CN110598433B - Block chain-based anti-fake information processing method and device - Google Patents

Block chain-based anti-fake information processing method and device Download PDF

Info

Publication number
CN110598433B
CN110598433B CN201910854952.2A CN201910854952A CN110598433B CN 110598433 B CN110598433 B CN 110598433B CN 201910854952 A CN201910854952 A CN 201910854952A CN 110598433 B CN110598433 B CN 110598433B
Authority
CN
China
Prior art keywords
verified
information
public
signature data
private key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910854952.2A
Other languages
Chinese (zh)
Other versions
CN110598433A (en
Inventor
王强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201910854952.2A priority Critical patent/CN110598433B/en
Publication of CN110598433A publication Critical patent/CN110598433A/en
Application granted granted Critical
Publication of CN110598433B publication Critical patent/CN110598433B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Abstract

The application relates to the technical field of anti-counterfeiting, and discloses a block chain-based anti-counterfeiting information processing method and device. The method is applied to the anti-counterfeiting information issuing end and comprises the following steps: generating a public-private key pair in response to receiving an instruction to initialize the NFC device, the public-private key pair comprising a public key and a private key; acquiring characteristic information used for representing the identity of an object to be verified, and encrypting the characteristic information based on a private key in the public-private key pair to obtain first signature data; uploading the characteristic information of the object to be verified and the public key in the public-private key pair to a blockchain; the first signature data is written to an NFC device to provide anti-counterfeiting verification services for an object to be verified. The technical scheme of the embodiment of the application can improve the security of anti-counterfeiting of the anti-counterfeiting object.

Description

Block chain-based anti-fake information processing method and device
Technical Field
The application relates to the field of anti-counterfeiting technology, in particular to a block chain-based anti-counterfeiting information processing method and device.
Background
In the case of processing anti-counterfeiting information, for example, in the case of processing anti-counterfeiting information on anti-counterfeiting objects such as commodities, certificates, letters, and the like, the anti-counterfeiting information of the anti-counterfeiting object is generally embedded in a two-dimensional code, and a user scans the two-dimensional code through a terminal device to perform anti-counterfeiting verification on the anti-counterfeiting object. However, how to improve the security of anti-counterfeiting objects is a technical problem to be solved.
Disclosure of Invention
The embodiment of the application provides a block chain-based anti-counterfeiting information processing method and device, and further at least to a certain extent, the anti-counterfeiting security of an anti-counterfeiting object can be improved.
Other features and advantages of the present application will be apparent from the following detailed description, or may be learned in part by the practice of the application.
According to an aspect of the embodiments of the present application, there is provided a blockchain-based anti-counterfeiting information processing method, applied to an anti-counterfeiting information issuing end, including: generating a public-private key pair in response to receiving an instruction to initialize the NFC device, the public-private key pair comprising a public key and a private key; acquiring characteristic information used for representing the identity of an object to be verified, and encrypting the characteristic information based on a private key in the public-private key pair to obtain first signature data; uploading the characteristic information of the object to be verified and the public key in the public-private key pair to a blockchain; the first signature data is written to an NFC device to provide anti-counterfeiting verification services for an object to be verified.
According to an aspect of the embodiments of the present application, there is provided a blockchain-based anti-counterfeiting information processing method, applied to an anti-counterfeiting information verification terminal, including: reading first signature data written in the NFC device in advance, wherein the first signature data is generated by encrypting characteristic information used for representing the identity of an object to be verified by a private key in a public-private key pair generated in advance; searching feature information of an object to be verified, which is uploaded in advance and corresponds to the first signature data, and a public key in a public-private key pair in a blockchain; and verifying the authenticity of the object to be verified based on the searched characteristic information of the object to be verified, the public key in the public-private key pair and the first signature data.
According to an aspect of the embodiments of the present application, there is provided a blockchain-based anti-counterfeiting information processing device for issuing anti-counterfeiting information, including: a first generation unit configured to generate a public-private key pair in response to receiving an instruction to initialize an NFC device, the public-private key pair including a public key and a private key; the first acquisition unit is used for acquiring characteristic information used for representing the identity of the object to be verified, so as to encrypt the characteristic information based on the private key in the public-private key pair, and obtain first signature data; the first uploading unit is used for uploading the characteristic information of the object to be verified and the public key in the public-private key pair to the blockchain; and the first writing unit is used for writing the first signature data into the NFC device so as to provide anti-counterfeiting verification service for the object to be verified.
In some embodiments of the present application, based on the foregoing solution, the apparatus further includes: the second acquisition unit is used for acquiring the blockchain address of the blockchain, and the block number of a block in the blockchain of the public key in the public key pair and the characteristic information of the object to be verified, wherein the block number is used for representing the characteristic information of the object to be verified and the position of the public key in the public key pair in the blockchain; a second writing unit for writing the address of the blockchain and the blocknumber to the NFC device.
In some embodiments of the present application, based on the foregoing solution, the apparatus further includes: a third obtaining unit, configured to obtain NFC device serial number information of the NFC device, so as to generate a second information digest based on the NFC device serial number information and feature information of the object to be verified; the first encryption unit is used for encrypting the second information abstract based on the private key in the public-private key pair to obtain second signature data; a second uploading unit for uploading the second message digest to a blockchain; and a third writing unit for writing the second signature data to the NFC device.
In some embodiments of the present application, based on the foregoing solution, the apparatus further includes: a second generation unit configured to generate a third information digest based on the first signature data and the second signature data; the second encryption unit is used for encrypting the third information abstract based on the private key in the public-private key pair to obtain third signature data; and a fourth writing unit for writing the third signature data to the NFC device.
In some embodiments of the present application, based on the foregoing solution, the apparatus further includes: a third acquisition unit configured to acquire NFC device serial number information of the NFC device; and a third uploading unit for uploading NFC device serial number information of the NFC device to a blockchain.
In some embodiments of the present application, based on the foregoing solution, the first obtaining unit is configured to: obtaining at least one of the following characteristic information for characterizing the identity of the object to be verified: acquiring identity information of the object to be verified; and acquiring a first information abstract of the identity information of the object to be verified.
According to an aspect of the embodiments of the present application, there is provided a blockchain-based anti-counterfeiting information processing device for verifying anti-counterfeiting information, including: a first reading unit, configured to read first signature data written in the NFC device in advance, where the first signature data is generated by encrypting feature information for characterizing an identity of an object to be verified by a private key in a public-private key pair generated in advance; the first searching unit is used for searching the characteristic information of the object to be verified, which is uploaded in advance and corresponds to the first signature data, and the public key in the public-private key pair in the blockchain; and the first verification unit is used for verifying the authenticity of the object to be verified based on the searched characteristic information of the object to be verified, the public key in the public-private key pair and the first signature data.
In some embodiments of the present application, based on the foregoing solution, the first search unit is configured to: reading a blockchain address of the blockchain written in the NFC device in advance, and characteristic information of the object to be verified and a blocknumber of a block of a public key in the public key pair in the blockchain; and searching the characteristic information of the object to be verified, which is uploaded in advance and corresponds to the first signature data, and the public key in the public-private key pair in the blockchain according to the blockchain address and the blocknumber.
In some embodiments of the present application, based on the foregoing solution, the first verification unit is configured to: detecting whether the public key in the public-private key pair can decrypt the first signature data to obtain decrypted characteristic information; and detecting whether the decrypted characteristic information is consistent with the characteristic information of the searched object to be verified so as to verify the authenticity of the object to be verified.
In some embodiments of the present application, based on the foregoing solution, the apparatus further includes: a second reading unit, configured to read second signature data written in the NFC device in advance, where the second signature data is generated by encrypting, by a private key in a public-private key pair generated in advance, feature information for characterizing an identity of an object to be authenticated and a second information digest of the NFC device serial number information; a second searching unit, configured to search a blockchain for a second information digest corresponding to the second signature data that is uploaded in advance; and the second verification unit is used for verifying the authenticity of the object to be verified based on the searched public key in the second information abstract and public-private key pair and the second signature data.
In some embodiments of the present application, based on the foregoing solution, the apparatus further includes: a third reading unit, configured to read third signature data written in the NFC device in advance, where the third signature data is generated by encrypting a third information digest of the first signature data and the second signature data by a private key in a public-private key pair that is generated in advance; a first decryption unit, configured to decrypt the third signature data based on the public key in the searched public-private key pair, so as to obtain a third information digest; a third generation unit configured to generate a fourth information digest based on the first signature data and the second signature data; and a third verification unit configured to detect whether the third information digest and the fourth information digest agree to verify whether the first signature data and the second signature data are tampered.
In some embodiments of the present application, based on the foregoing solution, the apparatus further includes: a fourth reading unit configured to read NFC device serial number information of the NFC device; a third searching unit, configured to search a blockchain for pre-uploaded NFC device serial number information corresponding to the first signature data; and the first detection unit is used for detecting whether the read NFC device serial number information of the NFC device is consistent with the NFC device serial number information searched in the blockchain so as to verify whether the NFC device is replaced.
In some embodiments of the present application, based on the foregoing solution, the feature information of the object to be verified specifically includes at least one of the following: identity information of the object to be verified; and a first information abstract of the identity information of the object to be verified.
According to an aspect of the embodiments of the present application, there is provided a computer-readable medium having stored thereon a computer program which, when executed by a processor, implements the anti-counterfeiting information processing method as described in the above embodiments.
According to an aspect of an embodiment of the present application, there is provided an electronic device including: one or more processors; and a storage means for storing one or more programs which, when executed by the one or more processors, cause the one or more processors to implement the anti-counterfeiting information processing method as described in the above embodiments.
In some embodiments of the present application, on one hand, the anti-counterfeiting information for the anti-counterfeiting object is issued by uploading the public key of the public-private key pair and the feature information of the object to be verified to the blockchain, and writing the first signature data obtained by encrypting the private key of the feature information of the object to be verified into the NFC device. On the other hand, the anti-counterfeiting information aiming at the anti-counterfeiting object is verified through the read first signature data which is written in the NFC device in advance and the characteristic information of the object to be verified and the public key in the public key pair which are uploaded in advance and correspond to the first signature data and are searched in the blockchain. The irreproducibility of the NFC device, the irreconcilability of the characteristic information of the object to be verified uploaded to the blockchain and the irreconcilability of the encrypted data of the characteristic information of the object to be verified written in the NFC device lead the anti-counterfeiting information of the anti-counterfeiting object to be difficult to misuse, thus improving the security of the anti-counterfeiting information of the anti-counterfeiting object and further solving the problem that the prior art cannot guarantee the security of anti-counterfeiting of the anti-counterfeiting object.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the application.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the application and together with the description, serve to explain the principles of the application. It is apparent that the drawings in the following description are only some embodiments of the present application, and that other drawings may be obtained from these drawings without inventive effort for a person of ordinary skill in the art. In the drawings:
FIG. 1 shows a schematic diagram of an exemplary system architecture to which the technical solutions of embodiments of the present application may be applied;
FIG. 2 illustrates a schematic view of a scenario of blockchain-based anti-counterfeiting information processing according to an embodiment of the present application;
FIG. 3 illustrates a flow chart of a blockchain-based anti-counterfeiting information processing method applied to an anti-counterfeiting information issuer according to one embodiment of the present application;
FIG. 4 illustrates a method flow diagram after uploading the object characteristic information to be verified and a public key to a blockchain in accordance with an embodiment of the present application;
FIG. 5 illustrates a method flow diagram after writing the first signature data to an NFC device according to one embodiment of the present application;
fig. 6 shows a method flow diagram after writing the second signature data to the NFC device according to an embodiment of the application;
Fig. 7 shows a method flowchart after writing the first signature data to an NFC device according to an embodiment of the present application;
FIG. 8 illustrates a flow chart of a blockchain-based anti-counterfeiting information processing method applied to an anti-counterfeiting information verification terminal according to one embodiment of the present application;
FIG. 9 illustrates a detailed flow diagram of searching for object feature information to be verified and a public key on a blockchain in accordance with an embodiment of the present application;
FIG. 10 shows a detailed flow chart of verifying the authenticity of the object to be verified according to one embodiment of the application;
FIG. 11 illustrates a flow chart after verifying the authenticity of an object to be verified based on the object characteristic information and public key to be verified and first signature data according to one embodiment of the present application;
FIG. 12 illustrates a flow chart of verifying whether the first and second signature data are tampered with according to one embodiment of the present application;
FIG. 13 illustrates a flowchart of verifying whether the NFC device is replaced according to one embodiment of the present application;
FIG. 14 illustrates a system flow diagram for processing security information of a security object according to one embodiment of the present application;
FIG. 15 illustrates a block diagram of a blockchain-based anti-counterfeiting information processing device according to an embodiment of the present application;
FIG. 16 illustrates a block diagram of a blockchain-based anti-counterfeiting information processing device according to an embodiment of the present application;
fig. 17 shows a schematic diagram of a computer system suitable for use in implementing the electronic device of the embodiments of the present application.
Detailed Description
Example embodiments will now be described more fully with reference to the accompanying drawings. However, the exemplary embodiments may be embodied in many forms and should not be construed as limited to the examples set forth herein; rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the concept of the example embodiments to those skilled in the art.
Furthermore, the described features, structures, or characteristics may be combined in any suitable manner in one or more embodiments. In the following description, numerous specific details are provided to give a thorough understanding of embodiments of the present application. One skilled in the relevant art will recognize, however, that the aspects of the application can be practiced without one or more of the specific details, or with other methods, components, devices, steps, etc. In other instances, well-known methods, devices, implementations, or operations are not shown or described in detail to avoid obscuring aspects of the application.
The block diagrams depicted in the figures are merely functional entities and do not necessarily correspond to physically separate entities. That is, the functional entities may be implemented in software, or in one or more hardware modules or integrated circuits, or in different networks and/or processor devices and/or microcontroller devices.
The flow diagrams depicted in the figures are exemplary only, and do not necessarily include all of the elements and operations/steps, nor must they be performed in the order described. For example, some operations/steps may be decomposed, and some operations/steps may be combined or partially combined, so that the order of actual execution may be changed according to actual situations.
Fig. 1 shows a schematic diagram of an exemplary system architecture to which the technical solutions of the embodiments of the present application may be applied.
As shown in fig. 1, the system architecture may include a terminal device (such as one or more of the smart phone 101, tablet 102, and portable computer 103 shown in fig. 1, but of course other NFC-enabled electronic devices, etc.), a network 104, and a blockchain system 105. The network 104 is the medium used to provide communication links between the end devices and the blockchain system 105. The network 104 may include various connection types, such as wired communication links, wireless communication links, and the like.
It should be understood that the terminal devices, networks in fig. 1 are merely illustrative. There may be any number of terminal devices and networks, as desired for implementation. In addition, there may be multiple blockchain systems as desired.
Fig. 2 shows a schematic view of a scenario of anti-counterfeiting information processing according to an embodiment of the present application.
As shown in fig. 1, in the scene, it includes: a security information issuing device 201, a blockchain system 202, a security object 203, an NFC device 204, and a security information verification device 205.
In one embodiment of the present application, the anti-counterfeit object may be a letter requiring anti-counterfeit verification, as shown in 203 in the figure, may be a commodity, may be an important document, or may be another object requiring anti-counterfeit verification. When the anti-counterfeiting information is issued for the anti-counterfeiting object, the anti-counterfeiting information can be written into the NFC device 204 through the anti-counterfeiting information issuing equipment 201, the anti-counterfeiting information is uploaded into the blockchain system 202, and then the NFC device 204 with the anti-counterfeiting information is attached to the anti-counterfeiting object 203. For example, the NFC device 204 is attached to the seal of the letter shown in fig. 2, so as to perform anti-counterfeit verification on the letter later, if the NFC device 204 attached to the seal of the letter is damaged, the authenticity of the letter cannot be verified, in an embodiment of the present application, when performing anti-counterfeit verification on the anti-counterfeit object, the anti-counterfeit information about the anti-counterfeit object 203 in the NFC device 204 may be read by the anti-counterfeit information verification device 205 first, and the anti-counterfeit information about the anti-counterfeit object 203 is obtained from the blockchain system 202, and then the authenticity of the anti-counterfeit information in the NFC device 204 is verified again, so as to determine the authenticity of the anti-counterfeit object 203. It should be noted that if the anti-counterfeiting information verification device does not have the NFC recognition function, the device having the NFC recognition function may recognize the anti-counterfeiting information, and then manually input the recognized anti-counterfeiting information into the anti-counterfeiting information verification device.
It should be noted that the anti-counterfeiting information issuing device and the anti-counterfeiting information verification device may be smart phones, tablet computers, portable computers, or other electronic devices with NFC functions. On the other hand, in the anti-counterfeiting information processing method provided in the embodiment of the present application, on one hand, when the anti-counterfeiting information is sent out, the anti-counterfeiting information processing method is generally executed by anti-counterfeiting information sending equipment. On the other hand, in verifying the security information, it is generally performed by a security information verification apparatus.
It should be explained that NFC is a short term of near field communication (Near Field Communication), which is also called near field communication, is a short-distance high-frequency wireless communication technology, and allows contactless peer-to-peer data transmission and exchange of data between electronic devices. Therefore, in the present application, the NFC device may be at least one device with an independent key generating function, an encrypting function, an decrypting function, and an independent processor and a storage unit, which may store the anti-counterfeiting information of the anti-counterfeiting object, and may be read by other devices with NFC functions. The NFC device may be, for example, any one of an IC chip card, a CPU chip card, a 14443 class a card, and a 14443 class B card. Because the NFC device is internally provided with the independent processing unit and the storage unit, the NFC device has an independent key generation function and an encryption and decryption function, and different NFC devices have different serial number information, so that the NFC device has uncopyability and uniqueness to a certain extent. Therefore, compared with the traditional two-dimensional code, the anti-counterfeiting information of the anti-counterfeiting object is stored in the NFC device with higher reliability.
In this application, regard block chain system as the database of depositing anti-fake object anti-fake information, its benefit lies in: since the blockchain system is a distributed database that is not tamperable and counterfeit; when any node in the blockchain system receives input information, other nodes in the blockchain system acquire the input information according to a consensus algorithm, and store the input information as data in shared data, so that the data stored on all nodes in the blockchain system are consistent. Specifically, for each node in the blockchain system, there is a node identification corresponding thereto, and each node in the blockchain system may store the node identifications of other nodes in the blockchain system for subsequent broadcasting of the generated block to other nodes in the blockchain system based on the node identifications of the other nodes. Each node can maintain a node identification list shown in the following table, and the node names and the node identifications are correspondingly stored in the node identification list. The node identifier may be an IP (Internet Protocol, protocol of interconnection between networks) address, and any other information that can be used to identify the node, and the IP address is only illustrated in table 1.
Node name Node identification
Node 1 117.114.151.174
Node 2 117.116.189.145
Node n 119.123.789.258
TABLE 1
Each node in the blockchain system stores one and the same blockchain. The block chain consists of a plurality of blocks, wherein the starting block comprises a block head and a block main body, the block head stores an input information characteristic value, a version number, a time stamp and a difficulty value, and the block main body stores input information; the next block of the starting block takes the starting block as a father block, the next block also comprises a block head and a block main body, the block head stores the input information characteristic value of the current block, the block head characteristic value of the father block, the version number, the timestamp and the difficulty value, and the like, so that the block data stored in each block in the block chain are associated with the block data stored in the father block, and the safety of the input information in the block is ensured. Therefore, the transparency, the safety and the efficiency of storing the anti-counterfeiting information of the anti-counterfeiting object can be improved to a great extent by using the blockchain system as the database for storing the anti-counterfeiting information of the anti-counterfeiting object.
The implementation details of the technical solutions of the embodiments of the present application are described in detail below:
according to a first aspect of the present disclosure, a blockchain-based anti-counterfeiting information processing method is provided, and is applied to an anti-counterfeiting information issuing end.
Referring to fig. 3, a flowchart of a blockchain-based anti-counterfeiting information processing method applied to an anti-counterfeiting information issuer according to one embodiment of the present application is shown, which may be performed by a device having a computing processing function, such as the anti-counterfeiting information issuer 201 shown in fig. 2. As shown in fig. 3, the anti-counterfeiting information processing method at least includes steps 301 to 304:
in step 301, in response to receiving an instruction to initialize an NFC device, a public-private key pair is generated, where the public-private key pair includes a public key and a private key.
Step 302, obtaining feature information for characterizing the identity of the object to be verified, so as to encrypt the feature information based on the private key in the public-private key pair, and obtain first signature data.
Step 303, uploading the characteristic information of the object to be verified and the public key in the public-private key pair to the blockchain.
Step 304, writing the first signature data into the NFC device to provide anti-counterfeiting verification service for the object to be verified.
The following will explain the above implementation steps in detail:
in step 301, in response to receiving an instruction to initialize an NFC device, a public-private key pair is generated, the public-private key pair including a public key and a private key.
In a specific implementation of one embodiment, the instruction for initializing the NFC device may be triggered by the anti-counterfeiting information issuing device 201. Specifically, the anti-counterfeiting information issuing device may initialize the NFC device by means of electromagnetic induction, and generate a public-private key pair according to the NFC device, where it should be noted that the public-private key pair includes a public key and a private key.
In step 302, feature information for characterizing the identity of the object to be verified is obtained, so as to encrypt the feature information based on the private key in the public-private key pair, and first signature data is obtained.
In one embodiment of the present application, the obtaining the characteristic information for characterizing the identity of the object to be verified may include at least one of:
and firstly, acquiring the identity information of the object to be verified.
Specifically, the identity information of the object to be verified may be an identity number of the object to be verified, a physical photograph of the object to be verified, an identification certificate of the anti-counterfeiting object, or other identity information capable of representing the identity of the anti-counterfeiting object. For example, the product to be shipped may have the product shipment number as the identity information. Also for example, for jewelry, an authentication certificate of jewelry may be used as its identity information. Also for example, for valuable letters, a physical photograph of the letter may be used as its identity information.
And secondly, acquiring a first information abstract of the identity information of the object to be verified.
Specifically, the first information abstract of the identity information of the object to be verified may be a character string obtained after hash processing is performed on the identity information of the object to be verified. The hash processing of the authentication object identity information can be realized through an MD4 algorithm, an MD5 algorithm and an SHA-1 algorithm. The hash processing of the identity information of the object to be verified to obtain the first information abstract has the advantage that the identity information of the anti-counterfeiting object can be hidden.
After the characteristic information used for representing the identity of the object to be verified is obtained, the characteristic information is encrypted based on the private key in the public-private key pair, and first signature data of the characteristic information of the object to be verified is obtained.
In step 303, the characteristic information of the object to be verified and the public key in the public-private key pair are uploaded to the blockchain.
In this application, the feature information of the object to be verified is uploaded to the blockchain, and it should be noted that the specific content of the feature information of the object to be verified needs to be the same as the specific content of the feature information encrypted in step 302. For example, if the first information digest of the identity information of the anti-counterfeit object is encrypted in step 302, then the first information digest of the identity information of the anti-counterfeit object needs to be uploaded to the blockchain in step 303.
In one embodiment of the present application, after uploading the public key of the public-private key pair and the feature information of the object to be verified to the blockchain, the method of the steps shown in fig. 4 may also be implemented.
Referring to fig. 4, a flowchart of a method for uploading the object feature information to be verified and the public key to the blockchain according to an embodiment of the present application is shown, and may specifically include steps 305 to 306:
step 305, obtaining a blockchain address of the blockchain, and a blocknumber of a block in the blockchain of the public key in the public key pair and the characteristic information of the object to be verified, where the blocknumber is used to characterize the position of the public key in the blockchain in the public key pair and the characteristic information of the object to be verified.
Specifically, the blockchain address may refer to a network address that accesses the blockchain system.
Step 306, write the address of the blockchain and the blocknumber to the NFC device.
In step 304, the first signature data is written to an NFC device to provide anti-counterfeit authentication services for an object to be authenticated.
In one embodiment of the present application, the method of the steps shown in fig. 5 may also be implemented after writing the first signature data into the NFC device to provide anti-counterfeit verification services for the object to be verified.
Referring to fig. 5, a flowchart of a method after writing the first signature data to the NFC device according to an embodiment of the present application may specifically include steps 307 to 310:
step 307, acquiring NFC device serial number information of the NFC device, so as to generate a second information digest based on the NFC device serial number information and the feature information of the object to be verified.
Specifically, the NFC device serial number information is a number for characterizing the identity of the NFC device, and the serial number information of each NFC device is unique. In this application, the generating the second information digest based on the NFC device serial number information and the feature information of the object to be verified may be performing hash processing on the NFC device serial number information and the feature information of the object to be verified, so as to obtain the second information digest.
And step 308, encrypting the second information abstract based on the private key in the public-private key pair to obtain second signature data.
Step 309, uploading the second message digest to the blockchain.
Step 310, writing the second signature data to the NFC device.
In one embodiment of the present application, the method of the steps shown in fig. 6 may also be implemented after writing the second signature data to the NFC device.
Referring to fig. 6, a flowchart of a method after writing the second signature data to the NFC device according to an embodiment of the present application is shown, and may specifically include steps 311 to 313:
step 311, generating a third information digest based on the first signature data and the second signature data.
And step 312, encrypting the third information abstract based on the private key in the public-private key pair to obtain third signature data.
Step 313, writing the third signature data to the NFC device.
In one embodiment of the present application, the method of the steps shown in fig. 7 may also be implemented after writing the first signature data into the NFC device to provide anti-counterfeit verification services for the object to be verified.
Referring to fig. 7, a flowchart of a method after writing the first signature data to the NFC device according to an embodiment of the present application is shown, and may specifically include steps 314 to 315:
step 314 obtains NFC device serial number information for the NFC device.
Step 315, the NFC device serial number information of the NFC device is uploaded to the blockchain.
According to a second aspect of the present disclosure, there is provided a blockchain-based anti-counterfeiting information processing method applied to an anti-counterfeiting information verification terminal.
Referring to fig. 8, a flowchart of a blockchain-based anti-counterfeiting information processing method applied to an anti-counterfeiting information verification terminal according to one embodiment of the present application is shown, which may be performed by a device having a calculation processing function, such as the anti-counterfeiting information verification device 205 shown in fig. 2. As shown in fig. 8, the anti-counterfeiting information processing method at least includes steps 801 to 803:
step 801, first signature data pre-written in the NFC device is read, the first signature data being generated by encrypting characteristic information for characterizing an identity of an object to be verified by a private key in a pre-generated public-private key pair.
Step 802, searching the characteristic information of the object to be verified, which corresponds to the first signature data and is uploaded in advance, and a public key in a public-private key pair in a blockchain.
Step 803, verifying the authenticity of the object to be verified based on the searched feature information of the object to be verified, the public key in the public-private key pair and the first signature data.
The following will explain the above implementation steps in detail:
in step 801, first signature data pre-written in the NFC device is read, the first signature data being generated by encrypting characteristic information characterizing the identity of the object to be authenticated by a private key of a pre-generated public-private key pair.
In one embodiment of the present application, the feature information of the object to be verified may include at least one of the following:
identity information of the first type of object to be verified.
And a second type of first information abstract of identity information of the object to be verified.
In step 802, the characteristic information of the object to be verified corresponding to the first signature data and the public key in the public-private key pair, which are uploaded in advance, are searched in the blockchain.
In one embodiment of the present application, searching the blockchain for the characteristic information of the object to be verified and the public key in the public-private key pair, which are uploaded in advance and correspond to the first signature data, may be implemented through the steps as described in fig. 9.
Referring to fig. 9, a detailed flowchart of searching for object feature information and a public key to be verified on a blockchain according to an embodiment of the present application is shown, and may specifically include steps 8021 to 8022:
step 8021, reading the blockchain address of the blockchain written in the NFC device in advance, and the characteristic information of the object to be verified and the blocknumber of the block in the blockchain of the public key in the public key pair.
Step 8022, searching the characteristic information of the object to be verified, which is uploaded in advance and corresponds to the first signature data, and the public key in the public-private key pair in the blockchain according to the blockchain address and the blocknumber.
In step 803, based on the found feature information of the object to be verified and the public key in the public-private key pair, and the first signature data, verifying the authenticity of the object to be verified.
In one embodiment of the present application, based on the found feature information of the object to be verified and the public key in the public-private key pair, and the first signature data, verification of the authenticity of the object to be verified may be achieved by the steps as described in fig. 10.
Referring to fig. 10, a detailed flowchart of verifying the authenticity of the object to be verified according to one embodiment of the present application is shown, which may specifically include steps 8031 to 8032:
step 8031, detecting whether the public key in the public-private key pair can decrypt the first signature data, so as to obtain decrypted feature information.
Specifically, if the public key in the public-private key pair cannot decrypt the first signature data, the first signature data is false, and the object to be verified is further indicated to pass the authenticity verification.
Step 8032, detecting whether the decrypted feature information is consistent with the feature information of the searched object to be verified, so as to verify the authenticity of the object to be verified.
Specifically, if the decrypted feature information is inconsistent with the found feature information of the object to be verified, the first signature data is false, and the fact that the object to be verified does not pass the authenticity verification is further indicated.
In one embodiment of the present application, after verifying the authenticity of the object to be verified based on the object feature information to be verified and the public key, and the first signature data, the method of the steps shown in fig. 11 may also be implemented.
Referring to fig. 11, a flowchart is shown after verifying the authenticity of an object to be verified based on the object feature information to be verified and a public key, and first signature data, according to one embodiment of the present application, and may specifically include steps 804 to 805:
step 804, reading second signature data written in the NFC device in advance, where the second signature data is generated by encrypting, by a private key in a public-private key pair generated in advance, second information digest for characterizing identity of an object to be authenticated and the NFC device serial number information.
And step 805, searching a second information abstract corresponding to the second signature data uploaded in advance in the blockchain.
Step 806, verifying the authenticity of the object to be verified based on the searched public key in the second information abstract and public-private key pair and the second signature data.
In a specific implementation of one embodiment, based on the found public key in the second information digest and public-private key pair and the second signature data, verifying the authenticity of the object to be verified may be implemented in the following manner:
detecting whether the public key in the public-private key pair can decrypt the second signature data to obtain a decrypted second information abstract; if the public key in the public-private key pair can not decrypt the second signature data, the second signature data is false, and the object to be verified is further indicated to pass the authenticity verification; detecting whether the decrypted second information abstract is consistent with the second information abstract of the searched object to be verified or not so as to verify the authenticity of the object to be verified; and if the decrypted second information abstract is inconsistent with the second information abstract of the searched object to be verified, the second signature data is false, and the object to be verified is further indicated to not pass the authenticity verification.
In one embodiment of the present application, after verifying the authenticity of the object to be verified based on the found public key of the second information digest and public-private key pair and the second signature data, the method of the step shown in fig. 12 may also be implemented.
Referring to fig. 12, a flowchart for verifying whether the first signature data and the second signature data are tampered according to one embodiment of the present application is shown, which may specifically include steps 807 to 810:
step 807, reading third signature data pre-written in the NFC device, the third signature data generated by encrypting a third information digest of the first and second signature data with a private key of a pre-generated public-private key pair.
And step 808, decrypting the third signature data based on the public key in the searched public-private key pair to obtain a third information abstract.
Specifically, if the public key in the public-private key pair cannot decrypt the third signature data, the third signature data is false, and the object to be verified is further indicated to pass the authenticity verification.
Step 809 generates a fourth message digest based on the first signature data and the second signature data.
Step 810, detecting whether the third message digest and the fourth message digest are consistent, so as to verify whether the first signature data and the second signature data are tampered.
Specifically, if the third information abstract is inconsistent with the fourth information abstract, the first signature data and the second signature data are tampered. Further indicating that the object to be verified does not pass the authenticity verification.
In an embodiment of the present application, after verifying the authenticity of the object to be verified based on the searched feature information of the object to be verified and the public key of the public-private key pair and the first signature data, the method of the step shown in fig. 13 may also be implemented.
Referring to fig. 13, a flowchart for verifying whether the NFC device is replaced according to an embodiment of the present application is shown, and may specifically include steps 811 to 813:
step 811 reads NFC device serial number information of the NFC device.
Step 812, searching the blockchain for the NFC device serial number information corresponding to the first signature data, which is uploaded in advance.
Step 813, detecting whether the read NFC device serial number information of the NFC device and the NFC device serial number information found in the blockchain are consistent, so as to verify whether the NFC device is replaced.
Specifically, if the read NFC device serial number information of the NFC device and the NFC device serial number information found in the blockchain are inconsistent, it indicates that the NFC device is replaced. Further indicating that the object to be verified does not pass the authenticity verification.
For better understanding of the technical ideas of the present application, a system flow chart of the present application for processing anti-counterfeiting information of an anti-counterfeiting object will be described in its entirety by fig. 14:
referring to fig. 14, a system flow diagram of processing security information of a security object according to one embodiment of the present application is shown.
In the process of processing the anti-counterfeiting information of the anti-counterfeiting object, at least 8 functional steps as shown in fig. 14 can be implemented, wherein it should be noted that; on the one hand, the function step 1401, the function step 1403, the function step 1405, and the function step 1407 are executed by the security information issuer. Function step 1402, function step 1404, function step 1406, and function step 1408 are performed by the anti-counterfeit information verification terminal. On the other hand, the cooperation implementation of the function step 1401 and the function step 1402 may be for realizing the verification of the authenticity of the object to be verified, the cooperation implementation of the function step 1403 and the function step 1404 may also be for realizing the verification of the authenticity of the object to be verified, the cooperation implementation of the function step 1405 and the function step 1406 may be for realizing the verification of whether the first signature data and the second signature data are tampered, and the cooperation implementation of the function step 1405 and the function step 1406 may be for realizing the verification of whether the NFC device verification is replaced.
In some embodiments of the present application, on one hand, the anti-counterfeiting information for the anti-counterfeiting object is issued by uploading the public key of the public-private key pair and the feature information of the object to be verified to the blockchain, and writing the first signature data obtained by encrypting the private key of the feature information of the object to be verified into the NFC device. On the other hand, the anti-counterfeiting information aiming at the anti-counterfeiting object is verified through the read first signature data which is written in the NFC device in advance and the characteristic information of the object to be verified and the public key in the public key pair which are uploaded in advance and correspond to the first signature data and are searched in the blockchain. The irreproducibility of the NFC device, the irreconcilability of the characteristic information of the object to be verified uploaded to the blockchain and the irreconcilability of the encrypted data of the characteristic information of the object to be verified written in the NFC device lead the anti-counterfeiting information of the anti-counterfeiting object to be difficult to misuse, thus improving the security of the anti-counterfeiting information of the anti-counterfeiting object and further solving the problem that the prior art cannot guarantee the security of anti-counterfeiting of the anti-counterfeiting object.
The following describes an embodiment of an apparatus of the present application, which may be used to perform the anti-counterfeiting information processing method in the above embodiment of the present application. For details not disclosed in the embodiments of the apparatus of the present application, please refer to the embodiments of the anti-counterfeiting information processing method described in the present application.
Fig. 15 shows a block diagram of a blockchain-based anti-counterfeiting information processing device according to an embodiment of the present application.
Referring to fig. 15, the blockchain-based anti-counterfeiting information processing device 1500 is used for issuing anti-counterfeiting information, and includes: a first generation unit 1501, a first acquisition unit 1502, a first uploading unit 1503, and a first writing unit 1504.
Wherein, the first generating unit 1501 is configured to generate a public-private key pair in response to receiving an instruction to initialize the NFC device, where the public-private key pair includes a public key and a private key; a first obtaining unit 1502, configured to obtain feature information for characterizing an identity of an object to be verified, so as to encrypt the feature information based on a private key in the public-private key pair, to obtain first signature data; a first uploading unit 1503, configured to upload the characteristic information of the object to be verified and the public key in the public-private key pair to the blockchain; a first writing unit 1504 is used to write the first signature data to the NFC device to provide anti-counterfeit authentication services for the object to be authenticated.
In some embodiments of the present application, based on the foregoing solution, the apparatus further includes: the second acquisition unit is used for acquiring the blockchain address of the blockchain, and the block number of a block in the blockchain of the public key in the public key pair and the characteristic information of the object to be verified, wherein the block number is used for representing the characteristic information of the object to be verified and the position of the public key in the public key pair in the blockchain; a second writing unit for writing the address of the blockchain and the blocknumber to the NFC device.
In some embodiments of the present application, based on the foregoing solution, the apparatus further includes: a third obtaining unit, configured to obtain NFC device serial number information of the NFC device, so as to generate a second information digest based on the NFC device serial number information and feature information of the object to be verified; the first encryption unit is used for encrypting the second information abstract based on the private key in the public-private key pair to obtain second signature data; a second uploading unit for uploading the second message digest to a blockchain; and a third writing unit for writing the second signature data to the NFC device.
In some embodiments of the present application, based on the foregoing solution, the apparatus further includes: a second generation unit configured to generate a third information digest based on the first signature data and the second signature data; the second encryption unit is used for encrypting the third information abstract based on the private key in the public-private key pair to obtain third signature data; and a fourth writing unit for writing the third signature data to the NFC device.
In some embodiments of the present application, based on the foregoing solution, the apparatus further includes: a third acquisition unit configured to acquire NFC device serial number information of the NFC device; and a third uploading unit for uploading NFC device serial number information of the NFC device to a blockchain.
In some embodiments of the present application, based on the foregoing solution, the first acquiring unit 1502 is configured to: obtaining at least one of the following characteristic information for characterizing the identity of the object to be verified: acquiring identity information of the object to be verified; and acquiring a first information abstract of the identity information of the object to be verified.
Fig. 16 shows a block diagram of a blockchain-based anti-counterfeiting information processing device according to an embodiment of the present application.
Referring to fig. 16, the blockchain-based anti-counterfeiting information processing device 1600 is used for verification of anti-counterfeiting information, and includes: a first reading unit 1601, a first finding unit 1602 and a first verifying unit 1603.
The first reading unit 1601 is configured to read first signature data written in the NFC device in advance, where the first signature data is generated by encrypting, by a private key in a public-private key pair generated in advance, feature information for characterizing an identity of an object to be verified; a first searching unit 1602, configured to search a blockchain for feature information of an object to be verified and a public key in a public-private key pair, which are uploaded in advance and correspond to the first signature data; a first verification unit 1603, configured to verify the authenticity of the object to be verified based on the found feature information of the object to be verified and the public key in the public-private key pair, and the first signature data.
In some embodiments of the present application, based on the foregoing solution, the first search unit 1602 is configured to: reading a blockchain address of the blockchain written in the NFC device in advance, and characteristic information of the object to be verified and a blocknumber of a block of a public key in the public key pair in the blockchain; and searching the characteristic information of the object to be verified, which is uploaded in advance and corresponds to the first signature data, and the public key in the public-private key pair in the blockchain according to the blockchain address and the blocknumber.
In some embodiments of the present application, based on the foregoing scheme, the first verification unit 1603 is configured to: detecting whether the public key in the public-private key pair can decrypt the first signature data to obtain decrypted characteristic information; and detecting whether the decrypted characteristic information is consistent with the characteristic information of the searched object to be verified so as to verify the authenticity of the object to be verified.
In some embodiments of the present application, based on the foregoing solution, the apparatus further includes: a second reading unit, configured to read second signature data written in the NFC device in advance, where the second signature data is generated by encrypting, by a private key in a public-private key pair generated in advance, feature information for characterizing an identity of an object to be authenticated and a second information digest of the NFC device serial number information; a second searching unit, configured to search a blockchain for a second information digest corresponding to the second signature data that is uploaded in advance; and the second verification unit is used for verifying the authenticity of the object to be verified based on the searched public key in the second information abstract and public-private key pair and the second signature data.
In some embodiments of the present application, based on the foregoing solution, the apparatus further includes: a third reading unit, configured to read third signature data written in the NFC device in advance, where the third signature data is generated by encrypting a third information digest of the first signature data and the second signature data by a private key in a public-private key pair that is generated in advance; a first decryption unit, configured to decrypt the third signature data based on the public key in the searched public-private key pair, so as to obtain a third information digest; a third generation unit configured to generate a fourth information digest based on the first signature data and the second signature data; and a third verification unit configured to detect whether the third information digest and the fourth information digest agree to verify whether the first signature data and the second signature data are tampered.
In some embodiments of the present application, based on the foregoing solution, the apparatus further includes: a fourth reading unit configured to read NFC device serial number information of the NFC device; a third searching unit, configured to search a blockchain for pre-uploaded NFC device serial number information corresponding to the first signature data; and the first detection unit is used for detecting whether the read NFC device serial number information of the NFC device is consistent with the NFC device serial number information searched in the blockchain so as to verify whether the NFC device is replaced.
In some embodiments of the present application, based on the foregoing solution, the feature information of the object to be verified specifically includes at least one of the following: identity information of the object to be verified; and a first information abstract of the identity information of the object to be verified.
Fig. 17 shows a schematic diagram of a computer system suitable for use in implementing the electronic device of the embodiments of the present application.
It should be noted that, the computer system 1700 of the electronic device shown in fig. 17 is only an example, and should not impose any limitation on the functions and the application scope of the embodiments of the present application.
As shown in fig. 17, the computer system 1700 includes a central processing unit (Central Processing Unit, CPU) 1701, which can perform various appropriate actions and processes, such as performing the methods described in the above embodiments, according to a program stored in a Read-Only Memory (ROM) 1702 or a program loaded from a storage section 1708 into a random access Memory (Random Access Memory, RAM) 1703. In the RAM 1703, various programs and data required for system operation are also stored. The CPU 1701, ROM 1702, and RAM 1703 are connected to each other through a bus 1704. An Input/Output (I/O) interface 1705 is also connected to the bus 1704.
The following components are connected to the I/O interface 1705: an input section 1706 including a keyboard, a mouse, and the like; an output portion 1707 including a Cathode Ray Tube (CRT), a liquid crystal display (Liquid Crystal Display, LCD), and a speaker, etc.; a storage portion 1708 including a hard disk or the like; and a communication section 1709 including a network interface card such as a LAN (Local Area Network ) card, a modem, or the like. The communication section 1709 performs communication processing via a network such as the internet. The driver 1710 is also connected to the I/O interface 1705 as needed. A removable medium 1711 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is installed as needed on the drive 1710, so that a computer program read therefrom is installed into the storage portion 1708 as needed.
In particular, according to embodiments of the present application, the processes described above with reference to flowcharts may be implemented as computer software programs. For example, embodiments of the present application include a computer program product comprising a computer program embodied on a computer readable medium, the computer program comprising program code for performing the method shown in the flowcharts. In such an embodiment, the computer program can be downloaded and installed from a network via the communication portion 1709, and/or installed from the removable media 1711. When executed by a Central Processing Unit (CPU) 1701, performs the various functions defined in the system of the present application.
It should be noted that, the computer readable medium shown in the embodiments of the present application may be a computer readable signal medium or a computer readable storage medium, or any combination of the two. The computer readable storage medium can be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or a combination of any of the foregoing. More specific examples of the computer-readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-Only Memory (ROM), an erasable programmable read-Only Memory (Erasable Programmable Read Only Memory, EPROM), flash Memory, an optical fiber, a portable compact disc read-Only Memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this document, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In the present application, however, a computer-readable signal medium may include a data signal propagated in baseband or as part of a carrier wave, with computer-readable program code embodied therein. Such a propagated data signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination of the foregoing. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: wireless, wired, etc., or any suitable combination of the foregoing.
The flowcharts and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present application. Where each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams or flowchart illustration, and combinations of blocks in the block diagrams or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units involved in the embodiments of the present application may be implemented by means of software, or may be implemented by means of hardware, and the described units may also be provided in a processor. Wherein the names of the units do not constitute a limitation of the units themselves in some cases.
As another aspect, the present application also provides a computer-readable medium that may be contained in the electronic device described in the above embodiment; or may exist alone without being incorporated into the electronic device. The computer-readable medium carries one or more programs which, when executed by the electronic device, cause the electronic device to implement the methods described in the above embodiments.
It should be noted that although in the above detailed description several modules or units of a device for action execution are mentioned, such a division is not mandatory. Indeed, the features and functions of two or more modules or units described above may be embodied in one module or unit, in accordance with embodiments of the present application. Conversely, the features and functions of one module or unit described above may be further divided into a plurality of modules or units to be embodied.
From the above description of embodiments, those skilled in the art will readily appreciate that the example embodiments described herein may be implemented in software, or may be implemented in software in combination with the necessary hardware. Thus, the technical solution according to the embodiments of the present application may be embodied in the form of a software product, which may be stored in a non-volatile storage medium (may be a CD-ROM, a usb disk, a mobile hard disk, etc.) or on a network, and includes several instructions to cause a computing device (may be a personal computer, a server, a touch terminal, or a network device, etc.) to perform the method according to the embodiments of the present application.
Other embodiments of the present application will be apparent to those skilled in the art from consideration of the specification and practice of the embodiments disclosed herein. This application is intended to cover any variations, uses, or adaptations of the application following, in general, the principles of the application and including such departures from the present disclosure as come within known or customary practice within the art to which the application pertains.
It is to be understood that the present application is not limited to the precise arrangements and instrumentalities shown in the drawings, which have been described above, and that various modifications and changes may be effected without departing from the scope thereof. The scope of the application is limited only by the appended claims.

Claims (14)

1. The block chain-based anti-counterfeiting information processing method is applied to an anti-counterfeiting information issuing end and is characterized by comprising the following steps of:
generating a public-private key pair in response to receiving an instruction to initialize the NFC device, the public-private key pair comprising a public key and a private key;
acquiring characteristic information used for representing the identity of an object to be verified, and encrypting the characteristic information based on a private key in the public-private key pair to obtain first signature data;
uploading the characteristic information of the object to be verified and the public key in the public-private key pair to a blockchain;
Writing the first signature data into an NFC device so that an anti-counterfeiting information verification end detects whether a public key in the public-private key pair can decrypt the first signature data to obtain decrypted characteristic information, and detects whether the decrypted characteristic information is consistent with the characteristic information of the searched object to be verified to verify the authenticity of the object to be verified;
after uploading the characteristic information of the object to be verified and the public key of the public-private key pair to the blockchain, the method further comprises:
acquiring a blockchain address of the blockchain, and a blocknumber of a block of a public key in a public key pair and characteristic information of the object to be verified in the blockchain, wherein the blocknumber is used for representing the characteristic information of the object to be verified and the position of the public key in the public key pair in the blockchain;
the address of the blockchain and the blocknumber are written to an NFC device.
2. The method of claim 1, wherein after writing the first signature data to the NFC device, the method further comprises:
acquiring NFC device serial number information of the NFC device to generate a second information abstract based on the NFC device serial number information and characteristic information of the object to be verified;
Encrypting the second information abstract based on the private key in the public-private key pair to obtain second signature data;
uploading the second message digest to a blockchain;
the second signature data is written to the NFC device.
3. The method of claim 2, wherein after writing the second signature data to the NFC device, the method further comprises:
generating a third message digest based on the first signature data and the second signature data;
encrypting the third information abstract based on the private key in the public-private key pair to obtain third signature data;
the third signature data is written to the NFC device.
4. The method of claim 1, wherein after writing the first signature data to the NFC device, the method further comprises:
acquiring NFC device serial number information of the NFC device;
NFC device serial number information of the NFC device is uploaded to a blockchain.
5. The method according to any one of claims 1 to 4, wherein the obtaining of the characteristic information characterizing the identity of the object to be authenticated comprises in particular at least one of:
acquiring identity information of the object to be verified;
And acquiring a first information abstract of the identity information of the object to be verified.
6. The block chain-based anti-counterfeiting information processing method is applied to an anti-counterfeiting information verification terminal and is characterized by comprising the following steps of:
reading first signature data written in the NFC device in advance, wherein the first signature data is generated by encrypting characteristic information used for representing the identity of an object to be verified by a private key in a public-private key pair generated in advance;
reading a blockchain address of the blockchain written in the NFC device in advance, and characteristic information of the object to be verified and a blocknumber of a block of a public key in the public key pair in the blockchain;
searching characteristic information of an object to be verified, which is uploaded in advance and corresponds to the first signature data, and a public key in a public-private key pair in a blockchain according to the blockchain address and the blocknumber;
verifying the authenticity of the object to be verified based on the searched characteristic information of the object to be verified, the public key in the public-private key pair and the first signature data;
the verifying the authenticity of the object to be verified based on the searched feature information of the object to be verified, the public key in the public-private key pair and the first signature data comprises the following steps:
Detecting whether the public key in the public-private key pair can decrypt the first signature data to obtain decrypted characteristic information;
and detecting whether the decrypted characteristic information is consistent with the characteristic information of the searched object to be verified so as to verify the authenticity of the object to be verified.
7. The method of claim 6, wherein after verifying the authenticity of the object to be verified based on the found public key of the public-private key pair and the feature information of the object to be verified and the first signature data, the method further comprises:
reading second signature data written in the NFC device in advance, wherein the second signature data is generated by encrypting a second information abstract of characteristic information used for representing the identity of an object to be verified and the NFC device serial number information by a private key in a pre-generated public-private key pair;
searching a second information abstract which is uploaded in advance and corresponds to the second signature data in a block chain;
and verifying the authenticity of the object to be verified based on the searched public key in the second information abstract and public-private key pair and the second signature data.
8. The method of claim 7, wherein after verifying the authenticity of the object to be verified based on the found public key of the second information digest and public-private key pair and the second signature data, the method further comprises:
Reading third signature data which is written in the NFC device in advance, wherein the third signature data is generated by encrypting third information summaries of the first signature data and the second signature data by a private key in a public-private key pair which is generated in advance;
decrypting the third signature data based on the searched public key in the public-private key pair to obtain a third information abstract;
generating a fourth message digest based on the first signature data and the second signature data;
and detecting whether the third information abstract is consistent with the fourth information abstract so as to verify whether the first signature data and the second signature data are tampered.
9. The method of claim 6, wherein after verifying the authenticity of the object to be verified based on the found public key of the public-private key pair and the feature information of the object to be verified and the first signature data, the method further comprises:
reading NFC device serial number information of the NFC device;
searching the NFC device serial number information which is uploaded in advance and corresponds to the first signature data in a blockchain;
detecting whether the read NFC device serial number information of the NFC device is consistent with the NFC device serial number information searched in the blockchain so as to verify whether the NFC device is replaced.
10. The method according to any one of claims 6 to 9, the characteristic information of the object to be verified comprising in particular at least one of the following:
identity information of the object to be verified;
and a first information abstract of the identity information of the object to be verified.
11. A blockchain-based anti-counterfeiting information processing device for issuing anti-counterfeiting information, comprising:
a first generation unit configured to generate a public-private key pair in response to receiving an instruction to initialize an NFC device, the public-private key pair including a public key and a private key;
the first acquisition unit is used for acquiring characteristic information used for representing the identity of the object to be verified, so as to encrypt the characteristic information based on the private key in the public-private key pair, and obtain first signature data;
the first uploading unit is used for uploading the characteristic information of the object to be verified and the public key in the public-private key pair to the blockchain;
the first writing unit is used for writing the first signature data into the NFC device so that the anti-counterfeiting information verification end detects whether the public key in the public-private key pair can decrypt the first signature data to obtain decrypted characteristic information, and detects whether the decrypted characteristic information is consistent with the searched characteristic information of the object to be verified so as to verify the authenticity of the object to be verified;
After uploading the characteristic information of the object to be verified and the public key in the public key pair to a blockchain, acquiring a blockchain address of the blockchain and a blocknumber of a block in the blockchain of the characteristic information of the object to be verified and the public key in the public key pair, wherein the blocknumber is used for representing the position of the characteristic information of the object to be verified and the public key in the public key pair in the blockchain;
the address of the blockchain and the blocknumber are written to an NFC device.
12. A blockchain-based anti-counterfeiting information processing device for verification of anti-counterfeiting information, comprising:
a first reading unit, configured to read first signature data written in the NFC device in advance, where the first signature data is generated by encrypting feature information for characterizing an identity of an object to be verified by a private key in a public-private key pair generated in advance;
the first searching unit is used for reading the blockchain address of the blockchain written in the NFC device in advance, and the characteristic information of the object to be verified and the blocknumber of the block of the public key in the public key pair in the blockchain; searching characteristic information of an object to be verified, which is uploaded in advance and corresponds to the first signature data, and a public key in a public-private key pair in a blockchain according to the blockchain address and the blocknumber;
The first verification unit is used for verifying the authenticity of the object to be verified based on the searched characteristic information of the object to be verified, the public key in the public-private key pair and the first signature data;
the verifying the authenticity of the object to be verified based on the searched feature information of the object to be verified, the public key in the public-private key pair and the first signature data comprises the following steps:
detecting whether the public key in the public-private key pair can decrypt the first signature data to obtain decrypted characteristic information;
and detecting whether the decrypted characteristic information is consistent with the characteristic information of the searched object to be verified so as to verify the authenticity of the object to be verified.
13. A computer readable medium having stored thereon a computer program which, when executed by a processor, implements the blockchain-based anti-counterfeiting information processing method according to any one of claims 1 to 10.
14. An electronic device, comprising:
one or more processors;
storage means for storing one or more programs which, when executed by the one or more processors, cause the one or more processors to implement the blockchain-based anti-counterfeiting information processing method according to any one of claims 1 to 10.
CN201910854952.2A 2019-09-10 2019-09-10 Block chain-based anti-fake information processing method and device Active CN110598433B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910854952.2A CN110598433B (en) 2019-09-10 2019-09-10 Block chain-based anti-fake information processing method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910854952.2A CN110598433B (en) 2019-09-10 2019-09-10 Block chain-based anti-fake information processing method and device

Publications (2)

Publication Number Publication Date
CN110598433A CN110598433A (en) 2019-12-20
CN110598433B true CN110598433B (en) 2024-03-15

Family

ID=68858670

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910854952.2A Active CN110598433B (en) 2019-09-10 2019-09-10 Block chain-based anti-fake information processing method and device

Country Status (1)

Country Link
CN (1) CN110598433B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113496025A (en) * 2020-03-19 2021-10-12 上海唯链信息科技有限公司 Anti-counterfeiting method, device and system based on block chain
CN112035426A (en) * 2020-08-06 2020-12-04 珠海格力电器股份有限公司 Supply chain data anti-counterfeiting method, device, equipment and computer readable medium
CN113554827B (en) * 2021-07-22 2022-12-23 中国工商银行股份有限公司 Customer information service method and device based on near field communication
US20240073028A1 (en) * 2022-08-30 2024-02-29 Boe Technology Group Co., Ltd. Anti-counterfeiting verifying method, hardware apparatus, system, electronic device, and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107133532A (en) * 2017-05-31 2017-09-05 无锡井通网络科技有限公司 A kind of block chain logistics based on NFC is traced to the source tracking method for anti-counterfeit
CN107730276A (en) * 2017-09-30 2018-02-23 浙江鑫泊新能源科技有限公司 It is a kind of that retrospect is carried out to logistics with encrypted radio-frequency identification technology and packs fidelity method
CN109509007A (en) * 2018-11-20 2019-03-22 王建新 Product false proof electronic tag and electronic tag authentication method and system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107133532A (en) * 2017-05-31 2017-09-05 无锡井通网络科技有限公司 A kind of block chain logistics based on NFC is traced to the source tracking method for anti-counterfeit
CN107730276A (en) * 2017-09-30 2018-02-23 浙江鑫泊新能源科技有限公司 It is a kind of that retrospect is carried out to logistics with encrypted radio-frequency identification technology and packs fidelity method
CN109509007A (en) * 2018-11-20 2019-03-22 王建新 Product false proof electronic tag and electronic tag authentication method and system

Also Published As

Publication number Publication date
CN110598433A (en) 2019-12-20

Similar Documents

Publication Publication Date Title
US11544367B2 (en) Systems, apparatus and methods for secure electrical communication of biometric personal identification information to validate the identity of an individual
US11799668B2 (en) Electronic identification verification methods and systems with storage of certification records to a side chain
CN110598433B (en) Block chain-based anti-fake information processing method and device
US20230246842A1 (en) Compact recordation protocol
CN110046996B (en) Data processing method and device
CN111080295B (en) Electronic contract processing method and device based on blockchain
CN110798315B (en) Data processing method and device based on block chain and terminal
US20210037270A1 (en) System and techniques for digital data lineage verification
WO2018145127A1 (en) Electronic identification verification methods and systems with storage of certification records to a side chain
CN111835511A (en) Data security transmission method and device, computer equipment and storage medium
CN108173659B (en) Certificate management method and system based on UKEY equipment and terminal equipment
US9230135B2 (en) Secure access for sensitive digital information
US20140289129A1 (en) Method for secure contactless communication of a smart card and a point of sale terminal
WO2021218166A1 (en) Contract signing method and apparatus, device and computer-readable storage medium
CN110290134A (en) A kind of identity identifying method, device, storage medium and processor
CN111161056A (en) Method, system and equipment for improving transaction security of digital assets
CN112084234A (en) Data acquisition method, apparatus, device and medium
WO2015154482A1 (en) One-time certificate anti-counterfeiting tracing system based on mobile terminal and rfid
TW202036339A (en) Securely performing cryptographic operations
US11070378B1 (en) Signcrypted biometric electronic signature tokens
CN111147248A (en) Encrypted transmission method, device and system of face feature library and storage medium
US20150379305A1 (en) Digitised Handwritten Signature Authentication
CN116305077A (en) Data processing method, device, electronic equipment and storage medium
CA3174357A1 (en) Method and system for providing a trackable digital asset and its use thereof
CN110032858A (en) Dynamic confirming method, system and terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant