CN112967425B - Anti-unpacking monitoring method and device - Google Patents

Anti-unpacking monitoring method and device Download PDF

Info

Publication number
CN112967425B
CN112967425B CN202110147058.9A CN202110147058A CN112967425B CN 112967425 B CN112967425 B CN 112967425B CN 202110147058 A CN202110147058 A CN 202110147058A CN 112967425 B CN112967425 B CN 112967425B
Authority
CN
China
Prior art keywords
box
server
unpacking
verification information
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110147058.9A
Other languages
Chinese (zh)
Other versions
CN112967425A (en
Inventor
罗巨明
朱国平
史大鹏
邵冠军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Industrial and Commercial Bank of China Ltd ICBC
Original Assignee
Industrial and Commercial Bank of China Ltd ICBC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Industrial and Commercial Bank of China Ltd ICBC filed Critical Industrial and Commercial Bank of China Ltd ICBC
Priority to CN202110147058.9A priority Critical patent/CN112967425B/en
Publication of CN112967425A publication Critical patent/CN112967425A/en
Application granted granted Critical
Publication of CN112967425B publication Critical patent/CN112967425B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/18Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Burglar Alarm Systems (AREA)

Abstract

The invention discloses a method and a device for monitoring a disassembly-preventing box, wherein the method comprises the following steps: detecting a locking instruction of the anti-dismantling box, wherein a display screen is arranged on the anti-dismantling box shell; acquiring plaintext verification information randomly generated by a server according to a locking instruction, and displaying the plaintext verification information through a display screen arranged on a shell of the anti-dismantling box; acquiring a video image of the locking process of the anti-dismantling box, wherein the video image comprises the plaintext verification information; storing the collected video image to a server; and monitoring the locking process of the anti-unpacking box based on the video image stored in the server. The invention can realize the monitoring of the locking process of the anti-dismantling box and ensure that the commodity put into the anti-dismantling box by a seller is a real commodity.

