium |
-
2018
- 2018-11-20 CN CN201811383058.3A patent/CN109544181A/en not_active Withdrawn
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113852628A (en) * | 2021-09-23 | 2021-12-28 | 武汉众邦银行股份有限公司 | Decentralized single sign-on method, decentralized single sign-on device and storage medium |
CN113852628B (en) * | 2021-09-23 | 2023-09-05 | 武汉众邦银行股份有限公司 | Decentralizing single sign-on method, device and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11743054B2 (en) | Method and system for creating and checking the validity of device certificates | |
CN108053001B (en) | Information security authentication method and system for electronic warehouse receipt | |
JP5415266B2 (en) | Workflow assurance and authentication system | |
CN104896305B (en) | A kind of vehicle gas cylinder dynamic monitoring system and monitoring method | |
JP2009532792A (en) | Product certification system | |
CN109522988B (en) | Method and system for updating product anti-counterfeiting electronic label information | |
CN109360008B (en) | Product anti-counterfeiting authentication updating method and system | |
CN104751337A (en) | Product anti-fake method, device and system | |
JP5543328B2 (en) | Communication terminal device, communication device, electronic card, method for communication terminal device, and method for communication device providing verification | |
CN108171019B (en) | Anti-counterfeiting verification method, anti-counterfeiting verification system, anti-counterfeiting verification device and storage medium | |
CN111008366A (en) | Copyright authorization method and device based on block chain | |
CN111259439B (en) | Intangible asset management service platform based on block chain and implementation method thereof | |
CN111815321A (en) | Transaction proposal processing method, device, system, storage medium and electronic device | |
CN111488372A (en) | Data processing method, device and storage medium | |
CN114925141B (en) | Cloud primary automation deployment management system and method based on block chain | |
CN111740841A (en) | Method and device for generating and verifying tracing code | |
US20180205714A1 (en) | System and Method for Authenticating Electronic Tags | |
CN109583555A (en) | Product false proof electronic tag and electronic tag authentication method and system | |
CN108540335B (en) | Management method and management device for equipment analysis report | |
CN109508560A (en) | Electronic tag offline authentication system and method | |
CN109544181A (en) | Product false proof verification method and system | |
CN109509007A (en) | Product false proof electronic tag and electronic tag authentication method and system | |
CN111931230A (en) | Data authorization method and device, storage medium and electronic device | |
CN109544182A (en) | Product false proof verification method and system | |
CN109543791A (en) | Product false proof electronic tag and product false proof verification method and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20190329 |
|
WW01 | Invention patent application withdrawn after publication |