CN110889477A - Commodity anti-counterfeiting code generation method based on block chain - Google Patents
Commodity anti-counterfeiting code generation method based on block chain Download PDFInfo
- Publication number
- CN110889477A CN110889477A CN201810927233.4A CN201810927233A CN110889477A CN 110889477 A CN110889477 A CN 110889477A CN 201810927233 A CN201810927233 A CN 201810927233A CN 110889477 A CN110889477 A CN 110889477A
- Authority
- CN
- China
- Prior art keywords
- verification
- information
- block chain
- counterfeiting
- commodity
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/06009—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
- G06K19/06037—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking multi-dimensional coding
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/018—Certifying business or products
- G06Q30/0185—Product, service or business identity fraud
Landscapes
- Business, Economics & Management (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Accounting & Taxation (AREA)
- Entrepreneurship & Innovation (AREA)
- Development Economics (AREA)
- Economics (AREA)
- Finance (AREA)
- Marketing (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention provides a commodity anti-counterfeiting code generation method based on a block chain, which belongs to the field of anti-counterfeiting codes, wherein a layer of public information and a layer of anti-counterfeiting verification information are generated by using a duplex anti-counterfeiting technology, the anti-counterfeiting verification information is invalid after one-time verification, so that the anti-counterfeiting cannot be copied, the real anti-counterfeiting effect is achieved, meanwhile, the anti-counterfeiting code cannot be copied, and the verification code contains the specific information of a commodity, so that the anti-counterfeiting is safer; the verification information is verified through the public block chain, meanwhile, the verification process needs to be photographed and stored for the first time of verification, and the photographed information is returned to the public block chain to serve as a return result of subsequent verification, so that the anti-counterfeiting code cannot be copied, and the real anti-counterfeiting effect is achieved.
Description
Technical Field
The invention relates to the field of anti-counterfeiting codes, in particular to a commodity anti-counterfeiting code generation method based on a block chain.
Background
In the current society, counterfeit goods are prevalent, counterfeit goods are caused to be a trend of flooding, safety accidents such as food and medicine are frequent, how to realize commodity anti-counterfeiting, prevent counterfeiting, recover economic losses of countries and enterprises, protect the rights and interests of consumers is a problem to be researched and solved urgently in a global scope. The existing digital anti-counterfeiting technology basically adopts a commodity anti-counterfeiting code generated by DES symmetric encryption based on a pseudo-random sequence or an ordered serial number, and has a certain difference with the performance requirements of 'non-forgeability and uniqueness' of the commodity anti-counterfeiting code in the digital anti-counterfeiting technology; most of the existing commodity anti-counterfeiting code generation methods are anti-counterfeiting code generation algorithms provided for single commodities, the calculation is complex, the safety and the calculation efficiency of commodity anti-counterfeiting codes generated among certain batches of commodities and among all batches of commodities are not considered, and the method is difficult to apply to the actual production of the commodities in batches. Under the circumstances, a simple, feasible, safe and difficult-to-crack commodity anti-counterfeiting code batch generation method is provided, and the commodity anti-counterfeiting code with the characteristics of uniqueness and unforgeability is generated in batch, which is urgent.
The patent with publication number CN104680220A discloses a method for batch generation of commodity anti-counterfeiting codes, which comprises the following steps: encoding the identity information of a certain batch of commodities to generate batch commodity identification codes and setting a commodity production serial number numerical sequence with a certain length; converting the batch commodity identification codes into numerical sequences according to the corresponding relation between the user-defined batch commodity identification code characters and numerical data; scrambling the production sequence number numerical sequence of a certain batch of commodities, the ciphertext characters in the corresponding relation of the user-defined numerical data and the ciphertext characters by using the position change scrambling rule before and after the chaos sequence sequencing; and shifting and scrambling the transcoded numerical value sequence in turn by each commodity in the batch of commodities according to the corresponding chaotic sequence and the scrambling rule of position change before and after sequencing of the corresponding chaotic sequence to generate the anti-counterfeiting number of each commodity, and then combining to generate the anti-counterfeiting code of the commodity in batch. The method provided by the invention is simple and feasible, has strong safety and is not easy to crack, and the commodity anti-counterfeiting code generated in batches has uniqueness and non-forgeability. The method only generates a specific anti-counterfeiting code, but the method cannot play a real anti-counterfeiting verification role in anti-counterfeiting, and because the anti-counterfeiting code can be directly copied for use and the like, the method is very necessary to design an anti-counterfeiting code which cannot be copied.
Disclosure of Invention
The invention provides a commodity anti-counterfeiting code generation method based on a block chain, which solves the problems that the existing anti-counterfeiting code can be copied and is low in safety.
The invention solves the problems through the following technical scheme:
a commodity anti-counterfeiting code generation method based on a block chain comprises the following steps,
step 1: the commodity verification code generation system matches a specific true and false verification code according to a produced product;
step 2: the commodity verification code generation system encrypts the authenticity verification code to obtain authenticity verification information and a verification ID;
and step 3: the commodity verification code generation system transmits the authenticity verification information and the verification ID to the enterprise private block chain system;
and 4, step 4: the enterprise private block chain system transmits the authenticity verification information and the verification ID to each node of the enterprise private block chain system through broadcasting and stores the authenticity verification information and the verification ID;
and 5: the enterprise private block chain system transmits the authenticity verification information and the verification ID to the public block chain verification system and transmits the authenticity verification information to the anti-counterfeiting code generation system;
step 6: the public block chain verification system broadcasts the authenticity verification information and the verification ID to each node of the public block chain verification system for storage;
and 7: the anti-counterfeiting code generation system generates the authenticity verification information and commodity official network information and/or platform commodity information into a two-layer duplex anti-counterfeiting code;
and 8: and sticking the generated duplex anti-counterfeiting code to the corresponding commodity.
The process of matching the specific authenticity verification code in the step 1 is as follows:
and acquiring the production time, the production address, the production serial number and the production supervisor information of the produced product, and processing the information through a Hash algorithm to obtain the authenticity verification code.
The encryption processing procedure in the step 2 is that,
an encryption formula is selected for encryption, the encryption formula is,
in the formula (I), the compound is shown in the specification,denotes the n subsequent values of the ith mapping iteration, i 1,2,3u∈(1.64,2),And u are both double-precision type numerical values, a 1,2,3n+1The authentication information is authenticity verification information.
And in the step 2, the verification ID is a secondary authenticity verification code obtained by carrying out secondary encryption on the authenticity verification code through a Hash algorithm.
The process of generating the two-layer duplex anti-counterfeiting code in the step 7 comprises the following steps:
and generating by using a duplex anti-counterfeiting technology, wherein commodity official website information and/or platform commodity information are/is used as anti-counterfeiting code information of a first layer, and authenticity verification information is used as anti-counterfeiting code information of a second layer.
And after scanning once, the second layer of anti-counterfeiting code information in the generated duplex anti-counterfeiting code becomes invalid.
The duplex anti-counterfeiting code verification process comprises the following steps:
and after the duplex anti-counterfeiting code is scanned, extracting public commodity official network information and/or platform commodity information, simultaneously extracting authenticity verification information, sending the authenticity verification information to a public block chain verification system for verification, and returning a verification result by the public block chain verification system.
If the verification is the first verification, the public block chain verification system returns a verification result after the verification process needs to be photographed and photographing information is transmitted to the public block chain verification system for broadcast storage; and if the verification is not the first time, the public block chain verification system directly returns the structure of the first verification and the photographing information in the first verification process.
The invention has the following beneficial effects:
according to the invention, a layer of public information and a layer of anti-counterfeiting verification information are generated by using a duplex anti-counterfeiting technology, and the anti-counterfeiting verification information is invalid after one-time verification, so that the anti-counterfeiting function cannot be copied, the real anti-counterfeiting effect is achieved, meanwhile, the anti-counterfeiting code cannot be copied, and the verification code contains specific information of commodities, so that the anti-counterfeiting function is safer; the verification information is verified through the public block chain, meanwhile, the verification process needs to be photographed and stored for the first time of verification, and the photographed information is returned to the public block chain to serve as a return result of subsequent verification, so that the anti-counterfeiting code cannot be copied, and the real anti-counterfeiting effect is achieved.
Drawings
FIG. 1 is a flow chart of data processing according to the present invention.
Detailed Description
The present invention is further illustrated by the following examples.