Description

Anti-unpacking monitoring method and device
Technical Field
The invention relates to the technical field of internet, in particular to a method and a device for monitoring a box dismantling prevention.
Background
This section is intended to provide a background or context to the embodiments of the invention that are recited in the claims. The description herein is not admitted to be prior art by inclusion in this section.
With the continuous progress of internet technology, online shopping is rapidly developed. For some valuables (precious metal products, jewelry, jade, etc.), people are increasingly looking for online purchases. To ensure that the consumer receives the actual merchandise, the current practice is for the seller to place the valuables in a tamper-evident box to prevent the valuables from being replaced during shipment. This kind of mode can't prevent that seller puts into in the anti-unpacking case with fake goods or substandard product, also can't realize the control to the locking process of anti-unpacking case, has the potential safety hazard.
In view of the above problems, no effective solution has been proposed.
Disclosure of Invention
The embodiment of the invention provides a method for monitoring an anti-unpacking box, which is used for solving the technical problem that the locking process of the anti-unpacking box cannot be monitored by adopting the existing mode of transporting valuables by adopting the anti-unpacking box, and comprises the following steps: detecting a locking instruction of the anti-dismantling box, wherein a display screen is arranged on the anti-dismantling box shell; acquiring plaintext verification information randomly generated by the server according to a locking instruction, and displaying the plaintext verification information through a display screen arranged on the anti-dismantling box shell; acquiring a video image of the locking process of the anti-dismantling box, wherein the video image comprises the plaintext verification information; storing the collected video image to a server; and monitoring the locking process of the anti-unpacking box based on the video image stored in the server.
The embodiment of the invention also provides a device for monitoring the anti-dismantling box, which is used for solving the technical problem that the locking process of the anti-dismantling box cannot be monitored in the existing mode of transporting valuables by adopting the anti-dismantling box, and the device comprises: the anti-unpacking monitoring module is used for detecting a locking instruction of the anti-unpacking box, wherein a display screen is arranged on the anti-unpacking box shell; the verification information acquisition module is used for acquiring plaintext verification information randomly generated by the server according to the locking instruction and displaying the plaintext verification information through a display screen arranged on the anti-dismantling box shell; the video image acquisition module is used for acquiring a video image in the locking process of the anti-dismantling box, and the video image comprises the plaintext verification information; the video image storage module is used for storing the acquired video image to the server, wherein the video image contains plaintext verification information; and the anti-unpacking monitoring module is used for monitoring the locking process of the anti-unpacking box based on the video image stored in the server.
The embodiment of the invention also provides computer equipment for solving the technical problem that the locking process of the anti-unpacking box cannot be monitored by adopting the traditional mode of transporting valuables by adopting the anti-unpacking box.
The embodiment of the invention also provides a computer readable storage medium, which is used for solving the technical problem that the locking process of the anti-unpacking box cannot be monitored by adopting the traditional mode of transporting valuables by adopting the anti-unpacking box.
In the embodiment of the invention, the display screen for displaying the plaintext verification information is arranged on the anti-dismantling box shell, after the locking instruction of the anti-dismantling box is detected, the server randomly generates the plaintext verification information according to the locking instruction, and the plaintext verification information is displayed through the display screen arranged on the anti-dismantling box shell, so that the acquired video image containing the plaintext verification information in the locking process of the anti-dismantling box is stored in the server, and transportation personnel or consumers in the later period can conveniently monitor the locking process of the anti-dismantling box based on the video image containing the plaintext verification information stored in the server.
By the embodiment of the invention, the locking process of the anti-dismantling box can be monitored, and the commodities put into the anti-dismantling box by a seller are guaranteed to be real commodities.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts. In the drawings:
fig. 1 is a flowchart of a monitoring method for a tamper evident box according to an embodiment of the present invention;
FIG. 2 is a schematic view of a tamper evident box provided in an embodiment of the present invention;
FIG. 3 is a schematic view of a tamper-evident lock provided in an embodiment of the present invention;
FIG. 4 is a schematic view of an inner weft ring of a tamper-evident enclosure in accordance with an embodiment of the present invention;
FIG. 5 is a schematic view of a warp coil in a tamper-evident case according to an embodiment of the present invention;
FIG. 6 is a perspective view of a tamper evident case provided in an embodiment of the present invention;
fig. 7 is an internal structural view of a tamper controller provided in an embodiment of the present invention;
FIG. 8 is a schematic diagram of a value network transaction verification system provided in an embodiment of the present invention;
FIG. 9 is a flow chart of a method for verifying a value network transaction provided in an embodiment of the present invention;
FIG. 10 is a schematic view of a tamper-evident monitoring device provided in an embodiment of the present invention;
FIG. 11 is a schematic view of an alternative tamper-evident monitoring device provided in an embodiment of the present invention;
fig. 12 is a schematic diagram of a computer device provided in an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention more apparent, the embodiments of the present invention are further described in detail below with reference to the accompanying drawings. The exemplary embodiments and descriptions of the present invention are provided to explain the present invention, but not to limit the present invention.
The embodiment of the invention provides a method for monitoring an anti-unpacking box, which is characterized in that a display screen for displaying plaintext verification information is additionally arranged on the anti-unpacking box, and a verification code randomly generated when the anti-unpacking box is locked is displayed through the display screen, so that the fraudulent behavior of a seller can be prevented.
Fig. 1 is a flowchart of a monitoring method for a tamper-evident box according to an embodiment of the present invention, as shown in fig. 1, the method includes the following steps:
s101, detecting a locking instruction of the anti-dismantling box, wherein a display screen is arranged on the anti-dismantling box shell.
The tamper-proof box in the embodiment of the present invention is a packaging box that can prevent the box from being opened halfway. The display screen arranged on the anti-dismantling box is used for displaying the plaintext verification information randomly generated when the anti-dismantling box is locked.
And S102, acquiring plaintext verification information randomly generated by the server according to the locking instruction, and displaying the plaintext verification information through a display screen arranged on the anti-dismantling box shell.
It should be noted that, in the embodiment of the present invention, after the locking instruction of the anti-unpacking box is detected, the server randomly generates a plaintext verification information instead of the seller terminal, so that the security is higher.
For identification, in one embodiment, the plaintext verification information in the embodiment of the present invention may be a string of numbers or letters randomly generated by the server according to the lock instruction. And the method has stronger intuition by adopting the verification code of the plaintext number.
S103, collecting a video image of the locking process of the anti-dismantling box, wherein the video image contains plaintext verification information.
In specific implementation, the external camera or the camera arranged on the anti-dismantling box can be used for shooting the video image of the whole locking process of the seller for putting the commodity into the anti-dismantling box, locking the anti-dismantling box and displaying the plaintext verification information.
And S104, storing the acquired video image to a server.
It should be noted that, storing the collected video image containing the plaintext authentication information in the server instead of the seller terminal can prevent the video image from being tampered. In one embodiment, the collected video image containing the plaintext authentication information can be stored on a block link network, so that the tamper resistance of the video image is improved.
And S105, monitoring the locking process of the anti-unpacking box based on the video image stored in the server.
In order to improve the security of the verification information during the transmission process, in an embodiment, the method for monitoring the anti-unpacking device provided in the embodiment of the present invention may further include the following steps: acquiring plaintext verification information generated by a server according to a locking instruction; encrypting plaintext verification information by using a private key to obtain ciphertext verification information; decrypting the ciphertext verification information by using a public key corresponding to the private key to obtain plaintext verification information; and displaying the plaintext verification information through a display screen arranged on the anti-dismantling box shell.
In an embodiment, the method for monitoring an anti-unpacking box provided in the embodiment of the present invention may further include the following steps: receiving a video viewing request sent by a user terminal, wherein the video viewing request is used for requesting to view a video image of a locking process of an anti-dismantling box stored on a server; and sending the video image of the anti-unpacking and locking process to the user terminal according to the video viewing request.
The monitoring method for the anti-dismantling box provided by the embodiment of the invention can be applied to, but is not limited to, the anti-dismantling box shown in fig. 2. As shown in fig. 2, the tamper-proof case includes: the box cover 201, the box 202, prevent tearing open the lock 203, wherein, the box 202 is used for placing valuables, and the box cover 201 is used for covering the box 202, seals the valuables placed in the box 202, and the material of box cover 201, box 202 can adopt the material of moulding material, also can adopt other materials that the effect is the same such as wood.
In order to monitor the opening state of the tamper-proof box, in the tamper-proof box provided in the embodiment of the present invention, the tamper-proof locks 203 shown in fig. 3 are installed on the upper and lower edges of the box cover 201 and the box body 202, and as shown in fig. 3, the tamper-proof locks 203 include: an upper lock body 2031 and a lower lock body 2032; wherein the lower lock 2032 is a main body part comprising: tamper controller 20321 and display 20322.
The main bodies of the upper lock body 2031 and the lower lock body 2032 of the anti-disassembly lock 203 are installed in the frame material of the case cover 201 and the case body 202, i.e. the outer side of the case cover 201 and the outer side of the case body 202 are invisible, and the inner side is designed to be visible or invisible. The display screen 20322 of the lower lock 2032 is outside the surface of the case 202, and displays information visible from the outside. The tamper controller 20321 comprises conductive contacts 5, 6,7, 8,9, 10, 11, 12, the conductive contacts 5, 6, 11, 12 are connected to the a, b, c, d ends of the warp and weft coils inside the casing of the cabinet 202, respectively, the weft coils being shown in fig. 4 and the warp coils being shown in fig. 5.
Fig. 6 is a perspective view of a tamper-evident box provided in an embodiment of the present invention, as shown in fig. 6. The display screen 20322 is used for displaying a verification code, for example, "23456789", which is generated by the online mall server 801 and signed with a private key, and the tamper controller 20321 verifies the verification code (the verification code is verified with the public key of the online mall server 801, and the verification code is authenticated to be generated by the online mall server 801), and the display screen 20322 displays the verification code. The function of the verification code is to prevent a seller from not putting the valuables sold by the seller, such as putting fake commodities and inferior commodities, and the principle is as follows: the seller records videos of the process of putting valuables into the anti-unpacking box, uploads the videos to the online mall server 801, the valuables in the videos need to be put into the anti-unpacking box, the anti-unpacking box is locked, and the process of the verification code is displayed on a display screen of the anti-unpacking box. The logistics company can check the video and verify that the verification code in the video is consistent with the verification code displayed on the display screen of the anti-unpacking box, otherwise, the transportation is refused. Similarly, the buyer can view the video and verify that the verification code in the video is consistent with the verification code displayed on the display screen of the anti-unpacking box, otherwise the buyer refuses to sign.
It should be noted that, in one embodiment, the conductive contact 5 corresponds to a, the conductive contact 6 corresponds to b, the conductive contact 11 corresponds to c, and the conductive contact 12 corresponds to d; in another embodiment, conductive contact 5 corresponds to b, conductive contact 6 corresponds to a, conductive contact 11 corresponds to d, and conductive contact 12 corresponds to c. It should be noted that the present invention is not limited to this, and any correspondence relationship that does not affect the function implementation may be exchanged.
In the embodiment of the present invention, the warp and weft coils provided on the anti-dismantling case are used to prevent the case 202 from being cut. Similarly, the conductive contacts 1, 2, 3, and 4 of the upper lock 2031 are connected to the longitudinal and latitudinal coils inside the lid 201, respectively, to prevent the lid 201 from being cut.
For example, the box cover 201 is provided with a warp and weft coil similar to the box 202, the warp and weft coil end points are h, i, j, k, the conductive contacts 1, 2, 3, 4 of the upper lock 2031 are also respectively connected to the warp and weft coil end points h, i, j, k, for example, 1 corresponds to h,2 corresponds to i,3 corresponds to j,4 corresponds to k, or 1 corresponds to i,2 corresponds to h,3 corresponds to k,4 corresponds to j, and in specific implementation, other corresponding relations that do not affect the function implementation may be exchanged.
It should be noted that the crossing of the warp and weft threads inside the housing of the cover 201 and the housing 202 is an absolute source. The anti-removal lock 203 may be one such that the rear sides of the case body 202 and the case cover 201 are movably connected, as in a conventional case. The number of the anti-disassembly locks 203 can be two, so that the anti-disassembly box is arranged at the front and the back, and the box cover 201 can be completely separated from the box body 202, namely the box cover 201 can be integrally removed.
Fig. 7 shows an internal structure of the tamper controller provided in the embodiment of the present invention, and as shown in fig. 7, the tamper controller 20321 includes: a power supply 701, a micro control unit 702, a current detection module 703 and a wireless communication module 704.
The power source 701 is configured to provide power to each unit inside the tamper controller 20321, and optionally, a switch for controlling the power source 701 may be further provided, the switch may be turned on only from inside the casing 202, and when the casing is loaded with valuables, the switch may be turned on, and the power source 701 is in a power supply state.
The current detection module 703 is connected to the conductive contacts 5, 6,7, 8,9, 10, 11, 12, and detects the currents of the four pairs of lines 5 and 6,7 and 8,9 and 10, 11 and 12, respectively. If one of the lines is open, the status of the line current is sent to the micro control unit 702. The current detection module 703 is composed of 4 sets of micro current detection sensors. 4 groups of micro current detection sensors respectively detect whether current exists from 5 to 6 circuits through the longitude and latitude, from 7 to 8 circuits through the longitude and latitude, from 9 to 10 circuits through the longitude and latitude, and from 11 to 12 circuits through the longitude and latitude. In order to make the 4 lines have current, one end (conductive contacts 5, 7, 9 and 11) of each line is connected to the positive pole of a power source 701, the other end of each line is connected to one end of a resistor R1, R2, R3 and R4 with different resistance values being approximately the same or completely the same, namely, the conductive contacts 6 are connected with R1 and R8 and R2 and 10 are connected with R3 and R12 and R4, and the other end of each line R1, R2, R3 and R4 is connected with the negative pole of the power source 701, so that the current is generated in the lines and disappears unless the longitude and latitude lines are broken. The miniature current detection sensor is a current detection sensor with a tiny volume, is a general product, and can be found through hundred-degree search.
And the micro control unit 702 is used for controlling all the modules. The method comprises the steps of obtaining the voltage state of a voltage detection circuit, detecting the state of a current detection module 703, and setting the state to be 'abnormal disconnection' when a group of circuit current is disconnected. The locking state of the tamper resistant case can be reported by communicating with a mobile phone through the wireless communication module 704, and the locking state of the tamper resistant case can be set by communicating with a seller's computer. The micro control unit 702 has a security management function, and is provided with a private key certificate inside, and performs signature processing on information sent outside by using the private key, and a public key matched with the private key is disclosed outside.
The wireless communication module 704 is configured to wirelessly communicate with a mobile phone or a computer, and the communication mode may be bluetooth, RFID radio frequency, NB-IoT, or other internet of things communication modes.
Fig. 8 is a schematic diagram of a value network transaction verification system provided in an embodiment of the invention, as shown in fig. 8, the system includes: an online shopping mall server 801, a seller PC 802 (which may also be a mobile phone), a handheld device 803 of a logistics company, a buyer mobile phone 804 and a tamper-proof box 805.
The online mall server 801 may be an online shopping service processing system of an online mall platform, and manages shopping process information.
The vendor PC 802 is responsible for setting the "locked" status of the tamper evident box 805. The seller loads the goods (valuables), opens the power switch of the anti-unpacking box and covers the box cover of the anti-unpacking box. The locking command is sent to the tamper evident box 805 through wireless communication, the tamper evident box 805 receives the command through the wireless receiving module, the micro control unit 702 first checks whether the current status is "unlocked" or "unlocked" (i.e., initial status), sets the status to "locked", and signs the status information with a private key certificate. The signed information is fed back to the seller PC 802, the seller PC 802 signs by using a private key of the seller again and then sends the signed information to the online mall server 801, the online mall server 801 verifies the signed information by using the anti-unpacking public key certificate, and the anti-unpacking record state is updated to be locked in the system after the verification is successful. And finally feeds the update result back to the seller PC 802.
The logistics company holds the equipment 803 in charge of setting the anti-dismantling box 805 in a 'transport' state. The wireless communication mode is used for sending a transportation instruction to the anti-dismantling box 805, the anti-dismantling box 805 receives the instruction through the wireless receiving module, the micro control unit 702 firstly checks whether the current state is a locked state, sets the state to be transportation, and signs the state information by using a private key certificate. The signed information is fed back to the handheld device 803 of the logistics company, the handheld device 803 of the logistics company signs by using a private key of the handheld device 803 of the logistics company and then sends the signed information to the online mall server 801, the online mall server 801 verifies the signed information by using the anti-unpacking public key certificate, and the recorded state of the anti-unpacking information is updated to be 'transportation' in the system after the verification is successful. And finally, feeding back the updating result to the handheld equipment 803 of the logistics company. If the status detected by the mcu 702 is not "on lock," an error message is fed back. For example, if the tamper evident box is opened or the box is cut open, a "forced detachment" status will be fed back.
Buyer's cell phone 804 is installed with App software of the online shopping mall for the "unlocked" state of tamper evident 805. An 'unlocking' instruction is sent to the anti-tamper box 805 in a wireless mobile phone communication mode, the anti-tamper box 805 receives the instruction through a wireless receiving module, the micro control unit 702 firstly checks whether the current state is a 'transportation' state, sets the state to be 'unlocked', and signs the state information by using a private key certificate. The signed information is fed back to the buyer mobile phone 804, the buyer mobile phone 804 signs by using a private key of the buyer mobile phone 804 and then sends the signed information to the online mall server 801, the online mall server 801 verifies the signed information by using the anti-unpacking public key certificate, and the anti-unpacking record state is updated to be 'transportation' in the system after the verification is successful. And finally, the updating result is fed back to the mobile phone 804 of the buyer. If the state detected by the micro control unit 702 is not a "transport" state, an error message is fed back. For example, if the tamper evident box is opened or the box is cut open, a "forced detachment" status will be fed back.
The tamper evident boxes 805 may be devices issued by, registered with, or manufactured or purchased by the vendor, but need to be registered with the online mall. The registration needs to send the serial number of the anti-tamper box and the public key certificate to an online mall, and the online mall registers.
Fig. 9 is a flowchart of a method for verifying a network transaction of a valuable item according to an embodiment of the present invention, as shown in fig. 9, which specifically includes the following steps:
s901, registering an anti-unpacking box: the online mall personnel or the seller register the anti-unpacking box on the online mall server, the registration needs to send information such as the number and the public key of the anti-unpacking box to the online mall, the online mall records the information after receiving the information, and the user subsequently verifies the information sent by the anti-unpacking box.
S902, the seller sets the anti-unpacking state as the locking state: after the seller loads the goods (valuables), the power switch of the anti-unpacking box is opened, and the box cover of the anti-unpacking box is covered. The seller terminal (for example, a PC computer) sends a "lock" command to the tamper box through wireless communication, the tamper box receives the command through the wireless receiving module, the micro control unit 702 first checks whether the current state is "unlocked" or "unlocked" (i.e., the initial state), sets the state to "lock", and signs the state information with a private key certificate. And feeding back the signed information to the seller terminal, sending the information to the online mall server after the seller terminal signs by using a private key of the seller terminal, verifying by using the anti-unpacking public key of the online mall server, and updating the anti-unpacking record state to be locked in the system after the verification is successful. And finally, feeding the updating result back to the seller terminal.
S903, the online shopping mall sets the verification code for preventing unpacking: and in the last step, the update result fed back to the seller terminal by the online mall server also contains verification code information. A verification code, such as "23456789," is generated by the online mall server, and the number of the verification code is signed by the online mall server using a private key. And the online mall server feeds the signed verification code back to the seller terminal, and the seller terminal transmits the signed verification code to the anti-unpacking box in a wireless communication mode. The controller of the anti-disassembly lock on the anti-disassembly box verifies the verification code (the verification code is verified by using the public key of the online mall server, and the verification code is authenticated to be generated by the online mall server), and the verification code is displayed by a display screen arranged on the anti-disassembly box.
The seller takes a video of the process of loading the valuables into the tamper-evident box. Valuable articles need to be put into the anti-dismantling box in the video, the anti-dismantling box is locked, and the process of the verification code is displayed on a display screen of the anti-dismantling box. And uploading the shot video image to an online shopping mall server by the seller terminal. The function of the verification code is to prevent the seller from not faithfully placing the valuable items for sale, such as placing fake goods, inferior goods.
S904, the logistics company verifies the verification code of the anti-unpacking box: when the logistics company receives goods, the handheld device is used for accessing the online mall server, whether the verification code displayed in the boxing video is consistent with the verification code displayed on the display screen of the anti-unpacking box is verified, and if the verification code is not consistent, the transportation is refused.
S905, the logistics company sets the anti-unpacking box to be in a 'transportation' state: when the logistics company receives goods, the anti-unpacking device (namely the logistics company terminal) is adopted to set the anti-unpacking state to be the 'transportation' state. The anti-dismantling device comprises a micro control unit, a wireless receiving module, a transmission module and a receiving module, wherein the micro control unit is used for sending a 'transmission' instruction to the anti-dismantling box in a wireless communication mode, receiving the instruction by the wireless receiving module, checking whether the current state is a 'locked' state, setting the state to be 'transmission' and signing the state information by using a private key certificate. And feeding back the signed information to the handheld equipment of the logistics company, sending the signed information to the online mall server after the handheld equipment of the logistics company signs the information by using a private key of the handheld equipment of the logistics company, verifying the information by using the public key of the anti-unpacking box by the online mall server, and updating the recorded state of the anti-unpacking box in the system to be 'transportation' after the verification is successful. And finally, feeding back the updating result to the handheld equipment of the logistics company. If the status detected by the micro control unit is not "locked" status, an error message is fed back. For example, if the tamper evident box is opened or the box is cut open, a "forced detachment" status will be fed back.
S906, verifying the verification code of the anti-unpacking box by the buyer: when receiving goods, a user firstly accesses the online mall server by using a mobile phone (namely a buyer terminal), verifies whether the verification code displayed in the boxing video is consistent with the verification code displayed on the display screen of the anti-unpacking box, and if not, rejects the acceptance.
S907, verifying the state of the anti-unpacking box by the buyer: after receiving the goods, the user uses a mobile phone (provided with App software of an online shopping mall) to communicate with the anti-unpacking box, reads the state of the anti-unpacking box and judges whether the state is a 'transportation' state. After the anti-unpacking box sends the state information to the mobile phone, the mobile phone sends the state information to the online mall server for verification, the online mall server also uses the public key of the anti-unpacking box for verification, and sends the verification result to the mobile phone of the user. If the status of the tamper-proof box is read as abnormal, for example, as a "forcibly detached" status, the user rejects the shipment.
S908, setting the anti-unpacking box to be in an unlocking state: and after the user successfully verifies in the last step, receiving goods, and setting the anti-dismantling box to be in an 'unlocking' state by using a mobile phone. An unlocking instruction is sent to the anti-dismantling box in a wireless mobile phone communication mode, the anti-dismantling box receives the instruction through the wireless receiving module, the micro control unit sets the state to be unlocked, and the state information is signed by a private key certificate. And feeding back the signed information to the buyer mobile phone, sending the information to the online mall server after the buyer mobile phone signs by using a private key of the buyer mobile phone, verifying the information by using the anti-unpacking public key of the online mall server, and updating the anti-unpacking record state into transportation in the system after the verification is successful. And finally, feeding the updating result back to the mobile phone of the buyer.
S909, checking the delivery status of the tamper: after the user receives the goods, the logistics company uses the handheld device to visit the online shopping mall, checks whether the current state of the anti-dismantling box is in an 'unlocking' state, and if the current state is in the 'unlocking' state, the logistics company can leave the user to indicate that the user successfully receives the goods.
Based on the same inventive concept, the embodiment of the present invention further provides a monitoring device for preventing the box from being detached, as described in the following embodiments. Because the principle of solving the problems of the device is similar to that of the anti-unpacking monitoring method, the implementation of the device can refer to the implementation of the anti-unpacking monitoring method, and repeated parts are not described again.
Fig. 10 is a schematic view of a monitoring device for a tamper-evident box according to an embodiment of the present invention, as shown in fig. 10, the monitoring device includes: the system comprises an anti-box-dismantling monitoring module 11, a verification information acquisition module 12, a video image acquisition module 13, a video image storage module 14 and an anti-box-dismantling monitoring module 15.
The anti-unpacking monitoring module 11 is used for detecting a locking instruction of the anti-unpacking box, wherein a display screen is arranged on an anti-unpacking box shell; the verification information acquisition module 12 is used for acquiring plaintext verification information randomly generated by the server according to the locking instruction and displaying the plaintext verification information through a display screen arranged on the anti-dismantling box shell; the video image acquisition module 13 is used for acquiring a video image of the locking process of the anti-dismantling box, wherein the video image comprises the plaintext verification information; the video image storage module 14 is configured to store the acquired video image to a server, where the video image includes plaintext verification information; and the anti-unpacking monitoring module 15 is used for monitoring the locking process of the anti-unpacking box based on the video image stored in the server.
In an embodiment, as shown in fig. 11, in the monitoring apparatus for preventing a box from being detached provided in the embodiment of the present invention, the verification information obtaining module 12 includes: a verification information obtaining unit 121, configured to obtain plaintext verification information generated by the server according to the locking instruction; a verification information encryption unit 122, configured to encrypt plaintext verification information using a private key to obtain ciphertext verification information; the verification information decryption unit 123 is configured to decrypt the ciphertext verification information by using the public key corresponding to the private key to obtain plaintext verification information; and the verification information display unit 124 is used for displaying the plaintext verification information through a display screen arranged on the anti-dismantling box shell.
Optionally, in the embodiment of the present invention, the plaintext verification information obtained by the verification information obtaining module 12 is a string of numbers or letters randomly generated by the server according to the locking instruction.
In an embodiment, as shown in fig. 11, the monitoring apparatus for preventing unpacking according to an embodiment of the present invention may further include: the verification request module 16 is configured to receive a video viewing request sent by a user terminal, where the video viewing request is used to request to view a video image of the anti-theft box locking process stored on the server; and the verification information sending module 17 is used for sending the video image of the anti-dismantling box locking process to the user terminal according to the video viewing request.
Based on the same inventive concept, an embodiment of the present invention further provides a computer device, so as to solve the technical problem that the existing manner of transporting valuables by using a tamper-proof box cannot realize monitoring of the locking process of the tamper-proof box, fig. 12 is a schematic diagram of the computer device provided in the embodiment of the present invention, as shown in fig. 12, the computer device 12 includes a memory 121, a processor 122, and a computer program stored in the memory 121 and capable of running on the processor 122, and the processor 122 realizes the tamper-proof box monitoring method when executing the computer program.
Based on the same inventive concept, the embodiment of the invention also provides a computer readable storage medium, which is used for solving the technical problem that the locking process of the anti-unpacking box cannot be monitored in the conventional manner of transporting valuables by adopting the anti-unpacking box.
In summary, embodiments of the present invention provide a method, an apparatus, a computer device, and a computer readable storage medium for monitoring an anti-tamper box, in which a display screen for displaying plaintext verification information is disposed on an anti-tamper box housing, after a locking instruction of the anti-tamper box is detected, a server randomly generates plaintext verification information according to the locking instruction, and displays the plaintext verification information through the display screen disposed on the anti-tamper box housing, so that a video image acquired during locking of the anti-tamper box includes the plaintext verification information, and the acquired video image including the plaintext verification information is stored in the server, which may facilitate a later transportation worker or a consumer to monitor a locking process of the anti-tamper box based on the video image including the plaintext verification information stored in the server.
By the embodiment of the invention, the locking process of the anti-dismantling box can be monitored, and the commodities put into the anti-dismantling box by a seller are guaranteed to be real commodities. The embodiment of the invention is applied to the anti-dismantling box of the valuables, and can ensure that the valuables are not dismantled in the transportation process, thereby ensuring the safety and the anti-repudiation performance of the valuables in the transaction transportation and receiving processes.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention has been described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
The above-mentioned embodiments are provided to further explain the objects, technical solutions and advantages of the present invention in detail, and it should be understood that the above-mentioned embodiments are only examples of the present invention and should not be used to limit the scope of the present invention, and any modifications, equivalents, improvements and the like made within the spirit and principle of the present invention should be included in the scope of the present invention.

Claims (8)

1. A monitoring method for a tamper-proof box is characterized by being applied to a network transaction verification system for valuables, and comprising the following steps:
detecting a locking instruction of an anti-dismantling box, wherein a display screen is arranged on an anti-dismantling box shell;
acquiring plaintext verification information randomly generated by a server according to the locking instruction, and displaying the plaintext verification information through a display screen arranged on the anti-dismantling box shell;
acquiring a video image of the locking process of the anti-dismantling box, wherein the video image comprises the plaintext verification information;
storing the captured video images to a blockchain network and/or the server;
monitoring the locking process of the anti-unpacking box based on the block chain network and/or the video image stored in the server;
acquiring plaintext verification information randomly generated by a server according to the locking instruction, and displaying the plaintext verification information through a display screen arranged on the anti-dismantling box shell, wherein the method comprises the following steps:
acquiring plaintext verification information generated by the server according to the locking instruction;
encrypting the plaintext verification information by using a private key to obtain ciphertext verification information;
decrypting the ciphertext verification information by using the public key corresponding to the private key to obtain plaintext verification information;
displaying the plaintext verification information through a display screen arranged on the anti-dismantling box shell;
the tamper evident band includes: a case cover, a case body and an anti-disassembly lock; should prevent tearing open the lock and include: an upper lock body and a lower lock body; wherein, lower lock includes: a tamper controller and a display screen; the anti-dismantling controller comprises conductive contacts which are respectively connected to the end points of the longitude and latitude coils in the box body shell; the anti-disassembly controller is used for detecting the current of a line formed between the conductive contact and the terminal point; when a group of line current is disconnected, updating the state of the anti-unpacking box, and signing and sending the state information by using a private key of the anti-unpacking box;
the valuables network transaction verification system comprises: a server, a seller computer and an anti-unpacking box;
the seller computer is used for setting the locking state of the anti-unpacking box; when a seller loads goods, a locking instruction is sent to the anti-dismantling box in a wireless communication mode; the anti-dismantling box is used for receiving an instruction, setting the locking state of the anti-dismantling box and signing the state information by using a private key certificate; feeding back the signed information to a seller computer; the seller computer is also used for sending the signature to the server after signing by using the private key of the seller computer;
the server is configured to: verifying by using the public key certificate of the anti-unpacking box, and updating the recorded state of the anti-unpacking box in the system after the verification is successful; and feeding back the update result and the verification code information to the seller computer; the verification code information is obtained by the server by using a server private key to sign a verification code generated by the server;
the anti-disassembly box is used for: and verifying the verification code information by using a server public key, and displaying the verification code on a display screen arranged on the anti-dismantling box after the verification code information is authenticated to be generated by the server.
2. The method of claim 1, wherein the plaintext validation information is a string of numbers or letters randomly generated by the server according to a lock directive.
3. The method of claim 1, wherein the method further comprises:
receiving a video viewing request sent by a user terminal, wherein the video viewing request is used for requesting to view a video image of a locking process of a tamper box stored on the server;
and sending the video image of the anti-dismantling box locking process to the user terminal according to the video viewing request.
4. The utility model provides a monitoring device of anti-unpacking which characterized in that is applied to valuables network transaction verification system, includes:
the anti-unpacking monitoring module is used for detecting a locking instruction of the anti-unpacking box, wherein a display screen is arranged on the anti-unpacking box shell;
the verification information acquisition module is used for acquiring plaintext verification information randomly generated by the server according to the locking instruction and displaying the plaintext verification information through a display screen arranged on the anti-dismantling box shell;
the video image acquisition module is used for acquiring a video image of the locking process of the anti-dismantling box, wherein the video image comprises the plaintext verification information;
the video image storage module is used for storing the acquired video image to a blockchain network and/or the server, wherein the video image comprises the plaintext verification information;
the anti-unpacking monitoring module is used for monitoring the locking process of the anti-unpacking box based on a block chain network and/or a video image stored on the server;
the verification information acquisition module includes:
the verification information acquisition unit is used for acquiring plaintext verification information generated by the server according to the locking instruction;
the verification information encryption unit is used for encrypting the plaintext verification information by using a private key to obtain ciphertext verification information;
the verification information decryption unit is used for decrypting the ciphertext verification information by using the public key corresponding to the private key to obtain plaintext verification information;
the verification information display unit is used for displaying the plaintext verification information through a display screen arranged on the anti-dismantling box shell;
the tamper evident band includes: a box cover, a box body and an anti-disassembly lock; should prevent tearing open the lock and include: an upper lock body and a lower lock body; wherein, lower lock includes: a tamper controller and a display screen; the anti-dismantling controller comprises conductive contacts which are respectively connected to the end points of the longitude and latitude coils in the box body shell; the anti-disassembly controller is used for detecting the current of a line formed between the conductive contact and the terminal point; when a group of line current is disconnected, updating the state of the anti-unpacking box, and signing and sending the state information by using a private key of the anti-unpacking box;
the valuables network transaction verification system comprises: a server, a seller computer and an anti-unpacking box;
the seller computer is used for setting the locking state of the anti-unpacking box; when the seller loads the goods, a locking instruction is sent to the anti-dismantling box in a wireless communication mode; the anti-dismantling box is used for receiving an instruction, setting the locking state of the anti-dismantling box and signing the state information by using a private key certificate; feeding back the signed information to a seller computer; the seller computer is also used for sending the signature to the server after signing by using the private key of the seller computer;
the server is configured to: verifying by using the public key certificate of the anti-unpacking box, and updating the recorded state of the anti-unpacking box in the system after the verification is successful; and feeding back the update result and the verification code information to the seller computer; the verification code information is obtained by the server by using a server private key to sign a verification code generated by the server;
the anti-dismantling box is used for: and verifying the verification code information by using a server public key, and displaying the verification code on a display screen arranged on the anti-dismantling box after the verification code information is authenticated to be generated by the server.
5. The apparatus as claimed in claim 4, wherein the plaintext verification information is a string of numbers or letters randomly generated by the server according to a lock command.
6. The apparatus of claim 4, wherein the apparatus further comprises:
the verification request module is used for receiving a video viewing request sent by a user terminal, wherein the video viewing request is used for requesting to view a video image of a locking process of the anti-dismantling box stored on the server;
and the verification information sending module is used for sending the video image of the anti-unpacking and locking process to the user terminal according to the video viewing request.
7. A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor implements the tamper-resistant monitoring method of any one of claims 1 to 3 when executing the computer program.
8. A computer-readable storage medium, characterized in that the computer-readable storage medium stores a computer program for executing the tamper-proof monitoring method according to any one of claims 1 to 3.
CN202110147058.9A 2021-02-03 2021-02-03 Anti-unpacking monitoring method and device Active CN112967425B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110147058.9A CN112967425B (en) 2021-02-03 2021-02-03 Anti-unpacking monitoring method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110147058.9A CN112967425B (en) 2021-02-03 2021-02-03 Anti-unpacking monitoring method and device

Publications (2)

Publication Number Publication Date
CN112967425A CN112967425A (en) 2021-06-15
CN112967425B true CN112967425B (en) 2023-03-28

Family

ID=76273673

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110147058.9A Active CN112967425B (en) 2021-02-03 2021-02-03 Anti-unpacking monitoring method and device

Country Status (1)

Country Link
CN (1) CN112967425B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114664011A (en) * 2022-04-14 2022-06-24 中国工商银行股份有限公司 Logistics management method, system, computer device, storage medium and program product

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103177220A (en) * 2013-04-12 2013-06-26 成都市易恒信科技有限公司 Personal information encryption method in logistics system based on two-dimensional codes
CN110490505A (en) * 2019-06-25 2019-11-22 北京京东振世信息技术有限公司 Logistics information processing method, device and equipment
CN111415445A (en) * 2020-04-28 2020-07-14 北京仁信证科技有限公司 Logistics box management method and device, computer equipment and storage medium
CN112270636A (en) * 2020-11-25 2021-01-26 广东广宇科技发展有限公司 Block chain-based consignment logistics management method, device, terminal and storage medium

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103377422A (en) * 2012-04-25 2013-10-30 张洪波 Commodity safety distribution system and method and commodity safety distribution terminal device
CN104129562B (en) * 2014-08-04 2017-06-06 矩众合能(天津)科技发展有限公司 Internet of Things anti-counterfeit anti-theft package bin and its application method
CN105632330B (en) * 2014-10-27 2019-03-19 上海锐帆信息科技有限公司 A kind of visualization digital Sealing arrangement
US10672211B2 (en) * 2017-08-31 2020-06-02 BinBox, Inc. Secure storage systems and methods
CN108177871A (en) * 2017-12-18 2018-06-19 合肥凯石投资咨询有限公司 A kind of electronic seal lock and its application in logistics
US11208244B2 (en) * 2018-05-24 2021-12-28 Mindweaver LLC Portable and trackable security box and method for delivering and tracking security box
CN111115004A (en) * 2018-10-31 2020-05-08 北京外麦王科技有限公司 Safety box and safety transportation method thereof
CN111572992B (en) * 2020-05-28 2024-02-02 中国工商银行股份有限公司 Accommodation apparatus, control method, and system for transporting article

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103177220A (en) * 2013-04-12 2013-06-26 成都市易恒信科技有限公司 Personal information encryption method in logistics system based on two-dimensional codes
CN110490505A (en) * 2019-06-25 2019-11-22 北京京东振世信息技术有限公司 Logistics information processing method, device and equipment
CN111415445A (en) * 2020-04-28 2020-07-14 北京仁信证科技有限公司 Logistics box management method and device, computer equipment and storage medium
CN112270636A (en) * 2020-11-25 2021-01-26 广东广宇科技发展有限公司 Block chain-based consignment logistics management method, device, terminal and storage medium

Also Published As

Publication number Publication date
CN112967425A (en) 2021-06-15

Similar Documents

Publication Publication Date Title
US20180108024A1 (en) Open registry for provenance and tracking of goods in the supply chain
US10152720B2 (en) Authentication tags and systems for golf clubs
US20180032759A1 (en) Open registry for human identification
US20180063113A1 (en) Secure transaction systems and methods
US20160132704A1 (en) Authenticating and Managing Item Ownership and Authenticity
US20160210547A1 (en) Identification Tag with Magnet Attachment and System for Supply Chain Management
CN108764797A (en) Circulation information querying method, device, equipment, system and storage medium
CN104995656A (en) Unauthorized product detection techniques
WO2018075403A1 (en) Open registry for provenance and tracking of goods in the supply chain
CN104794626B (en) A kind of method for anti-counterfeit and device based on hardware information
US20060235805A1 (en) Universal anti-counterfeit method and system
US20120124388A1 (en) Electronic-device theft-deterring systems
WO2018067974A1 (en) Open registry for human identification
CN104217241A (en) Electronic anti-fake label and realizing method
US10958665B2 (en) Consumer and business anti-counterfeiting services using identification tags
JP2008542940A (en) Product identifier verification
CN112967425B (en) Anti-unpacking monitoring method and device
CN108573296A (en) False proof device, anti-counterfeiting system and method for anti-counterfeit
KR20180128150A (en) System and method for managing mobile quality certificate using identification code of product
JP7047026B2 (en) Anti-theft system for stores
CN214325890U (en) Anti-unpacking box and monitoring system thereof
KR101195162B1 (en) System and method for validationg product authenticity by using marker
US9672505B2 (en) Method for verifying the authenticity of a terminal, corresponding device and program
TWI770279B (en) Voucher verification auxiliary device, system and method thereof
CN110399711A (en) Member identity identification method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant