Disclosure of Invention
In view of this, an object of the present application is to provide a method, an apparatus, a device and a readable storage medium for managing an anti-counterfeit label, so as to implement tracing management of the anti-counterfeit label. The specific scheme is as follows:
in a first aspect, the present application provides an anti-counterfeit label management method, applied to any node in a blockchain system, including:
receiving an anti-counterfeit label purchase order uploaded by a purchaser and a first signature of the anti-counterfeit label purchase order; the first signature is generated by using a private key of a buyer;
verifying the first signature, and if the first signature passes the verification, generating first verification information;
receiving the anti-counterfeit label purchase order uploaded by the seller and a second signature of the anti-counterfeit label purchase order; the second signature is generated by using a private key of the seller;
verifying the second signature, and if the second signature passes the verification, generating second verification information;
and calling an intelligent contract to verify the first verification information and the second verification information, and if the verification is passed, chaining and storing the anti-counterfeit label purchase order.
Preferably, the chain storing the anti-counterfeit label purchase order includes:
determining and recording purchasing information contained in the anti-counterfeit label purchasing order, wherein the purchasing information comprises: the number, type, production unit and delivery date of the anti-counterfeit labels;
and uplink storing the procurement information.
Preferably, the method further comprises the following steps:
receiving delivery information of the anti-counterfeit label purchase order uploaded by a seller; the shipping information includes: label information of each anti-counterfeit label of the current delivery, the number of all anti-counterfeit labels of the current delivery and identification information of the anti-counterfeit label purchase order;
and uplink storing the shipping information.
Preferably, the method further comprises the following steps:
receiving the receiving information of the anti-counterfeit label purchase order uploaded by the purchaser; the receiving information includes: label information of each anti-counterfeit label of the current goods receiving, the number of all anti-counterfeit labels of the current goods receiving and identification information of the anti-counterfeit label purchase order;
and the receiving information is stored in an uplink mode.
Preferably, the method further comprises the following steps:
determining the number of currently available anti-counterfeit labels;
if the use request of the anti-counterfeit label is received, after the use request passes the verification, the label information of each anti-counterfeit label used by the use request is recorded, and the number of the currently available anti-counterfeit labels is updated.
Preferably, the method further comprises the following steps:
receiving an inquiry request of the anti-counterfeit label;
and returning the tracing information of the anti-counterfeit label according to the query request, wherein the tracing information comprises: the number of used anti-counterfeit labels, the number of currently available anti-counterfeit labels, and purchase information, delivery information and receiving information of the anti-counterfeit labels.
Preferably, the security label is obtained by printing by using an engraved intaglio printing technique.
In a second aspect, the present application provides an anti-counterfeit label management apparatus, applied to any node in a blockchain system, including:
the first receiving module is used for receiving the anti-counterfeit label purchase order uploaded by a purchaser and a first signature of the anti-counterfeit label purchase order; the first signature is generated by using a private key of a buyer;
the first verification module is used for verifying the first signature, and if the first signature passes the verification, first verification information is generated;
the second receiving module is used for receiving the anti-counterfeit label purchase order uploaded by the seller and a second signature of the anti-counterfeit label purchase order; the second signature is generated by using a private key of the seller;
the second verification module is used for verifying the second signature, and if the second signature passes the verification, second verification information is generated;
and the storage module is used for calling the intelligent contract to verify the first verification information and the second verification information, and if the verification is passed, the anti-counterfeit label purchase order is chained and stored.
In a third aspect, the present application provides an anti-counterfeit label management apparatus, including:
a memory for storing a computer program;
and the processor is used for executing the computer program to realize the anti-counterfeit label management method disclosed in the foregoing.
In a fourth aspect, the present application provides a readable storage medium for storing a computer program, wherein the computer program, when executed by a processor, implements the counterfeit deterrent label management method disclosed above.
According to the above scheme, the present application provides an anti-counterfeit label management method, which is applied to any node in a block chain system, and includes: receiving an anti-counterfeit label purchase order uploaded by a purchaser and a first signature of the anti-counterfeit label purchase order; the first signature is generated by using a private key of a buyer; verifying the first signature, and if the first signature passes the verification, generating first verification information; receiving the anti-counterfeit label purchase order uploaded by the seller and a second signature of the anti-counterfeit label purchase order; the second signature is generated by using a private key of the seller; verifying the second signature, and if the second signature passes the verification, generating second verification information; and calling an intelligent contract to verify the first verification information and the second verification information, and if the verification is passed, chaining and storing the anti-counterfeit label purchase order.
Therefore, after the anti-counterfeit label purchase orders uploaded by the buyer and the seller are verified, the intelligent contract is called to verify again, and if the anti-counterfeit label purchase orders are verified, the anti-counterfeit label purchase orders are chained and stored. Namely, the purchase order of the anti-counterfeit label is stored in the block chain, so that the purchase order of the anti-counterfeit label can be prevented from being tampered. Moreover, on the basis of the purchase order, the traceability management of the anti-counterfeiting label can be realized, so that the production, transportation, sale, use and other links of the anti-counterfeiting label are supervised, and the problems of falsification, false increase, internal counterfeiting and the like of the anti-counterfeiting label are avoided.
Correspondingly, the anti-counterfeit label management device, the anti-counterfeit label management equipment and the readable storage medium have the technical effects.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
At present, the production, transportation, sale, use and other links of the anti-counterfeit label are complex in process and difficult to monitor, and the anti-counterfeit label cannot prevent the product due to the anti-counterfeit label counterfeiting condition. Therefore, the application provides an anti-counterfeit label management scheme, which can supervise production, transportation, sale, use and other links of the anti-counterfeit label, and avoid the problems of falsification, false increase, internal counterfeiting and the like of the anti-counterfeit label.
Referring to fig. 1, an embodiment of the present application discloses an anti-counterfeit label management method, applied to any node in a block chain system, including:
s101, receiving the anti-counterfeit label purchase order uploaded by the purchaser and a first signature of the anti-counterfeit label purchase order.
Wherein the first signature is generated using a private key of the purchaser.
And S102, verifying the first signature, and if the first signature passes the verification, generating first verification information.
Wherein verifying the first signature comprises: the first signature is verified using the public key of the purchaser.
And S103, receiving the anti-counterfeit label purchase order uploaded by the seller and a second signature of the anti-counterfeit label purchase order.
Wherein the second signature is generated using the seller's private key.
And S104, verifying the second signature, and if the second signature passes the verification, generating second verification information.
Wherein verifying the second signature comprises: the second signature is verified using the public key of the seller.
And S105, calling the intelligent contract to verify the first verification information and the second verification information, and if the verification is passed, chaining and storing the anti-counterfeit label purchase order.
In one embodiment, the chain storing the anti-counterfeit label purchase order comprises: determining and recording purchase information contained in the anti-counterfeit label purchase order, wherein the purchase information comprises: the number, type, production unit and delivery date of the anti-counterfeit labels; and linking and storing the procurement information.
In the embodiment, after the anti-counterfeit label purchase orders uploaded by the buyer and the seller are verified, the intelligent contract is called for verification again, and if the anti-counterfeit label purchase orders are verified, the anti-counterfeit label purchase orders are linked and stored. Namely, the purchase order of the anti-counterfeit label is stored in the block chain, so that the purchase order of the anti-counterfeit label can be prevented from being tampered.
In a specific embodiment, the method further comprises the following steps: and the shipping information is stored in an uplink. The specific process of chain storage of the shipping information comprises the following steps: receiving delivery information of the anti-counterfeit label purchase order uploaded by a seller; the shipping information includes: label information of each anti-counterfeit label of the current delivery, the number of all anti-counterfeit labels of the current delivery and identification information of anti-counterfeit label purchase orders; and the shipping information is stored in an uplink.
The label information of the anti-counterfeit label is extracted from the information of the color, line position, ink layer height and the like of a gravure image (an image obtained by printing by utilizing an engraving gravure technology) in the anti-counterfeit label. Because the colors, lines and ink layer heights and thicknesses in the same gravure image cannot be imitated, any two gravure anti-counterfeiting labels have different label information, and the non-replicability of the physical grade of the anti-counterfeiting label is realized.
In a specific embodiment, the method further comprises the following steps: and the receiving information is stored in an uplink. The specific process of receiving information uplink storage comprises the following steps: receiving information of the anti-counterfeit label purchase order uploaded by a purchaser; the receiving information includes: label information of each anti-counterfeit label currently received, the number of all anti-counterfeit labels currently received, and identification information of anti-counterfeit label purchase orders; and linking and storing the receiving information.
In a specific embodiment, the method further comprises the following steps: information ul storage is used. The specific process of using information uplink storage includes: determining the number of currently available anti-counterfeit labels; and if the use request of the anti-counterfeit label is received, recording the label information of each anti-counterfeit label used by the use request after the use request passes verification, and updating the number of the currently available anti-counterfeit labels.
In a specific embodiment, the method further comprises the following steps: and (5) inquiring the anti-counterfeit label. The specific process of inquiring the anti-counterfeiting label comprises the following steps: receiving an inquiry request of the anti-counterfeit label; and returning the tracing information of the anti-counterfeiting label according to the query request, wherein the tracing information comprises: the number of used anti-counterfeit labels, the number of currently available anti-counterfeit labels, and purchase information, delivery information and receiving information of the anti-counterfeit labels.
In one embodiment, the security label is printed using an engraved gravure technique. The engraving gravure is to make the printing picture and text into a metal printing plate by a special plate making process, then to print by a gravure press, to fill the printing ink into the picture and text part of the gravure plate, to transfer the ink to the printing stock by the action of high temperature and high pressure, so that the image part of the printing stock is higher than the printing stock, and to touch the printing stock with hands to have obvious concave-convex hand feeling. The lines and the height and the thickness of ink in the gravure printed images are different due to different pressure, temperature and physical indexes of the printing stock at each time, and the gravure printing thickness is about 10 microns. Texture features such as the height, line color and distribution of the ink layers can be extracted through high-definition micron-sized three-dimensional scanning equipment, the extracted texture features are used as unique features of labels which are difficult to copy, the same texture cannot be imitated even if the labels are copied once again under the same condition, and therefore the anti-counterfeiting label is guaranteed to be incapable of being copied.
Therefore, after the anti-counterfeit label purchase orders uploaded by the buyer and the seller are verified, the intelligent contract is called to verify again, and if the anti-counterfeit label purchase orders are verified, the anti-counterfeit label purchase orders are linked and stored. Namely, the purchase order of the anti-counterfeit label is stored in the block chain, so that the purchase order of the anti-counterfeit label can be prevented from being tampered. Moreover, on the basis of the purchase order, the traceability management of the anti-counterfeiting label can be realized, so that the production, transportation, sale, use and other links of the anti-counterfeiting label are supervised, and the problems of falsification, false increase, internal counterfeiting and the like of the anti-counterfeiting label are avoided.
Referring to fig. 2, in the scheme, production enterprises (sellers), purchasing enterprises (buyers), logistics enterprises and the like of the anti-counterfeit labels store related information of the anti-counterfeit labels in a blockchain system, so as to obtain traceability information of the anti-counterfeit labels. On one hand, the tamper-proof label can realize the tamper-proof property of the traceability information, on the other hand, the production, transportation, sale, use and other links of the tamper-proof label can be monitored, and the problems of tamper, false increase, internal counterfeiting and the like of the tamper-proof label are avoided.
Specifically, the production enterprise, the purchasing enterprise, the logistics enterprise and the like of the anti-counterfeit label have corresponding user identities in the block chain system, and each user identity is published in the block chain system. All the service data writing needs to be signed by adopting the user identity to mark which user operates the service data, so that the behavior of avoiding repudiation by the user is achieved.
One "user identity" corresponds to a pair of keys, and the private key is used for signing data written into the blockchain system. The public key is used for verifying the signature. Specifically, after data is uplinked, there is a record of the corresponding uplink timestamp. The data also has an actual generation timestamp. The uplink timestamp and the generation timestamp of the same data are generally different, and the generation timestamp of the same data is generally earlier than the uplink timestamp.
The purchasing link of the anti-counterfeit label comprises the following steps: after the buyer and seller sign the purchase contract (i.e. the anti-counterfeit label purchase order) online, both the buyer and seller upload the purchase contract to the blockchain system, and after the verification is correct according to the method provided in fig. 1, the buyer and seller store the purchase contract in the blockchain system, and at this time, the information recorded in the blockchain system includes: the number, type, production unit, delivery date, contract number (which can be used as the identification information of the purchase order of the anti-counterfeit label) and other factors of the purchased anti-counterfeit label.
The anti-counterfeit label transportation link comprises the following steps: after the label manufacturing enterprise produces the anti-counterfeit label by engraving gravure technology, the delivery information is uploaded to the block chain system for storage, and the information recorded in the block chain system at the moment comprises: label information of each anti-counterfeit label of the current delivery, the number of all anti-counterfeit labels of the current delivery, identification information of anti-counterfeit label purchase orders and the like. The label information is extracted from the anti-counterfeit labels, each anti-counterfeit label corresponds to one label information, and the anti-counterfeit labels and the label information are stored in an associated mode. The block chain system can compare the number of all anti-counterfeit labels currently delivered with the number of purchased anti-counterfeit labels, and records the comparison result.
The anti-counterfeit label receiving link comprises: after purchasing the enterprise to receive goods, the received receiving information is uploaded to the block chain system to be stored, and at the moment, the information recorded in the block chain system comprises: the label information of each anti-counterfeit label of the current goods receiving, the number of all anti-counterfeit labels of the current goods receiving, the identification information of the anti-counterfeit label purchase order and the like. It should be noted that the purchase quantity, the production quantity and the receiving quantity may not be consistent, and the receiving quantity is used as the available quantity.
The anti-counterfeit label using and managing links comprise: in the actual use process of the anti-counterfeit label, the available number of the anti-counterfeit labels is reduced by one every time one anti-counterfeit label is used, and the used anti-counterfeit label is recorded (the label information of the used anti-counterfeit label is recorded), so that the anti-counterfeit label is strictly controlled.
The anti-counterfeit label query link comprises the following steps: the enterprise can inquire the traceability information of the anti-counterfeit label, and the traceability information comprises: the number of used anti-counterfeit labels, the number of currently available anti-counterfeit labels, purchase information, delivery information and receipt information of the anti-counterfeit labels, label information of the used anti-counterfeit labels, label information of the currently available anti-counterfeit labels, and the like.
In this embodiment, the security label is obtained by printing using an engraving gravure technique, which can ensure that the security label is not reproducible.
Therefore, in the embodiment, the traceability information of the anti-counterfeit label in each link is recorded by using the blockchain system, and strict control is performed on the blockchain. By utilizing the non-tamper property of the block chain technology, the whole process from order to use of the anti-counterfeit label is controlled, the data trust which can not be tampered based on the block chain of each enterprise is formed, the service closed loop on the chain is formed, and the problems of leakage, internal false increase and internal fake of the anti-counterfeit label are solved. Moreover, each enterprise can perform cross-organization authentication and circulation on the business data, support credible inquiry under privacy protection, guarantee the credibility of the data, realize decentralized cooperation among the enterprises and reduce disputes.
In the following, a counterfeit-proof label management device provided by an embodiment of the present application is introduced, and a counterfeit-proof label management device described below and a counterfeit-proof label management method described above may be referred to each other.
Referring to fig. 3, an embodiment of the present application discloses an anti-counterfeit label management device, applied to any node in a blockchain system, including:
a first receiving module 301, configured to receive an anti-counterfeit label purchase order uploaded by a purchaser and a first signature of the anti-counterfeit label purchase order; the first signature is generated by using a private key of the buyer;
a first verification module 302, configured to verify the first signature, and if the first signature passes the verification, generate first verification information;
the second receiving module 303 is configured to receive the anti-counterfeit label purchase order and a second signature of the anti-counterfeit label purchase order uploaded by the seller; the second signature is generated by using a private key of the seller;
a second verification module 304, configured to verify the second signature, and if the second signature passes the verification, generate second verification information;
and the storage module 305 is configured to invoke the intelligent contract to verify the first verification information and the second verification information, and if the verification passes, link the anti-counterfeit label purchase order.
In one embodiment, the storage module is specifically configured to:
determining and recording purchase information contained in the anti-counterfeit label purchase order, wherein the purchase information comprises: the number, type, production unit and delivery date of the anti-counterfeit labels; and linking and storing the procurement information.
In a specific embodiment, the method further comprises the following steps:
the delivery information storage module is used for receiving delivery information of the anti-counterfeit label purchase order uploaded by the seller; the shipping information includes: label information of each anti-counterfeit label of the current delivery, the number of all anti-counterfeit labels of the current delivery and identification information of anti-counterfeit label purchase orders; and the shipping information is stored in an uplink.
In a specific embodiment, the method further comprises the following steps:
the receiving information storage module is used for receiving information of the anti-counterfeiting label purchase order uploaded by the purchaser; the receiving information includes: label information of each anti-counterfeit label currently received, the number of all anti-counterfeit labels currently received, and identification information of anti-counterfeit label purchase orders; and linking and storing the receiving information.
In a specific embodiment, the method further comprises the following steps:
the using information recording module is used for determining the number of the currently available anti-counterfeit labels; and if the use request of the anti-counterfeit label is received, recording the label information of each anti-counterfeit label used by the use request after the use request passes verification, and updating the number of the currently available anti-counterfeit labels.
In a specific embodiment, the method further comprises the following steps:
the query module is used for receiving a query request of the anti-counterfeit label; and returning the tracing information of the anti-counterfeiting label according to the query request, wherein the tracing information comprises: the number of used anti-counterfeit labels, the number of currently available anti-counterfeit labels, and purchase information, delivery information and receiving information of the anti-counterfeit labels.
In one embodiment, the security label is printed using an engraved gravure technique.
For more specific working processes of each module and unit in this embodiment, reference may be made to corresponding contents disclosed in the foregoing embodiments, and details are not described here again.
It is thus clear that this embodiment provides an antifalsification label management device, and the device can realize antifalsification label's management of tracing to links such as production, transportation, sale and use to the antifalsification label supervise, avoid the antifalsification label by falsifying, increase by default, inside make fake scheduling problem.
In the following, a counterfeit-proof label management device provided by an embodiment of the present application is introduced, and the counterfeit-proof label management device described below and the counterfeit-proof label management method and apparatus described above may refer to each other.
Referring to fig. 4, an embodiment of the present application discloses an anti-counterfeit label management device, including:
a memory 401 for storing a computer program;
a processor 402 for executing said computer program for implementing the method disclosed in any of the embodiments described above.
In the following, a readable storage medium provided by an embodiment of the present application is introduced, and a readable storage medium described below and an anti-counterfeit label management method, apparatus, and device described above may be referred to each other.
A readable storage medium for storing a computer program, wherein the computer program is executed by a processor to implement the anti-counterfeit label management method disclosed in the foregoing embodiments. For the specific steps of the method, reference may be made to the corresponding contents disclosed in the foregoing embodiments, which are not described herein again.
References in this application to "first," "second," "third," "fourth," etc., if any, are intended to distinguish between similar elements and not necessarily to describe a particular order or sequence. It will be appreciated that the data so used may be interchanged under appropriate circumstances such that the embodiments described herein may be practiced otherwise than as specifically illustrated or described herein. Furthermore, the terms "comprises" and "comprising," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, or apparatus.
It should be noted that the descriptions in this application referring to "first", "second", etc. are for descriptive purposes only and are not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defined as "first" or "second" may explicitly or implicitly include at least one such feature. In addition, technical solutions between various embodiments may be combined with each other, but must be realized by a person skilled in the art, and when the technical solutions are contradictory or cannot be realized, such a combination should not be considered to exist, and is not within the protection scope of the present application.
The embodiments are described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same or similar parts among the embodiments are referred to each other.
The steps of a method or algorithm described in connection with the embodiments disclosed herein may be embodied directly in hardware, in a software module executed by a processor, or in a combination of the two. A software module may reside in Random Access Memory (RAM), memory, Read Only Memory (ROM), electrically programmable ROM, electrically erasable programmable ROM, registers, hard disk, a removable disk, a CD-ROM, or any other form of readable storage medium known in the art.
The principle and the implementation of the present application are explained herein by applying specific examples, and the above description of the embodiments is only used to help understand the method and the core idea of the present application; meanwhile, for a person skilled in the art, according to the idea of the present application, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present application.