The invention relates to a commodity anti-counterfeiting code generation method based on a block chain, which comprises the following steps,
step 1: the commodity verification code generation system matches a specific authenticity verification code according to a produced product. The process of matching the specific authenticity verification code is as follows: and acquiring the production time, the production address, the production serial number and the production supervisor information of the produced product, and processing the information through a Hash algorithm to obtain the authenticity verification code. The production time is detailed to the second, and the address is detailed to which production line produces the product in the workshop.
Step 2: the commodity verification code generation system encrypts the authenticity verification code to obtain authenticity verification information and a verification ID. The encryption processing procedure is that,
an encryption formula is selected for encryption, the encryption formula is,
in the formula (I), the compound is shown in the specification,denotes the n subsequent values of the ith mapping iteration, i 1,2,3.. b-1, a-1, b, a, u are set values, and u e (1.64,2),and u are both double-precision type numerical values, a 1,2,3n+1For the authenticity verification information, the values of a and b are determined according to the complexity of the user and the processorAnd selecting computing power. The verification ID is a secondary authenticity verification code obtained by carrying out secondary encryption on the authenticity verification code through a Hash algorithm.
And step 3: the commodity verification code generation system transmits the authenticity verification information and the verification ID to the enterprise private block chain system. The enterprise private blockchain system is used for storing the authenticity verification information and the verification ID, so that the enterprise private blockchain system can enter the enterprise private blockchain system for verification after authorization when authenticity investigation or evidence obtaining of products is required. Thereby making the public confidence stronger.
And 4, step 4: the enterprise private blockchain system transmits the authenticity verification information and the verification ID to each node of the enterprise private blockchain system through broadcasting and stores the authenticity verification information and the verification ID. The enterprise private blockchain system is used as a verification system for verifying the authenticity of a product, and is generally a verification system for verifying the authenticity of a manufacturer of the product. And related government departments or administrative departments to supervise and manage, so that the public credibility is strengthened. The number of nodes of the enterprise private blockchain system is generally about 5-10.
And 5: the enterprise private block chain system transmits the authenticity verification information and the verification ID to the public block chain verification system and transmits the authenticity verification information to the anti-counterfeiting code generation system. The public block chain verification system is generally a product authenticity verification system in the industry, is a system which can be verified by both public management and generally authorized persons, and the number of nodes is generally about 30-50.
Step 6: and the public block chain verification system broadcasts the authenticity verification information and the verification ID to each node of the public block chain verification system for storage. The public block chain verification system sends the authenticity verification information and the verification ID light waves to each node and then is used for authenticity verification of commodities in the later period, authenticity verification is that corresponding blocks are found through an authenticity verification information machine core, then the blocks are analyzed and compared, and the verification ID serves as a secret key with verification authority. Thereby preventing others from using a fake authentication system and a fake authentication to deceive the client.
And 7: the anti-counterfeiting code generation system generates two-layer duplex anti-counterfeiting codes by the authenticity verification information and the commodity official network information and/or the platform commodity information. The process of generating the two-layer duplex anti-counterfeiting code comprises the following steps: and generating by using a duplex anti-counterfeiting technology, wherein the duplex anti-counterfeiting technology is a Chinese code-through duplex anti-counterfeiting technology, commodity official network information and/or platform commodity information are/is used as anti-counterfeiting code information of a first layer, and authenticity verification information is used as anti-counterfeiting code information of a second layer. And the second layer of anti-counterfeiting code information in the generated duplex anti-counterfeiting code fails after being scanned once. The duplex anti-counterfeiting code verification process comprises the following steps: and after the duplex anti-counterfeiting code is scanned, extracting public commodity official network information and/or platform commodity information, simultaneously extracting authenticity verification information, sending the authenticity verification information to a public block chain verification system for verification, and returning a verification result by the public block chain verification system. If the verification is the first verification, the public block chain verification system returns a verification result after the verification process needs to be photographed and photographing information is transmitted to the public block chain verification system for broadcast storage; and if the verification is not the first time, the public block chain verification system directly returns the structure of the first verification and the photographing information in the first verification process.
And 8: and pasting the generated duplex anti-counterfeiting code on a corresponding commodity, pasting a waterproof layer outside after pasting the duplex anti-counterfeiting code, and meanwhile, coating an anti-counterfeiting verification scratch coating on the outer side of the waterproof layer. The duplex anti-counterfeiting code is a duplex two-dimensional code.
While the preferred embodiments of the present invention have been described in detail, it will be understood by those skilled in the art that the invention is not limited thereto, and various equivalent modifications and substitutions can be made without departing from the spirit of the present invention.
Claims (8)
1. A commodity anti-counterfeiting code generation method based on a block chain is characterized by comprising the following steps,
step 1: the commodity verification code generation system matches a specific true and false verification code according to a produced product;
step 2: the commodity verification code generation system encrypts the authenticity verification code to obtain authenticity verification information and a verification ID;
and step 3: the commodity verification code generation system transmits the authenticity verification information and the verification ID to the enterprise private block chain system;
and 4, step 4: the enterprise private block chain system broadcasts the authenticity verification information and the verification ID to each node of the enterprise private block chain system and stores the authenticity verification information and the verification ID;
and 5: the enterprise private block chain system transmits the authenticity verification information and the verification ID to the public block chain verification system and transmits the authenticity verification information to the anti-counterfeiting code generation system;
step 6: the public block chain verification system broadcasts the authenticity verification information and the verification ID to each node of the public block chain verification system for storage;
and 7: the anti-counterfeiting code generation system generates the authenticity verification information and commodity official network information and/or platform commodity information into a two-layer duplex anti-counterfeiting code;
and 8: and sticking the generated duplex anti-counterfeiting code to the corresponding commodity.
2. The block chain-based commodity anti-counterfeiting code generation method according to claim 1, characterized in that: the process of matching the specific authenticity verification code in the step 1 is as follows:
and acquiring the production time, the production address, the production serial number and the production supervisor information of the produced product, and processing the information through a Hash algorithm to obtain the authenticity verification code.
3. The block chain-based commodity anti-counterfeiting code generation method according to claim 1, characterized in that: the encryption processing procedure in the step 2 is that,
an encryption formula is selected for encryption, the encryption formula is,
4. The block chain-based commodity anti-counterfeiting code generation method according to claim 1, characterized in that: and in the step 2, the verification ID is a secondary authenticity verification code obtained by carrying out secondary encryption on the authenticity verification code through a Hash algorithm.
5. The block chain-based commodity anti-counterfeiting code generation method according to claim 1, characterized in that: the process of generating the two-layer duplex anti-counterfeiting code in the step 7 comprises the following steps:
and generating by using a duplex anti-counterfeiting technology, wherein commodity official website information and/or platform commodity information are/is used as anti-counterfeiting code information of a first layer, and authenticity verification information is used as anti-counterfeiting code information of a second layer.
6. The block chain-based commodity anti-counterfeiting code generation method according to claim 5, characterized in that: and after scanning once, the second layer of anti-counterfeiting code information in the generated duplex anti-counterfeiting code becomes invalid.
7. The block chain-based commodity anti-counterfeiting code generation method according to claim 6, characterized in that: the duplex anti-counterfeiting code verification process comprises the following steps:
and after the duplex anti-counterfeiting code is scanned, extracting public commodity official network information and/or platform commodity information, simultaneously extracting authenticity verification information, sending the authenticity verification information to a public block chain verification system for verification, and returning a verification result by the public block chain verification system.
8. The block chain-based commodity anti-counterfeiting code generation method according to claim 7, characterized in that: if the verification is the first verification, the public block chain verification system returns a verification result after the verification process needs to be photographed and photographing information is transmitted to the public block chain verification system for broadcast storage; and if the verification is not the first time, the public block chain verification system directly returns the structure of the first verification and the photographing information in the first verification process.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810927233.4A CN110889477A (en) | 2018-08-15 | 2018-08-15 | Commodity anti-counterfeiting code generation method based on block chain |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810927233.4A CN110889477A (en) | 2018-08-15 | 2018-08-15 | Commodity anti-counterfeiting code generation method based on block chain |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110889477A true CN110889477A (en) | 2020-03-17 |
Family
ID=69744159
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810927233.4A Pending CN110889477A (en) | 2018-08-15 | 2018-08-15 | Commodity anti-counterfeiting code generation method based on block chain |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110889477A (en) |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106209877A (en) * | 2016-07-19 | 2016-12-07 | 井创(北京)科技有限公司 | A kind of be certification core with block chain backstage false-proof authentication system |
CN106570710A (en) * | 2016-10-27 | 2017-04-19 | 纸飞机(北京)科技有限公司 | Commodity anti-counterfeiting method and device |
US20170228742A1 (en) * | 2015-12-21 | 2017-08-10 | Mohamed Alaa Aljawhari | Method and apparatus for managing and providing provenance of product |
CN107341676A (en) * | 2017-07-17 | 2017-11-10 | 深圳天净喔溯源科技有限公司 | False proof mark and the method for tracing to the source |
CN107395403A (en) * | 2017-07-07 | 2017-11-24 | 北京区块链云科技有限公司 | A kind of fiduciary block chain common recognition method suitable for extensive ecommerce |
CN107491973A (en) * | 2017-09-30 | 2017-12-19 | 特兰旗(厦门)科技有限公司 | Product false proof management system and method |
CN107707352A (en) * | 2015-02-09 | 2018-02-16 | 吴世贵 | A kind of embedded encryption method |
CN108364182A (en) * | 2017-11-21 | 2018-08-03 | 阿里巴巴集团控股有限公司 | A kind of commodity antifake check method, device and equipment |
-
2018
- 2018-08-15 CN CN201810927233.4A patent/CN110889477A/en active Pending
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107707352A (en) * | 2015-02-09 | 2018-02-16 | 吴世贵 | A kind of embedded encryption method |
US20170228742A1 (en) * | 2015-12-21 | 2017-08-10 | Mohamed Alaa Aljawhari | Method and apparatus for managing and providing provenance of product |
CN106209877A (en) * | 2016-07-19 | 2016-12-07 | 井创(北京)科技有限公司 | A kind of be certification core with block chain backstage false-proof authentication system |
CN106570710A (en) * | 2016-10-27 | 2017-04-19 | 纸飞机(北京)科技有限公司 | Commodity anti-counterfeiting method and device |
CN107395403A (en) * | 2017-07-07 | 2017-11-24 | 北京区块链云科技有限公司 | A kind of fiduciary block chain common recognition method suitable for extensive ecommerce |
CN107341676A (en) * | 2017-07-17 | 2017-11-10 | 深圳天净喔溯源科技有限公司 | False proof mark and the method for tracing to the source |
CN107491973A (en) * | 2017-09-30 | 2017-12-19 | 特兰旗(厦门)科技有限公司 | Product false proof management system and method |
CN108364182A (en) * | 2017-11-21 | 2018-08-03 | 阿里巴巴集团控股有限公司 | A kind of commodity antifake check method, device and equipment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110838907A (en) | Commodity anti-counterfeiting code generation system based on block chain | |
CN102036231B (en) | Network architecture security system for Internet of Things and security method thereof | |
CN100536393C (en) | Secret shared key mechanism based user management method | |
CN106548353B (en) | Commodity anti-counterfeiting code generation and verification method | |
CN101529791A (en) | A method and apparatus to provide authentication and privacy with low complexity devices | |
CN105450395A (en) | Information encryption and decryption processing method and system | |
CN106534092A (en) | Message-based and key-dependent privacy data encryption method | |
WO2006085000A1 (en) | Method for private-key encryption of messages, and application to an installation | |
Gafsi et al. | Efficient encryption system for numerical image safe transmission | |
CN104836817A (en) | Architecture and method for ensuring network information safety | |
CN104851007A (en) | Commodity information management system and method based on two-dimensional code and self-dissolving system | |
CN101141466B (en) | Document authentication method based on interweaving watermark and biological characteristic | |
CN104050574A (en) | Anti-fake method and system | |
CN112437042A (en) | Intelligent construction site material data security certification working method through cloud platform | |
Eldefrawy et al. | Banknote validation through an embedded RFID chip and an NFC-enabled smartphone | |
CN110889477A (en) | Commodity anti-counterfeiting code generation method based on block chain | |
JP5378702B2 (en) | Secret authentication system | |
CN206596024U (en) | A kind of invoice printing device | |
CN110889703A (en) | E-commerce commodity traceability information acquisition method based on block chain | |
Vaya et al. | Visual cryptography: a review | |
Abyaneh | On the privacy of two tag ownership transfer protocols for RFIDs | |
CN111541652A (en) | System for improving security of secret information keeping and transmission | |
CN110163633A (en) | A kind of two-dimension code anti-counterfeit authentication method of shared bicycle and method of hiring a car | |
Walke et al. | Enhanced password processing scheme using visual cryptography and steganography | |
Muhammed | A secured approach to visual cryptographic biometric template |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20200317 |