CN110598433A - Anti-counterfeiting information processing method and device based on block chain - Google Patents

Anti-counterfeiting information processing method and device based on block chain Download PDF

Info

Publication number
CN110598433A
CN110598433A CN201910854952.2A CN201910854952A CN110598433A CN 110598433 A CN110598433 A CN 110598433A CN 201910854952 A CN201910854952 A CN 201910854952A CN 110598433 A CN110598433 A CN 110598433A
Authority
CN
China
Prior art keywords
information
public
signature data
verified
private key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910854952.2A
Other languages
Chinese (zh)
Inventor
王强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201910854952.2A priority Critical patent/CN110598433A/en
Publication of CN110598433A publication Critical patent/CN110598433A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Abstract

The application relates to the technical field of anti-counterfeiting, and discloses an anti-counterfeiting information processing method and device based on a block chain. The method is applied to an anti-counterfeiting information issuing end and comprises the following steps: generating a public-private key pair in response to receiving an instruction to initialize the NFC device, the public-private key pair comprising a public key and a private key; acquiring characteristic information for representing the identity of an object to be verified, and encrypting the characteristic information based on a private key in the public and private key pair to obtain first signature data; uploading the characteristic information of the object to be verified and a public key in a public and private key pair to a block chain; and writing the first signature data into the NFC device to provide anti-counterfeiting verification service for the object to be verified. The technical scheme of the embodiment of the application can improve the security of anti-counterfeiting of the anti-counterfeiting object.

Description

Anti-counterfeiting information processing method and device based on block chain
Technical Field
The application relates to the technical field of anti-counterfeiting, in particular to an anti-counterfeiting information processing method and device based on a block chain.
Background
In a processing scene of anti-counterfeiting information, for example, in a scene of anti-counterfeiting information processing on anti-counterfeiting objects such as commodities, certificates, letters and the like, the anti-counterfeiting information of the anti-counterfeiting object is usually embedded into a two-dimensional code, and a user scans the two-dimensional code through a terminal device to perform anti-counterfeiting verification on the anti-counterfeiting object. However, how to improve the security of anti-counterfeiting objects is an urgent technical problem to be solved.
Disclosure of Invention
The embodiment of the application provides an anti-counterfeiting information processing method and device based on a block chain, so that the anti-counterfeiting safety of an anti-counterfeiting object can be improved at least to a certain extent.
Other features and advantages of the present application will be apparent from the following detailed description, or may be learned by practice of the application.
According to an aspect of the embodiments of the present application, there is provided a method for processing anti-fake information based on a block chain, applied to an anti-fake information issuing end, including: generating a public-private key pair in response to receiving an instruction to initialize the NFC device, the public-private key pair comprising a public key and a private key; acquiring characteristic information for representing the identity of an object to be verified, and encrypting the characteristic information based on a private key in the public and private key pair to obtain first signature data; uploading the characteristic information of the object to be verified and a public key in a public and private key pair to a block chain; and writing the first signature data into the NFC device to provide anti-counterfeiting verification service for the object to be verified.
According to an aspect of the embodiments of the present application, there is provided a method for processing anti-counterfeit information based on a block chain, applied to an anti-counterfeit information verification end, including: reading first signature data written in an NFC device in advance, wherein the first signature data is generated by encrypting characteristic information used for representing the identity of an object to be verified by a private key in a pre-generated public and private key pair; searching feature information of an object to be verified corresponding to the first signature data uploaded in advance and a public key in a public and private key pair in a block chain; and verifying the authenticity of the object to be verified based on the found characteristic information of the object to be verified, a public key in a public and private key pair and the first signature data.
According to an aspect of an embodiment of the present application, there is provided a blockchain-based anti-counterfeit information processing apparatus for issuing anti-counterfeit information, including: a first generating unit configured to generate a public-private key pair including a public key and a private key in response to receiving an instruction to initialize the NFC device; the first obtaining unit is used for obtaining characteristic information for representing the identity of an object to be verified, and encrypting the characteristic information based on a private key in the public and private key pair to obtain first signature data; the first uploading unit is used for uploading the characteristic information of the object to be verified and a public key in a public and private key pair to a block chain; and the first writing unit is used for writing the first signature data into the NFC device so as to provide anti-counterfeiting verification service for the object to be verified.
In some embodiments of the present application, based on the foregoing solution, the apparatus further includes: a second obtaining unit, configured to obtain a blockchain address of the blockchain, and a blockchain number of a blockchain of the feature information of the object to be verified and a public key in the public-private key pair, where the blockchain number is used to represent positions of the feature information of the object to be verified and the public key in the public-private key pair in the blockchain; a second writing unit used to write the address of the block chain and the block number into the NFC device.
In some embodiments of the present application, based on the foregoing solution, the apparatus further includes: a third acquiring unit, configured to acquire NFC device serial number information of the NFC device, so as to generate a second information digest based on the NFC device serial number information and the feature information of the object to be verified; the first encryption unit is used for encrypting the second information digest based on a private key in the public and private key pair to obtain second signature data; a second uploading unit, configured to upload the second information summary to a blockchain; a third writing unit configured to write the second signature data to the NFC device.
In some embodiments of the present application, based on the foregoing solution, the apparatus further includes: a second generation unit configured to generate a third information digest based on the first signature data and the second signature data; the second encryption unit is used for encrypting the third information abstract based on a private key in the public and private key pair to obtain third signature data; a fourth writing unit configured to write the third signature data to the NFC device.
In some embodiments of the present application, based on the foregoing solution, the apparatus further includes: a third acquiring unit configured to acquire NFC device serial number information of the NFC device; a third uploading unit, configured to upload NFC device serial number information of the NFC device to a blockchain.
In some embodiments of the present application, based on the foregoing solution, the first obtaining unit is configured to: acquiring at least one of the following characteristic information for representing the identity of an object to be verified: acquiring identity information of the object to be verified; and acquiring a first information abstract of the identity information of the object to be verified.
According to an aspect of the embodiments of the present application, there is provided a blockchain-based anti-counterfeiting information processing apparatus for verifying anti-counterfeiting information, including: the NFC device comprises a first reading unit, a second reading unit and a third reading unit, wherein the first reading unit is used for reading first signature data written in the NFC device in advance, and the first signature data is generated by encrypting characteristic information used for representing the identity of an object to be verified by a private key in a pre-generated public and private key pair; the first searching unit is used for searching feature information of an object to be verified corresponding to the first signature data and a public key in a public and private key pair which are uploaded in advance in a block chain; and the first verification unit is used for verifying the authenticity of the object to be verified based on the found characteristic information of the object to be verified, the public key in the public and private key pair and the first signature data.
In some embodiments of the present application, based on the foregoing solution, the first lookup unit is configured to: reading a block chain address of the block chain written in an NFC device in advance, and block numbers of blocks of the feature information of the object to be verified and a public key in the public and private key pair in the block chain; and searching feature information of an object to be verified corresponding to the first signature data and a public key in a public and private key pair which are uploaded in advance in the blockchain according to the blockchain address and the blockchain number.
In some embodiments of the present application, based on the foregoing scheme, the first verification unit is configured to: detecting whether a public key in the public and private key pair can decrypt the first signature data to obtain decrypted characteristic information; and detecting whether the decrypted characteristic information is consistent with the searched characteristic information of the object to be verified so as to verify the authenticity of the object to be verified.
In some embodiments of the present application, based on the foregoing solution, the apparatus further includes: the second reading unit is used for reading second signature data written in the NFC device in advance, and the second signature data is generated by encrypting characteristic information used for representing the identity of an object to be verified and a second information digest of the serial number information of the NFC device by a private key in a pre-generated public and private key pair; the second searching unit is used for searching a second information summary which is uploaded in advance and corresponds to the second signature data in a block chain; and the second verification unit is used for verifying the authenticity of the object to be verified based on the searched second information digest, the public key in the public and private key pair and the second signature data.
In some embodiments of the present application, based on the foregoing solution, the apparatus further includes: a third reading unit configured to read third signature data written in advance in the NFC device, the third signature data being generated by encrypting a third information digest of the first signature data and the second signature data with a private key of a public-private key pair generated in advance; the first decryption unit is used for decrypting the third signature data based on the found public key in the public and private key pair to obtain a third information abstract; a third generation unit configured to generate a fourth information digest based on the first signature data and the second signature data; and the third verification unit is used for detecting whether the third message digest and the fourth message digest are consistent or not so as to verify whether the first signature data and the second signature data are tampered or not.
In some embodiments of the present application, based on the foregoing solution, the apparatus further includes: a fourth reading unit configured to read NFC device serial number information of the NFC device; a third searching unit, configured to search, in a block chain, pre-uploaded NFC device serial number information corresponding to the first signature data; and the first detection unit is used for detecting whether the read NFC device serial number information of the NFC device is consistent with the NFC device serial number information searched in the block chain so as to verify whether the NFC device is replaced.
In some embodiments of the present application, based on the foregoing scheme, the feature information of the object to be verified specifically includes at least one of the following: identity information of the object to be verified; and the first information abstract of the identity information of the object to be verified.
According to an aspect of the embodiments of the present application, there is provided a computer readable medium, on which a computer program is stored, the computer program, when executed by a processor, implementing the anti-counterfeiting information processing method as described in the above embodiments.
According to an aspect of an embodiment of the present application, there is provided an electronic device including: one or more processors; a storage device for storing one or more programs, which when executed by the one or more processors, cause the one or more processors to implement the anti-counterfeiting information processing method as described in the above embodiments.
In the technical solutions provided by some embodiments of the present application, on one hand, the anti-counterfeit information for the anti-counterfeit object is issued by uploading the feature information of the object to be verified and a public key in a public-private key pair to a blockchain, and writing first signature data obtained by encrypting the feature information of the object to be verified by a private key into an NFC device. On the other hand, the anti-counterfeiting information aiming at the anti-counterfeiting object is verified through the read first signature data which is written in the NFC device in advance, and the feature information of the object to be verified corresponding to the first signature data which is uploaded in advance and found in the block chain and the public key in the public and private key pair. Due to the non-replicability of the NFC device, the irreparability of the characteristic information of the object to be verified uploaded to the block chain and the non-decryptability of the encrypted data of the characteristic information of the object to be verified written in the NFC device, the anti-counterfeiting information of the anti-counterfeiting object is difficult to abuse, so that the safety of the anti-counterfeiting information of the anti-counterfeiting object can be improved, and the problem that the anti-counterfeiting reliability of the anti-counterfeiting object cannot be guaranteed in the prior art is solved.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the application.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present application and together with the description, serve to explain the principles of the application. It is obvious that the drawings in the following description are only some embodiments of the application, and that for a person skilled in the art, other drawings can be derived from them without inventive effort. In the drawings:
FIG. 1 shows a schematic diagram of an exemplary system architecture to which aspects of embodiments of the present application may be applied;
FIG. 2 illustrates a schematic view of a scenario of blockchain-based anti-counterfeiting information processing according to an embodiment of the present application;
FIG. 3 shows a flow chart of a blockchain-based anti-counterfeiting information processing method applied to an anti-counterfeiting information issuing terminal according to one embodiment of the application;
fig. 4 shows a flowchart of a method after uploading the feature information and the public key of the object to be verified to a blockchain according to an embodiment of the present application;
fig. 5 shows a flowchart of a method after writing the first signature data to an NFC device according to an embodiment of the application;
fig. 6 shows a flowchart of a method after writing the second signature data to the NFC device according to an embodiment of the application;
fig. 7 shows a flowchart of a method after writing the first signature data to an NFC device according to an embodiment of the application;
FIG. 8 shows a flow chart of a blockchain-based anti-counterfeiting information processing method applied to an anti-counterfeiting information verifying terminal according to an embodiment of the application;
FIG. 9 shows a detailed flowchart for finding object feature information and a public key to be verified on a blockchain according to an embodiment of the present application;
FIG. 10 shows a detailed flow diagram for verifying the authenticity of the object to be verified according to one embodiment of the present application;
FIG. 11 illustrates a flow diagram after verifying the authenticity of an object to be verified based on object characteristic information and a public key, and first signature data, according to an embodiment of the application;
FIG. 12 illustrates a flow diagram for verifying whether the first signature data and the second signature data have been tampered with, according to one embodiment of the present application;
fig. 13 shows a flow chart for verifying whether the NFC device is replaced according to an embodiment of the application;
FIG. 14 illustrates a system flow diagram for processing security information for a security object according to one embodiment of the present application;
FIG. 15 shows a block diagram of a blockchain-based anti-counterfeiting information processing apparatus according to one embodiment of the present application;
FIG. 16 shows a block diagram of a blockchain-based anti-counterfeiting information processing apparatus according to one embodiment of the present application;
FIG. 17 illustrates a schematic structural diagram of a computer system suitable for use in implementing the electronic device of an embodiment of the present application.
Detailed Description
Example embodiments will now be described more fully with reference to the accompanying drawings. Example embodiments may, however, be embodied in many different forms and should not be construed as limited to the examples set forth herein; rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the concept of example embodiments to those skilled in the art.
Furthermore, the described features, structures, or characteristics may be combined in any suitable manner in one or more embodiments. In the following description, numerous specific details are provided to give a thorough understanding of embodiments of the application. One skilled in the relevant art will recognize, however, that the subject matter of the present application can be practiced without one or more of the specific details, or with other methods, components, devices, steps, and so forth. In other instances, well-known methods, devices, implementations, or operations have not been shown or described in detail to avoid obscuring aspects of the application.
The block diagrams shown in the figures are functional entities only and do not necessarily correspond to physically separate entities. I.e. these functional entities may be implemented in the form of software, or in one or more hardware modules or integrated circuits, or in different networks and/or processor means and/or microcontroller means.
The flow charts shown in the drawings are merely illustrative and do not necessarily include all of the contents and operations/steps, nor do they necessarily have to be performed in the order described. For example, some operations/steps may be decomposed, and some operations/steps may be combined or partially combined, so that the actual execution sequence may be changed according to the actual situation.
Fig. 1 shows a schematic diagram of an exemplary system architecture to which the technical solution of the embodiments of the present application can be applied.
As shown in fig. 1, the system architecture may include a terminal device (e.g., one or more of the smart phone 101, the tablet computer 102, and the portable computer 103 shown in fig. 1, but other NFC-enabled electronic devices may also be used, etc.), a network 104, and a blockchain system 105. The network 104 is used to provide the medium of the communication link between the terminal devices and the blockchain system 105. Network 104 may include various connection types, such as wired communication links, wireless communication links, and so forth.
It should be understood that the terminal device, the network in fig. 1 is only schematic. There may be any number of terminal devices and networks, as desired for implementation. In addition, there may be more than one blockchain system according to actual needs.
Fig. 2 shows a schematic view of a scenario of anti-counterfeiting information processing according to an embodiment of the present application.
As shown in fig. 1, in the scenario, the method includes: the system comprises an anti-counterfeiting information issuing device 201, a block chain system 202, an anti-counterfeiting object 203, an NFC device 204 and an anti-counterfeiting information verification device 205.
In an embodiment of the present application, the anti-counterfeit object may be a letter requiring anti-counterfeit verification as shown in 203, and may be a commodity, an important certificate, or another object requiring anti-counterfeit verification. When the anti-counterfeiting information is issued to the anti-counterfeiting object, the anti-counterfeiting information can be written into the NFC device 204 through the anti-counterfeiting information issuing equipment 201, the anti-counterfeiting information is uploaded to the block chain system 202, and then the NFC device 204 with the anti-counterfeiting information is attached to the anti-counterfeiting object 203. For example, the NFC device 204 is attached to a sealing of a letter as shown in fig. 2 for performing anti-counterfeit verification on the letter, and if the NFC device 204 attached to the sealing of the letter is damaged, the authenticity of the letter cannot be verified in one embodiment of the present application, when performing anti-counterfeit verification on the anti-counterfeit object, the anti-counterfeit information on the anti-counterfeit object 203 in the NFC device 204 may be read by the anti-counterfeit information verification device 205, and the anti-counterfeit information on the anti-counterfeit object 203 is obtained from the block chain system 202, and then the authenticity of the anti-counterfeit information in the NFC device 204 is verified, so as to determine the authenticity of the anti-counterfeit object 203. It should be noted that, if the anti-counterfeit information verification device does not have the NFC identification function, the anti-counterfeit information may be identified by the device having the NFC identification function, and then the identified anti-counterfeit information may be manually input into the anti-counterfeit information verification device.
It should be noted that the anti-counterfeit information issuing device and the anti-counterfeit information verifying device may be a smart phone, a tablet computer, a portable computer, or other electronic devices with NFC function. On the other hand, the anti-counterfeiting information processing method provided by the embodiment of the application is generally executed by anti-counterfeiting information issuing equipment when the anti-counterfeiting information is issued. On the other hand, in verifying the forgery-preventing information, it is generally performed by a forgery-preventing information verification apparatus.
It should be explained that NFC is short for Near Field Communication (Near Field Communication), which is also called short-range wireless Communication, and is a short-range high-frequency wireless Communication technology that allows contactless point-to-point data transmission and exchange between electronic devices. Thus, in the present application, the NFC device may be at least one device with a built-in independent key generation function, encryption and decryption function, and an independent processor and storage unit, and may store the anti-counterfeiting information of the anti-counterfeiting object, and may be read by other devices with NFC function. For example, the NFC device may be any one of an IC chip card, a CPU chip card, a class 14443A card, and a class 14443B card. Because the NFC device is internally provided with the independent processing unit and the independent storage unit, the NFC device has the independent key generation function and the encryption and decryption function, and different NFC devices have different serial number information, so that the NFC device has the irreproducibility and the uniqueness to a certain extent. Therefore, compared with the traditional two-dimensional code, the anti-counterfeiting information of the anti-counterfeiting object is stored in the NFC device with higher reliability.
In this application, regard as the database of depositing anti-fake object anti-fake information with block chain system, its benefit lies in: the blockchain system is a non-falsifiable and non-falsifiable distributed database; when any node in the blockchain system receives the input information, other nodes in the blockchain system acquire the input information according to a consensus algorithm, and the input information is stored as data in shared data, so that the data stored on all the nodes in the blockchain system are consistent. Specifically, each node in the blockchain system has a corresponding node identifier, and each node in the blockchain system may store node identifiers of other nodes in the blockchain system, so that the generated block is broadcast to other nodes in the blockchain system according to the node identifiers of other nodes. Each node may maintain a node identifier list as shown in the following table, and store the node name and the node identifier in the node identifier list correspondingly. The node identifier may be an IP (Internet Protocol) address and any other information that can be used to identify the node, and table 1 only illustrates the IP address as an example.
Node name Node identification
Node 1 117.114.151.174
Node 2 117.116.189.145
Node n 119.123.789.258
TABLE 1
Each node in the blockchain system stores one identical blockchain. The block chain is composed of a plurality of blocks, wherein the starting block comprises a block head and a block main body, the block head stores an input information characteristic value, a version number, a timestamp and a difficulty value, and the block main body stores input information; the next block of the starting block takes the starting block as a parent block, the next block also comprises a block head and a block main body, the block head stores the input information characteristic value of the current block, the block head characteristic value of the parent block, the version number, the timestamp and the difficulty value, and the like, so that the block data stored in each block in the block chain is associated with the block data stored in the parent block, and the safety of the input information in the block is ensured. Therefore, the block chain system is used as the database for storing the anti-counterfeiting information of the anti-counterfeiting object, so that the transparency, the safety and the efficiency of storing the anti-counterfeiting information of the anti-counterfeiting object can be improved to a great extent.
The implementation details of the technical solution of the embodiment of the present application are set forth in detail below:
according to a first aspect of the disclosure, a block chain-based anti-counterfeiting information processing method is provided, which is applied to an anti-counterfeiting information issuing end.
Referring to fig. 3, a flowchart of a blockchain-based anti-counterfeiting information processing method applied to an anti-counterfeiting information issuing terminal according to an embodiment of the present application is shown, and the anti-counterfeiting information processing method may be performed by a device having a calculation processing function, such as the anti-counterfeiting information issuing device 201 shown in fig. 2. As shown in fig. 3, the method for processing anti-counterfeit information at least includes steps 301 to 304:
in response to receiving an instruction to initialize an NFC device, a public-private key pair is generated, the public-private key pair comprising a public key and a private key, step 301.
Step 302, obtaining characteristic information for representing the identity of the object to be verified, and encrypting the characteristic information based on a private key in the public and private key pair to obtain first signature data.
And step 303, uploading the characteristic information of the object to be verified and a public key in the public and private key pair to a block chain.
And step 304, writing the first signature data into the NFC device to provide anti-counterfeiting verification service for the object to be verified.
The steps carried out as above will be explained in detail below:
in step 301, in response to receiving an instruction to initialize an NFC device, a public-private key pair is generated, the public-private key pair comprising a public key and a private key.
In a specific implementation of an embodiment, the instruction to initialize the NFC device may be triggered by the anti-counterfeiting information issuing apparatus 201. Specifically, the anti-counterfeiting information issuing device may initialize the NFC device by electromagnetic induction, and generate a public and private key pair according to the NFC device, where the public and private key pair includes a public key and a private key.
In step 302, feature information for characterizing the identity of an object to be verified is obtained, and the feature information is encrypted based on a private key in the public and private key pair to obtain first signature data.
In an embodiment of the present application, the obtaining of the feature information for characterizing the identity of the object to be authenticated may include at least one of:
firstly, obtaining the identity information of the object to be verified.
Specifically, the identity information of the object to be verified may be an identity number of the object to be verified, a physical photograph of the object to be verified, an authentication certificate of the anti-counterfeit object, or other identity information capable of representing the identity of the anti-counterfeit object. For example, for a product to be shipped, the shipment number of the product may be used as the identification information. For example, a certificate of authenticity of jewelry may be used as the identification information of the jewelry. For example, for a valuable letter, a physical photograph of the letter may be used as its identity information.
And secondly, acquiring a first information abstract of the identity information of the object to be verified.
Specifically, the first information digest of the identity information of the object to be verified may be a character string obtained by performing hash processing on the identity information of the object to be verified. The hashing of the identity information of the verification object can be realized by an MD4 algorithm, an MD5 algorithm and an SHA-1 algorithm. The first information abstract obtained by carrying out hash processing on the identity information of the object to be verified has the advantage that the identity information of the anti-counterfeiting object can be concealed.
After the characteristic information used for representing the identity of the object to be verified is obtained, the characteristic information is encrypted based on a private key in the public and private key pair, and first signature data of the characteristic information of the object to be verified is obtained.
In step 303, the feature information of the object to be verified and the public key in the public-private key pair are uploaded to a block chain.
In this application, the feature information of the object to be verified is uploaded to the blockchain, and it should be noted that the specific content of the feature information of the object to be verified needs to be the same as the specific content of the feature information encrypted in step 302. For example, if the first information digest of the identification information of the anti-counterfeit object is encrypted in step 302, in step 303, the first information digest of the identification information of the anti-counterfeit object needs to be uploaded to the blockchain.
In an embodiment of the present application, after uploading the feature information of the object to be authenticated and the public key in the public-private key pair to the blockchain, a method as shown in fig. 4 may also be implemented.
Referring to fig. 4, a flowchart of a method after uploading the feature information and the public key of the object to be verified to the blockchain according to an embodiment of the present application is shown, and specifically may include steps 305 to 306:
step 305, obtaining a blockchain address of the blockchain, and a blockchain number of a block in the blockchain of the feature information of the object to be verified and the public key in the public and private key pair, where the blockchain number is used for representing a position of the feature information of the object to be verified and the public key in the public and private key pair in the blockchain.
Specifically, the blockchain address may refer to a network address for accessing the blockchain system.
Step 306, writing the address of the block chain and the block number into the NFC device.
In step 304, the first signature data is written into the NFC device to provide an anti-counterfeiting authentication service for the object to be authenticated.
In an embodiment of the present application, after writing the first signature data into the NFC device to provide the anti-counterfeit verification service for the object to be verified, the method with the steps shown in fig. 5 may also be implemented.
Referring to fig. 5, a flowchart of a method after writing the first signature data in the NFC device according to an embodiment of the present application is shown, which may specifically include steps 307 to 310:
step 307, acquiring the NFC device serial number information of the NFC device, and generating a second information digest based on the NFC device serial number information and the feature information of the object to be verified.
Specifically, the NFC device serial number information is a number used for characterizing the identity of the NFC device, and the serial number information of each NFC device is unique. In this application, a second information digest is generated based on the NFC device serial number information and the feature information of the object to be verified, and the second information digest may be obtained by performing hash processing on the NFC device serial number information and the feature information of the object to be verified.
And step 308, encrypting the second information abstract based on a private key in the public and private key pair to obtain second signature data.
And 309, uploading the second information abstract to a block chain.
Step 310, writing the second signature data into the NFC device.
In an embodiment of the present application, after writing the second signature data to the NFC device, the method as shown in fig. 6 may also be implemented.
Referring to fig. 6, a flowchart of a method after writing the second signature data in the NFC device according to an embodiment of the present application is shown, which may specifically include steps 311 to 313:
step 311, generating a third message digest based on the first signature data and the second signature data.
Step 312, encrypting the third information digest based on the private key in the public-private key pair to obtain third signature data.
Step 313, writing the third signature data into the NFC device.
In an embodiment of the present application, after writing the first signature data into the NFC device to provide the anti-counterfeit verification service for the object to be verified, the method with the steps shown in fig. 7 may also be implemented.
Referring to fig. 7, a flowchart of a method after writing the first signature data in the NFC device according to an embodiment of the present application is shown, which may specifically include steps 314 to 315:
step 314, acquiring the NFC device serial number information of the NFC device.
Step 315, uploading the NFC device serial number information of the NFC device to a block chain.
According to a second aspect of the disclosure, a block chain-based anti-counterfeiting information processing method is provided, which is applied to an anti-counterfeiting information verification terminal.
Referring to fig. 8, a flowchart of a blockchain-based anti-counterfeiting information processing method applied to an anti-counterfeiting information verification terminal according to an embodiment of the present application is shown, and the anti-counterfeiting information processing method may be performed by a device having a calculation processing function, such as the anti-counterfeiting information verification device 205 shown in fig. 2. As shown in fig. 8, the method for processing anti-counterfeit information at least includes steps 801 to 803:
step 801, reading first signature data written in an NFC device in advance, where the first signature data is generated by encrypting, by a private key in a pre-generated public and private key pair, feature information used for characterizing an identity of an object to be verified.
Step 802, looking up the feature information of the object to be verified corresponding to the first signature data uploaded in advance and the public key in the public and private key pair in the blockchain.
Step 803, verifying the authenticity of the object to be verified based on the found characteristic information of the object to be verified, the public key in the public and private key pair, and the first signature data.
The steps carried out as above will be explained in detail below:
in step 801, first signature data written in advance in an NFC device is read, and the first signature data is generated by encrypting feature information for characterizing an identity of an object to be verified by a private key of a pre-generated public and private key pair.
In an embodiment of the present application, the feature information of the object to be verified may include at least one of:
first, identity information of the object to be authenticated.
And secondly, the first information abstract of the identity information of the object to be verified.
In step 802, the feature information of the pre-uploaded object to be verified corresponding to the first signature data and the public key in the public and private key pair are searched in the blockchain.
In one embodiment of the present application, searching for feature information of an object to be verified corresponding to the first signature data uploaded in advance and a public key in a public-private key pair in a blockchain may be implemented by the steps as described in fig. 9.
Referring to fig. 9, a detailed flowchart of finding feature information and a public key of an object to be verified on a blockchain according to an embodiment of the present application is shown, which may specifically include steps 8021 to 8022:
step 8021, reading a block chain address of the block chain written in the NFC device in advance, and the block number of a block in the block chain of the feature information of the object to be verified and the public key in the public-private key pair.
Step 8022, according to the block chain address and the block number, looking up the feature information of the object to be verified corresponding to the first signature data uploaded in advance and the public key in the public and private key pair in the block chain.
In step 803, the authenticity of the object to be verified is verified based on the found feature information of the object to be verified, the public key in the public-private key pair, and the first signature data.
In an embodiment of the present application, verifying the authenticity of the object to be verified based on the found feature information of the object to be verified and the public key in the public-private key pair, and the first signature data may be implemented by the steps as described in fig. 10.
Referring to fig. 10, a detailed flowchart for verifying the authenticity of the object to be verified according to an embodiment of the present application is shown, which may specifically include steps 8031 to 8032:
step 8031, detecting whether the public key in the public-private key pair can decrypt the first signature data, so as to obtain the decrypted feature information.
Specifically, if the public key in the public-private key pair cannot decrypt the first signature data, it indicates that the first signature data is false, and further indicates that the object to be verified fails in authenticity verification.
Step 8032, detecting whether the decrypted characteristic information is consistent with the searched characteristic information of the object to be verified, so as to verify the authenticity of the object to be verified.
Specifically, if the decrypted feature information is inconsistent with the found feature information of the object to be verified, it indicates that the first signature data is false, and further indicates that the object to be verified fails in authenticity verification.
In an embodiment of the present application, after verifying the authenticity of the object to be verified based on the feature information and the public key of the object to be verified and the first signature data, a method as shown in fig. 11 may be further implemented.
Referring to fig. 11, a flowchart after verifying the authenticity of an object to be verified based on feature information and a public key of the object to be verified and first signature data according to an embodiment of the present application is shown, which may specifically include steps 804 to 805:
step 804, reading second signature data written in the NFC device in advance, where the second signature data is generated by encrypting, by a private key in a pre-generated public and private key pair, feature information used for characterizing the identity of an object to be verified and a second information digest of the NFC device serial number information.
Step 805, searching a second information summary corresponding to the second signature data uploaded in advance in the blockchain.
Step 806, verifying the authenticity of the object to be verified based on the found second information digest and the public key in the public and private key pair and the second signature data.
In a specific implementation of an embodiment, verifying the authenticity of the object to be verified based on the found second digest of information and the public key in the public-private key pair and the second signature data may be implemented as follows:
detecting whether a public key in the public and private key pair can decrypt the second signature data to obtain a decrypted second information digest; if the public key in the public and private key pair cannot decrypt the second signature data, the second signature data is false, and the object to be verified is further verified to be not true or false; detecting whether the decrypted second information abstract is consistent with the searched second information abstract of the object to be verified so as to verify the authenticity of the object to be verified; and if the decrypted second information abstract is inconsistent with the searched second information abstract of the object to be verified, the second signature data is false, and the object to be verified is further proved to not pass authenticity verification.
In an embodiment of the present application, after verifying the authenticity of the object to be verified based on the found second digest of information and the public key in the public-private key pair and the second signature data, a method as shown in fig. 12 may be further implemented.
Referring to fig. 12, a flowchart illustrating a process of verifying whether the first signature data and the second signature data are tampered according to an embodiment of the present application may specifically include steps 807 to 810:
in step 807, third signature data written in advance in the NFC device is read, and the third signature data is generated by encrypting a third information digest of the first signature data and the second signature data by a private key of a pre-generated public and private key pair.
Step 808, decrypting the third signature data based on the found public key in the public and private key pair to obtain a third information digest.
Specifically, if the public key in the public-private key pair cannot decrypt the third signature data, it indicates that the third signature data is false, and further indicates that the object to be verified does not pass authenticity verification.
Step 809, generating a fourth message summary based on the first signature data and the second signature data.
Step 810, detecting whether the third message digest and the fourth message digest are consistent to verify whether the first signature data and the second signature data are tampered.
Specifically, if the third message digest is not identical to the fourth message digest, it indicates that the first signature data and the second signature data are tampered. Further indicating that the object to be verified fails the authenticity verification.
In an embodiment of the present application, after verifying the authenticity of the object to be verified based on the found feature information of the object to be verified and the public key in the public-private key pair and the first signature data, a method as shown in fig. 13 may be further implemented.
Referring to fig. 13, a flowchart for verifying whether the NFC apparatus is replaced according to an embodiment of the present application is shown, which may specifically include steps 811 to 813:
step 811, reading the NFC device serial number information of the NFC device.
Step 812, searching the NFC device serial number information corresponding to the first signature data uploaded in advance in the blockchain.
Step 813, detecting whether the read NFC device serial number information of the NFC device and the NFC device serial number information searched in the block chain are consistent, so as to verify whether the NFC device is replaced.
Specifically, if the read NFC device serial number information of the NFC device is not consistent with the NFC device serial number information searched in the block chain, it is indicated that the NFC device is replaced. Further indicating that the object to be verified fails the authenticity verification.
To better understand the technical idea of the present application, a flow chart of the system for processing anti-counterfeiting information of the present application will be described in its entirety with reference to fig. 14:
referring to FIG. 14, a flow diagram of a system for processing security information for a security object is shown, according to one embodiment of the present application.
In the process of processing the anti-counterfeiting information of the anti-counterfeiting object once, at least 8 functional steps as shown in fig. 14 can be implemented, wherein it needs to be explained; on the other hand, the function step 1401, the function step 1403, the function step 1405 and the function step 1407 are executed by the forgery prevention information issuing side. Function 1402, function 1404, function 1406, and function 1408 are performed by the authentication side. On the other hand, the cooperative implementation of function step 1401 and function step 1402 may be to implement verifying the authenticity of the object to be verified, the cooperative implementation of function step 1403 and function step 1404 may also be to implement verifying the authenticity of the object to be verified, the cooperative implementation of function step 1405 and function step 1406 may be to implement verifying whether the first signature data and the second signature data are tampered with, and the cooperative implementation of function step 1405 and function step 1406 may be to implement verifying whether the NFC device verification is replaced.
In the technical solutions provided by some embodiments of the present application, on one hand, the anti-counterfeit information for the anti-counterfeit object is issued by uploading the feature information of the object to be verified and a public key in a public-private key pair to a blockchain, and writing first signature data obtained by encrypting the feature information of the object to be verified by a private key into an NFC device. On the other hand, the anti-counterfeiting information aiming at the anti-counterfeiting object is verified through the read first signature data which is written in the NFC device in advance, and the feature information of the object to be verified corresponding to the first signature data which is uploaded in advance and found in the block chain and the public key in the public and private key pair. Due to the non-replicability of the NFC device, the irreparability of the characteristic information of the object to be verified uploaded to the block chain and the non-decryptability of the encrypted data of the characteristic information of the object to be verified written in the NFC device, the anti-counterfeiting information of the anti-counterfeiting object is difficult to abuse, so that the safety of the anti-counterfeiting information of the anti-counterfeiting object can be improved, and the problem that the anti-counterfeiting reliability of the anti-counterfeiting object cannot be guaranteed in the prior art is solved.
The following describes embodiments of the apparatus of the present application, which can be used to perform the anti-counterfeit information processing method in the above embodiments of the present application. For details that are not disclosed in the embodiments of the apparatus of the present application, please refer to the embodiments of the anti-counterfeit information processing method described above in the present application.
FIG. 15 shows a block diagram of a blockchain-based anti-counterfeiting information processing apparatus according to an embodiment of the present application.
Referring to fig. 15, the block chain-based forgery prevention information processing apparatus 1500 is used for issuing forgery prevention information, and includes: a first generation unit 1501, a first acquisition unit 1502, a first upload unit 1503, and a first write unit 1504.
Wherein the first generating unit 1501 is configured to generate a public-private key pair including a public key and a private key in response to receiving an instruction to initialize the NFC device; a first obtaining unit 1502, configured to obtain feature information used for characterizing an identity of an object to be verified, so as to encrypt the feature information based on a private key in the public and private key pair, so as to obtain first signature data; a first uploading unit 1503, configured to upload feature information of the object to be verified and a public key in a public-private key pair to a block chain; a first writing unit 1504, configured to write the first signature data into the NFC device to provide an anti-counterfeit verification service for the object to be verified.
In some embodiments of the present application, based on the foregoing solution, the apparatus further includes: a second obtaining unit, configured to obtain a blockchain address of the blockchain, and a blockchain number of a blockchain of the feature information of the object to be verified and a public key in the public-private key pair, where the blockchain number is used to represent positions of the feature information of the object to be verified and the public key in the public-private key pair in the blockchain; a second writing unit used to write the address of the block chain and the block number into the NFC device.
In some embodiments of the present application, based on the foregoing solution, the apparatus further includes: a third acquiring unit, configured to acquire NFC device serial number information of the NFC device, so as to generate a second information digest based on the NFC device serial number information and the feature information of the object to be verified; the first encryption unit is used for encrypting the second information digest based on a private key in the public and private key pair to obtain second signature data; a second uploading unit, configured to upload the second information summary to a blockchain; a third writing unit configured to write the second signature data to the NFC device.
In some embodiments of the present application, based on the foregoing solution, the apparatus further includes: a second generation unit configured to generate a third information digest based on the first signature data and the second signature data; the second encryption unit is used for encrypting the third information abstract based on a private key in the public and private key pair to obtain third signature data; a fourth writing unit configured to write the third signature data to the NFC device.
In some embodiments of the present application, based on the foregoing solution, the apparatus further includes: a third acquiring unit configured to acquire NFC device serial number information of the NFC device; a third uploading unit, configured to upload NFC device serial number information of the NFC device to a blockchain.
In some embodiments of the present application, based on the foregoing scheme, the first obtaining unit 1502 is configured to: acquiring at least one of the following characteristic information for representing the identity of an object to be verified: acquiring identity information of the object to be verified; and acquiring a first information abstract of the identity information of the object to be verified.
FIG. 16 shows a block diagram of a blockchain-based anti-counterfeiting information processing apparatus according to one embodiment of the present application.
Referring to fig. 16, the device 1600 for processing anti-counterfeit information based on block chain is used for verifying anti-counterfeit information, and includes: a first reading unit 1601, a first lookup unit 1602, and a first verifying unit 1603.
The first reading unit 1601 is configured to read first signature data written in the NFC device in advance, where the first signature data is generated by encrypting, by a private key of a pre-generated public and private key pair, feature information used for characterizing an identity of an object to be authenticated; a first searching unit 1602, configured to search, in a blockchain, pre-uploaded feature information of an object to be verified corresponding to the first signature data and a public key in a public-private key pair; a first verifying unit 1603, configured to verify authenticity of the object to be verified based on the found feature information of the object to be verified and a public key in a public-private key pair and the first signature data.
In some embodiments of the present application, based on the foregoing solution, the first lookup unit 1602 is configured to: reading a block chain address of the block chain written in an NFC device in advance, and block numbers of blocks of the feature information of the object to be verified and a public key in the public and private key pair in the block chain; and searching feature information of an object to be verified corresponding to the first signature data and a public key in a public and private key pair which are uploaded in advance in the blockchain according to the blockchain address and the blockchain number.
In some embodiments of the present application, based on the foregoing scheme, the first verifying unit 1603 is configured to: detecting whether a public key in the public and private key pair can decrypt the first signature data to obtain decrypted characteristic information; and detecting whether the decrypted characteristic information is consistent with the searched characteristic information of the object to be verified so as to verify the authenticity of the object to be verified.
In some embodiments of the present application, based on the foregoing solution, the apparatus further includes: the second reading unit is used for reading second signature data written in the NFC device in advance, and the second signature data is generated by encrypting characteristic information used for representing the identity of an object to be verified and a second information digest of the serial number information of the NFC device by a private key in a pre-generated public and private key pair; the second searching unit is used for searching a second information summary which is uploaded in advance and corresponds to the second signature data in a block chain; and the second verification unit is used for verifying the authenticity of the object to be verified based on the searched second information digest, the public key in the public and private key pair and the second signature data.
In some embodiments of the present application, based on the foregoing solution, the apparatus further includes: a third reading unit configured to read third signature data written in advance in the NFC device, the third signature data being generated by encrypting a third information digest of the first signature data and the second signature data with a private key of a public-private key pair generated in advance; the first decryption unit is used for decrypting the third signature data based on the found public key in the public and private key pair to obtain a third information abstract; a third generation unit configured to generate a fourth information digest based on the first signature data and the second signature data; and the third verification unit is used for detecting whether the third message digest and the fourth message digest are consistent or not so as to verify whether the first signature data and the second signature data are tampered or not.
In some embodiments of the present application, based on the foregoing solution, the apparatus further includes: a fourth reading unit configured to read NFC device serial number information of the NFC device; a third searching unit, configured to search, in a block chain, pre-uploaded NFC device serial number information corresponding to the first signature data; and the first detection unit is used for detecting whether the read NFC device serial number information of the NFC device is consistent with the NFC device serial number information searched in the block chain so as to verify whether the NFC device is replaced.
In some embodiments of the present application, based on the foregoing scheme, the feature information of the object to be verified specifically includes at least one of the following: identity information of the object to be verified; and the first information abstract of the identity information of the object to be verified.
FIG. 17 illustrates a schematic structural diagram of a computer system suitable for use in implementing the electronic device of an embodiment of the present application.
It should be noted that the computer system 1700 of the electronic device shown in fig. 17 is only an example, and should not bring any limitation to the functions and the scope of the application of the embodiments.
As shown in fig. 17, a computer system 1700 includes a Central Processing Unit (CPU)1701 that can perform various appropriate actions and processes, such as executing the methods described in the above embodiments, according to a program stored in a Read-Only Memory (ROM) 1702 or a program loaded from a storage portion 1708 into a Random Access Memory (RAM) 1703. In the RAM 1703, various programs and data necessary for system operation are also stored. The CPU 1701, ROM 1702, and RAM 1703 are connected to each other through a bus 1704. An Input/Output (I/O) interface 1705 is also connected to the bus 1704.
The following components are connected to the I/O interface 1705: an input section 1706 including a keyboard, a mouse, and the like; an output section 1707 including a Display such as a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), and a speaker; a storage portion 1708 including a hard disk and the like; and a communication section 1709 including a Network interface card such as a LAN (Local Area Network) card, a modem, or the like. The communication section 1709 performs communication processing via a network such as the internet. A driver 1710 is also connected to the I/O interface 1705 as necessary. A removable medium 1711 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is mounted on the drive 1710 as necessary, so that a computer program read out therefrom is mounted into the storage portion 1708 as necessary.
In particular, according to embodiments of the application, the processes described above with reference to the flow diagrams may be implemented as computer software programs. For example, embodiments of the present application include a computer program product comprising a computer program embodied on a computer readable medium, the computer program comprising program code for performing the method illustrated by the flow chart. In such embodiments, the computer program may be downloaded and installed from a network via the communication portion 1709, and/or installed from the removable media 1711. When the computer program is executed by a Central Processing Unit (CPU)1701, various functions defined in the system of the present application are executed.
It should be noted that the computer readable medium shown in the embodiments of the present application may be a computer readable signal medium or a computer readable storage medium or any combination of the two. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples of the computer readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a Read-Only Memory (ROM), an Erasable Programmable Read-Only Memory (EPROM), a flash Memory, an optical fiber, a portable Compact Disc Read-Only Memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the present application, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In this application, however, a computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: wireless, wired, etc., or any suitable combination of the foregoing.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present application. Each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams or flowchart illustration, and combinations of blocks in the block diagrams or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units described in the embodiments of the present application may be implemented by software, or may be implemented by hardware, and the described units may also be disposed in a processor. Wherein the names of the elements do not in some way constitute a limitation on the elements themselves.
As another aspect, the present application also provides a computer-readable medium, which may be contained in the electronic device described in the above embodiments; or may exist separately without being assembled into the electronic device. The computer readable medium carries one or more programs which, when executed by an electronic device, cause the electronic device to implement the method described in the above embodiments.
It should be noted that although in the above detailed description several modules or units of the device for action execution are mentioned, such a division is not mandatory. Indeed, the features and functionality of two or more modules or units described above may be embodied in one module or unit, according to embodiments of the application. Conversely, the features and functions of one module or unit described above may be further divided into embodiments by a plurality of modules or units.
Through the above description of the embodiments, those skilled in the art will readily understand that the exemplary embodiments described herein may be implemented by software, or by software in combination with necessary hardware. Therefore, the technical solution according to the embodiments of the present application can be embodied in the form of a software product, which can be stored in a non-volatile storage medium (which can be a CD-ROM, a usb disk, a removable hard disk, etc.) or on a network, and includes several instructions to enable a computing device (which can be a personal computer, a server, a touch terminal, or a network device, etc.) to execute the method according to the embodiments of the present application.
Other embodiments of the present application will be apparent to those skilled in the art from consideration of the specification and practice of the embodiments disclosed herein. This application is intended to cover any variations, uses, or adaptations of the invention following, in general, the principles of the application and including such departures from the present disclosure as come within known or customary practice within the art to which the invention pertains.
It will be understood that the present application is not limited to the precise arrangements described above and shown in the drawings and that various modifications and changes may be made without departing from the scope thereof. The scope of the application is limited only by the appended claims.

Claims (15)

1. An anti-counterfeiting information processing method based on a block chain is applied to an anti-counterfeiting information issuing end and is characterized by comprising the following steps:
generating a public-private key pair in response to receiving an instruction to initialize the NFC device, the public-private key pair comprising a public key and a private key;
acquiring characteristic information for representing the identity of an object to be verified, and encrypting the characteristic information based on a private key in the public and private key pair to obtain first signature data;
uploading the characteristic information of the object to be verified and a public key in a public and private key pair to a block chain;
and writing the first signature data into the NFC device to provide anti-counterfeiting verification service for the object to be verified.
2. The method of claim 1, wherein after uploading the feature information of the object to be authenticated and the public key of the public-private key pair to a blockchain, the method further comprises:
acquiring a block chain address of the block chain, and block numbers of blocks of the feature information of the object to be verified and a public key in a public and private key pair in the block chain, wherein the block numbers are used for representing positions of the feature information of the object to be verified and the public key in the public and private key pair in the block chain;
writing the address of the block chain and the block number to the NFC device.
3. The method of claim 1, wherein after writing the first signature data to an NFC device to provide anti-counterfeiting authentication services for an object to be authenticated, the method further comprises:
acquiring NFC device serial number information of the NFC device to generate a second information abstract based on the NFC device serial number information and the characteristic information of the object to be verified;
encrypting the second information abstract based on a private key in the public and private key pair to obtain second signature data;
uploading the second information abstract to a block chain;
writing the second signature data to the NFC device.
4. The method of claim 3, wherein after writing the second signature data to the NFC device, the method further comprises:
generating a third message summary based on the first signature data and the second signature data;
encrypting the third information abstract based on a private key in the public and private key pair to obtain third signature data;
writing the third signature data to the NFC device.
5. The method of claim 1, wherein after writing the first signature data to an NFC device to provide anti-counterfeiting authentication services for an object to be authenticated, the method further comprises:
acquiring NFC device serial number information of the NFC device;
and uploading the NFC device serial number information of the NFC device to a block chain.
6. The method according to any one of claims 1 to 5, wherein the obtaining of the feature information for characterizing the identity of the object to be authenticated specifically includes at least one of:
acquiring identity information of the object to be verified;
and acquiring a first information abstract of the identity information of the object to be verified.
7. An anti-counterfeiting information processing method based on a block chain is applied to an anti-counterfeiting information verification end and is characterized by comprising the following steps:
reading first signature data written in an NFC device in advance, wherein the first signature data is generated by encrypting characteristic information used for representing the identity of an object to be verified by a private key in a pre-generated public and private key pair;
searching feature information of an object to be verified corresponding to the first signature data uploaded in advance and a public key in a public and private key pair in a block chain;
and verifying the authenticity of the object to be verified based on the found characteristic information of the object to be verified, a public key in a public and private key pair and the first signature data.
8. The method of claim 7, wherein searching for pre-uploaded feature information of an object to be verified corresponding to the first signature data and a public key in a public and private key pair in a blockchain comprises:
reading a block chain address of the block chain written in an NFC device in advance, and block numbers of blocks of the feature information of the object to be verified and a public key in the public and private key pair in the block chain;
and searching feature information of an object to be verified corresponding to the first signature data and a public key in a public and private key pair which are uploaded in advance in the blockchain according to the blockchain address and the blockchain number.
9. The method as claimed in claim 7, wherein the verifying the authenticity of the object to be verified based on the feature information of the object to be verified and the public key in the public-private key pair found and the first signature data comprises:
detecting whether a public key in the public and private key pair can decrypt the first signature data to obtain decrypted characteristic information;
and detecting whether the decrypted characteristic information is consistent with the searched characteristic information of the object to be verified so as to verify the authenticity of the object to be verified.
10. The method as claimed in claim 7, wherein after verifying the authenticity of the object to be verified based on the feature information of the object to be verified and the public key in the public-private key pair found and the first signature data, the method further comprises:
reading second signature data written in an NFC device in advance, wherein the second signature data is generated by encrypting feature information used for representing the identity of an object to be verified and a second information digest of the serial number information of the NFC device by a private key in a pre-generated public and private key pair;
searching a second information summary which is uploaded in advance and corresponds to the second signature data in a block chain;
and verifying the authenticity of the object to be verified based on the searched second information digest, the public key in the public and private key pair and the second signature data.
11. The method of claim 10, wherein after verifying the authenticity of the object to be verified based on the second message digest and the public key of the public-private key pair found, and the second signature data, the method further comprises:
reading third signature data written in an NFC device in advance, wherein the third signature data is generated by encrypting a third information digest of the first signature data and the second signature data by a private key in a pre-generated public and private key pair;
decrypting the third signature data based on the found public key in the public and private key pair to obtain a third information abstract;
generating a fourth message digest based on the first signature data and the second signature data;
and detecting whether the third message digest and the fourth message digest are consistent or not so as to verify whether the first signature data and the second signature data are tampered or not.
12. The method as claimed in claim 7, wherein after verifying the authenticity of the object to be verified based on the feature information of the object to be verified and the public key in the public-private key pair found and the first signature data, the method further comprises:
reading NFC device serial number information of the NFC device;
searching pre-uploaded NFC device serial number information corresponding to the first signature data in a block chain;
and detecting whether the read NFC device serial number information of the NFC device is consistent with the NFC device serial number information searched in the block chain or not so as to verify whether the NFC device is replaced or not.
13. The method according to any one of claims 7 to 12, wherein the feature information of the object to be verified specifically includes at least one of:
identity information of the object to be verified;
and the first information abstract of the identity information of the object to be verified.
14. A block chain-based anti-counterfeiting information processing device for issuing anti-counterfeiting information, comprising:
a first generating unit configured to generate a public-private key pair including a public key and a private key in response to receiving an instruction to initialize the NFC device;
the first obtaining unit is used for obtaining characteristic information for representing the identity of an object to be verified, and encrypting the characteristic information based on a private key in the public and private key pair to obtain first signature data;
the first uploading unit is used for uploading the characteristic information of the object to be verified and a public key in a public and private key pair to a block chain;
and the first writing unit is used for writing the first signature data into the NFC device so as to provide anti-counterfeiting verification service for the object to be verified.
15. A block chain-based anti-counterfeiting information processing device for verifying anti-counterfeiting information, comprising:
the NFC device comprises a first reading unit, a second reading unit and a third reading unit, wherein the first reading unit is used for reading first signature data written in the NFC device in advance, and the first signature data is generated by encrypting characteristic information used for representing the identity of an object to be verified by a private key in a pre-generated public and private key pair;
the first searching unit is used for searching feature information of an object to be verified corresponding to the first signature data and a public key in a public and private key pair which are uploaded in advance in a block chain;
and the first verification unit is used for verifying the authenticity of the object to be verified based on the found characteristic information of the object to be verified, the public key in the public and private key pair and the first signature data.
CN201910854952.2A 2019-09-10 2019-09-10 Anti-counterfeiting information processing method and device based on block chain Pending CN110598433A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910854952.2A CN110598433A (en) 2019-09-10 2019-09-10 Anti-counterfeiting information processing method and device based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910854952.2A CN110598433A (en) 2019-09-10 2019-09-10 Anti-counterfeiting information processing method and device based on block chain

Publications (1)

Publication Number Publication Date
CN110598433A true CN110598433A (en) 2019-12-20

Family

ID=68858670

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910854952.2A Pending CN110598433A (en) 2019-09-10 2019-09-10 Anti-counterfeiting information processing method and device based on block chain

Country Status (1)

Country Link
CN (1) CN110598433A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113496025A (en) * 2020-03-19 2021-10-12 上海唯链信息科技有限公司 Anti-counterfeiting method, device and system based on block chain
CN113554827A (en) * 2021-07-22 2021-10-26 中国工商银行股份有限公司 Customer information service method and device based on near field communication

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113496025A (en) * 2020-03-19 2021-10-12 上海唯链信息科技有限公司 Anti-counterfeiting method, device and system based on block chain
CN113554827A (en) * 2021-07-22 2021-10-26 中国工商银行股份有限公司 Customer information service method and device based on near field communication

Similar Documents

Publication Publication Date Title
US20180308098A1 (en) Identity Management Service Using A Block Chain Providing Identity Transactions Between Devices
US11323272B2 (en) Electronic identification verification methods and systems with storage of certification records to a side chain
CN107342867B (en) Signature verification method and device
TW201732666A (en) A method and system for securing computer software using a distributed hash table and a blockchain
CN107770159B (en) Vehicle accident data recording method and related device and readable storage medium
EP3890239A1 (en) Compact recordation protocol
US10602202B1 (en) System and techniques for digital data lineage verification
WO2018145127A1 (en) Electronic identification verification methods and systems with storage of certification records to a side chain
CN110519260B (en) Information processing method and information processing device
US9600690B2 (en) Secure access for sensitive digital information
US20210319132A1 (en) Methods and Devices For Managing User Identity Authentication Data
CN110046996B (en) Data processing method and device
CN111556007B (en) Identity verification method, device and equipment based on block chain and storage medium
CN110598433A (en) Anti-counterfeiting information processing method and device based on block chain
WO2015154482A1 (en) One-time certificate anti-counterfeiting tracing system based on mobile terminal and rfid
CN112084234A (en) Data acquisition method, apparatus, device and medium
CN109905351B (en) Method, device, server and computer readable storage medium for storing data
CN110290134A (en) A kind of identity identifying method, device, storage medium and processor
CN108173659B (en) Certificate management method and system based on UKEY equipment and terminal equipment
CN110826091B (en) File signature method and device, electronic equipment and readable storage medium
CN111147248A (en) Encrypted transmission method, device and system of face feature library and storage medium
CN112800086A (en) Electronic certificate verification method, system, device and computer readable storage medium
CN110941745A (en) Electronic contract management method and device, storage medium and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination